Bonjour,

Le 25/11/2013 17:14, Sassan Panahinejad a écrit :
I am dealing with a CA certificate bundle, similar to this one: https://github.com/twitter/secureheaders/blob/master/config/curl-ca-bundle.crt, like the example, the one I am dealing with was automatically generated from mozilla's certdata.txt.

Consider the certificate labelled "Bogus live.com <http://live.com>". Now I know from some searching that this certificate is intended to block a bad certificate, but I don't know how this works in an openssl cert bundle. I am concerned that perhaps the conversion from the format used by mozilla has lead to the certificate being included as a trusted cert instead of an explicitly untrusted one.

Note that there are no other associated files (eg: blacklist.txt) (in either the example given, or the file I am dealing with).

There's no real question in this post.

The author of the script used to create a CA bundle from the Mozilla root store only took the certificates from this Mozilla root store, without the associated permissions. This script is incomplete, and the resulting output should NOT be used. Therefore, you'll find as a result explicitely distrusted certificates, such as bogus live.com cert, but also DigiNotar CA certificates, MD5-collision CA, other bogus certs (gmail, yahoo, etc), and CA certificates not trusted for SSL use.

Don't use that file, at all.

--
Erwann ABALEA

Reply via email to