FYI, I'm submitting these right now, it seems to be working, here's an
example

https://crt.sh/?q=1eb6ec6e6c45663f3bb1b2f140961bbf3352fc8741ef835146d3a8a2616ee28f

Tavis.

On Mon, Jun 19, 2017 at 12:56 PM, Tavis Ormandy <tav...@google.com> wrote:

> I noticed there's an apparently valid facebook.com certificate in there (
> 61b1526f9d75775c3d533382f36527c9.pem). This is surprising to me, that
> seems like it would be in CT already - so maybe I don't know what I'm doing.
>
> Let me know if I've misunderstood something.
>
> Tavis.
>
>
> On Mon, Jun 19, 2017 at 12:41 PM, Tavis Ormandy <tav...@google.com> wrote:
>
>> Thanks Alex, I took a look, it looks like the check pings crt.sh - is
>> doing that for a large number of certificates acceptable Rob?
>>
>> I made a smaller set, the certificates that have 'SSL server: Yes' or
>> 'Any Purpose : Yes', there were only a few thousand that verified, so I
>> just checked those and found 551 not in crt.sh.
>>
>> (The *vast* majority are code signing certificates, many are individual
>> apple developer certificates)
>>
>> Is this useful? if not, what key usage is interesting?
>>
>> https://lock.cmpxchg8b.com/ServerOrAny.zip
>>
>> Tavis.
>>
>> On Mon, Jun 19, 2017 at 7:03 AM, Alex Gaynor <agay...@mozilla.com> wrote:
>>
>>> If you're interested in playing around with submitting them yourself, or
>>> checking if they're already submitted, I've got some random tools for
>>> working with CT: https://github.com/alex/ct-tools
>>>
>>> Specifically ct-tools check <cert1.pem, cert2.pem, ...> will get what
>>> you want. It's all serial, so for 8M certs you probably want to Bring Your
>>> Own Parallelism (I should fix this...)
>>>
>>> Alex
>>>
>>> On Mon, Jun 19, 2017 at 6:51 AM, Rob Stradling via dev-security-policy <
>>> dev-security-policy@lists.mozilla.org> wrote:
>>>
>>>> On 16/06/17 20:11, Andrew Ayer via dev-security-policy wrote:
>>>>
>>>>> On Fri, 16 Jun 2017 10:29:45 -0700 Tavis Ormandy wrote:
>>>>>
>>>> <snip>
>>>>
>>>>> Is there an easy way to check which certificates from my set you're
>>>>>> missing? (I'm not a PKI guy, I was collecting unusual extension OIDs
>>>>>> for fuzzing).
>>>>>>
>>>>>> I collected these from public sources, so can just give you my whole
>>>>>> set if you already have tools for importing them and don't mind
>>>>>> processing them, I have around ~8M (mostly leaf) certificates, the
>>>>>> set with isCa will be much smaller.
>>>>>>
>>>>>
>>>>> Please do post the whole set.  I suspect there are several people on
>>>>> this list (including myself and Rob) who have the tools and experience
>>>>> to process large sets of certificates and post them to public
>>>>> Certificate Transparency logs (whence they will be fed into crt.sh).
>>>>>
>>>>> It would be useful to include the leaf certificates as well, to catch
>>>>> CAs which are engaging in bad practices such as signing non-SSL certs
>>>>> with SHA-1 under an intermediate that is capable of issuing SSL
>>>>> certificates.
>>>>>
>>>>> Thanks a bunch for this!
>>>>>
>>>>
>>>> +1
>>>>
>>>> Tavis, please do post the whole set.  And thanks!
>>>>
>>>> --
>>>> Rob Stradling
>>>> Senior Research & Development Scientist
>>>> COMODO - Creating Trust Online
>>>> _______________________________________________
>>>> dev-security-policy mailing list
>>>> dev-security-policy@lists.mozilla.org
>>>> https://lists.mozilla.org/listinfo/dev-security-policy
>>>>
>>>
>>>
>>
>
_______________________________________________
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to