Bug#514807: statistics about V1 CA Certs / general assumptions about the state of the network
Daniel Kahn Gillmor
dkg at fifthhorseman.net
Thu Feb 19 01:22:44 UTC 2009
Hey folks--
a bit of background on the proposals i just made, to explain where i was
coming from:
Of the certificate authorities included in ca-certificates in lenny, 20
of them (14.1%) are v1 certs:
0 dkg at pip:~$ for foo in /usr/share/ca-certificates/*/*.crt; do
> certtool -i < "$foo" 2>/dev/null | grep Version
> done | sort | uniq -c
20 Version: 1
122 Version: 3
0 dkg at pip:~$
(there are 141 certificate files, but
/usr/share/ca-certificates/cacert.org/cacert.org.crt appears to contain
two (Version 3) certificates)
My proposals were based on a few assumptions. I hope people will
vocally disagree with any of them that they think are wrong:
* no one that we want to support is actively making new V1 Certs
intended for use as Certificate Authorities
* People using private Certificate Authorities (i.e. not one of the big
public ones) tend in general to have more immediate access to the people
who control the relevant CAs.
* CA certificates do not make use of the SubjectAltName extension (i
think the use of extensions might be a V3 feature anyway)
* When CA Certificates have a CN in their Subject, it is *not* a valid
hostname.
Here is the list of V1 certificates:
0 dkg at pip:~$ for foo in /usr/share/ca-certificates/*/*.crt; do
> if [ $(certtool -i < "$foo" 2>/dev/null |
> grep Version: | tr -d -c '13') = 1 ] ; then
> echo "$foo" | sed 'sx/usr/share/ca-certificates/xx'
> fi
> done
mozilla/Digital_Signature_Trust_Co._Global_CA_2.crt
mozilla/Digital_Signature_Trust_Co._Global_CA_4.crt
mozilla/GTE_CyberTrust_Global_Root.crt
mozilla/GTE_CyberTrust_Root_CA.crt
mozilla/IPS_Servidores_root.crt
mozilla/RSA_Root_Certificate_1.crt
mozilla/ValiCert_Class_1_VA.crt
mozilla/ValiCert_Class_2_VA.crt
mozilla/Verisign_Class_1_Public_Primary_Certification_Authority.crt
mozilla/Verisign_Class_1_Public_Primary_Certification_Authority_-_G2.crt
mozilla/Verisign_Class_1_Public_Primary_Certification_Authority_-_G3.crt
mozilla/Verisign_Class_2_Public_Primary_Certification_Authority.crt
mozilla/Verisign_Class_2_Public_Primary_Certification_Authority_-_G2.crt
mozilla/Verisign_Class_2_Public_Primary_Certification_Authority_-_G3.crt
mozilla/Verisign_Class_3_Public_Primary_Certification_Authority.crt
mozilla/Verisign_Class_3_Public_Primary_Certification_Authority_-_G2.crt
mozilla/Verisign_Class_3_Public_Primary_Certification_Authority_-_G3.crt
mozilla/Verisign_Class_4_Public_Primary_Certification_Authority_-_G2.crt
mozilla/Verisign_Class_4_Public_Primary_Certification_Authority_-_G3.crt
mozilla/Verisign_RSA_Secure_Server_CA.crt
0 dkg at pip:~$
Note that they're all from mozilla -- perhaps Mozilla has updated V3
certificates available from some/all of these CAs? Verisign in
particular seems like a common culprit, but i can't find a fresh
download on their site, only fingerprints:
https://www.verisign.com/repository/root.html
(is it even possible to transform a self-signed V1 cert into a
self-signed V3 cert?)
--dkg
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 890 bytes
Desc: OpenPGP digital signature
Url : http://lists.alioth.debian.org/pipermail/pkg-gnutls-maint/attachments/20090218/2f67dc94/attachment-0001.pgp
More information about the Pkg-gnutls-maint
mailing list