Skip to content
This repository has been archived by the owner on Oct 18, 2020. It is now read-only.

Note that the tool does not check validity of certificates #32

Open
jonnybarnes opened this issue Sep 2, 2014 · 6 comments
Open

Note that the tool does not check validity of certificates #32

jonnybarnes opened this issue Sep 2, 2014 · 6 comments

Comments

@jonnybarnes
Copy link
Collaborator

At the time of posting shanehudson.net actually returns a cert for shanehudson.co.uk

We should warn users about this misconfiguration when it occurs.

@jonnybarnes jonnybarnes changed the title We need to check that the cert returned if valid for the domain entered We need to check that the cert returned is valid for the domain entered Sep 2, 2014
@konklone
Copy link
Owner

konklone commented Sep 2, 2014

I'm not sure we should. Instead, I'd prefer to indicate to the user that we specifically don't validate certificates, and link them to SSL Labs to do that. Validation of certs is much much more complicated than checking the signature algorithm, and I don't want to reinvent SSL Labs here.

I'll leave this ticket open until it's clarified one way or the other on the site.

@konklone
Copy link
Owner

konklone commented Sep 2, 2014

FWIW, I did check to see if openssl does that automatically in its openssl s_client call, but it does not. However, even if I could find an openssl command that did that, I'd like to leave the door open to ditching the remaining openssl call in favor of an in-code approach (like I did in #30 by removing openssl x509).

@jonnybarnes
Copy link
Collaborator Author

Presumably the -showcerts will expose the CN of the cert that we could then check what they entered in the field against. I agree we aren't checking how well they have set up their SSL/TLS. But if they have set it up in an invalid way we should probably throw a warning.

@konklone
Copy link
Owner

konklone commented Sep 2, 2014

I just see it being a long tail of bugs ("your validity checker is broken, you're not checking expiration dates", "you're not checking wildcards", "you're not analyzing the validity of the intermediates or root", etc.), and a larger code surface to watch over. The more we can stick to the mission of validating SHA-2 readiness, the simpler the infrastructure will stay and the less of the Internet's entropy we'll need to plan for.

@jonnybarnes
Copy link
Collaborator Author

Thinking about it I agree, though maybe mention as much on the page. Something like "we are only checking for SHA-1/2, for a more complete check of your certificates and ssl/tls setup try SLL Labs."

@konklone
Copy link
Owner

konklone commented Sep 2, 2014

Let's definitely do that.

@konklone konklone changed the title We need to check that the cert returned is valid for the domain entered Note that the tool does not check validity of certificates Sep 8, 2014
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants