mirror of
https://github.com/SSLMate/certspotter.git
synced 2025-06-27 10:15:33 +02:00
README: fix hyperlink markup
This commit is contained in:
parent
c52f1f950c
commit
ab72a342d7
@ -81,8 +81,8 @@ For instance, if a DNS identifier contains a null byte, Cert Spotter
|
|||||||
interprets it as two identifiers: the complete identifier, and the
|
interprets it as two identifiers: the complete identifier, and the
|
||||||
identifier formed by truncating at the first null byte. For example, a
|
identifier formed by truncating at the first null byte. For example, a
|
||||||
certificate for `example.org\0.example.com` will alert the owners of both
|
certificate for `example.org\0.example.com` will alert the owners of both
|
||||||
`example.org` and `example.com`. This defends against [null prefix attacks]
|
`example.org` and `example.com`. This defends against [null prefix attacks](
|
||||||
(http://www.thoughtcrime.org/papers/null-prefix-attacks.pdf).
|
http://www.thoughtcrime.org/papers/null-prefix-attacks.pdf).
|
||||||
|
|
||||||
SSLMate continuously monitors CT logs to make sure every certificate's
|
SSLMate continuously monitors CT logs to make sure every certificate's
|
||||||
identifiers can be successfully parsed, and will release updates to
|
identifiers can be successfully parsed, and will release updates to
|
||||||
|
Loading…
x
Reference in New Issue
Block a user