-
Notifications
You must be signed in to change notification settings - Fork 27
Detect when certs can be changed, and link to replacement #31
Comments
This presumably means we'd need to create some sort of db of SHA-1 intermediate CA certs and their equivalent SHA-2 certs. |
Yeah, probably just a JSON object, it can be pretty lightweight and held in |
So would we want something like this?
I'm not sure exactly how we'd want to name the different certificates. Maybe even include an item in then JSON with a URL to download the cert. |
In fact do we need the fingerprints of the SHA-2 signed intermediaries? If they already have one then we can just put a big green "Nice" on the page. |
Started a repo collecting fingerprints of these certs: https://github.com/jonnybarnes/sha-stuff |
@jonnybarnes I'd welcome putting that dataset to use here, and using it to show users where to go to update their intermediates immediately upon testing their site. One quibble - for the "fingerprints" fields, I think "sha256" is a more precise field name than "sha2", since you're actually using a specific algorithm (assuming you're running SHA-256 to do it). |
@konklone yup to SHA-256, |
Hi guys and @jonnybarnes, I am just passing around here and asking you - isn't it much easier to get/collect CA certificates by exporting them from current java cacerts and/or system CA stores? Like these in CentOS: From java cacerts you can use keytool to list them, parse output using sed and grep, export one by one using keytool to pem format and finally use in this tool... Even more simplified is cutting ca-bundle.trust.crt which is already pem encoded. Currently I have 194 CA certs there... Maybe it is too late comment for this tool, but might be helpful for somebody passing around, like me ;-) |
We're now bringing down full intermediate data, with the merging of #30. Once #19 is merged, one ambitious goal could be to formalize some of the recommendations that @jonnybarnes and others found for intermediate SHA-2 certs into fingerprint mappings.
So, if we see a known replace-able intermediate cert, we can suggest its replacement in the UX. This also will require updating our cert parsing to keep the cert fingerprint during
node-x509
parsing.We need a data object that maps regexes of domains and intermediate names to names/links, something like:
The text was updated successfully, but these errors were encountered: