Code Monkey home page Code Monkey logo

badtls.io's Introduction

My open source projects are primarily an artifact of various personal projects. Currently the only ones under active development are Package Control, asn1crypto and oscrypto.

I generally will add contributors to repos once they have shown a pattern of useful contributions, be it responding to issues or sending PRs.

badtls.io's People

Contributors

jviide avatar wbond avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar  avatar  avatar

badtls.io's Issues

badtls.io certificates created with an old version of asn1crypto?

wbond/asn1crypto@e1fa6cd fixed how asn1crypto.x509.Name.build() encodes distinguished names. However badtls.io might still serve certificates created with an older version of asn1crypto.

A bit of background: ouspg/trytls#231 stumbled onto how go1.7 fails some badtls.io tests with rather surprising error messages. @joneskoo created issue golang/go#16834, which in turn spawned issue golang/go#16836, which in turn hints that the trigger might have been the way x509.Name.build() used to work.

Adding subjectAltNames to certificates

Most of the badtls.io test certificates contain only a common name and no subjectAltNames. Support for such certificates is deprecated, in the process of being deprecated or not implemented to begin with in some libraries and applications. For reference:

It might be a good idea to add subjectAltNames to badtls.io certificates. That would allow testing a wider variety of subjects, and maybe even avoid false passes (such as not rejecting expired.badtls.io:11006 because of expiration, but because of missing subjectAltNames).

Add license

Can you please add a license (e.g. MIT) so that it's easier to reuse this? Thanks!

[Feature Request] OCSP Must-Staple without OCSPResponse?

There exists a TLS Security Policy a TLS certificate requestor can opt into*, to tell the client something like “if you don't see a recent OCSP attachment on this handshake, assume you're being MitM'd by an attacker who doesn't want you to see the CRLs.”

I'm very curious whether my browser implements this “SHOULD”, but I haven't been able to find a test site for it: https://datatracker.ietf.org/doc/html/rfc7633

A server offering an end-entity certificate with a TLS feature extension MUST satisfy a client request for the specified feature unless this would be redundant as described below. Clients MAY refuse to accept the connection if the server does not accept a request for a specified feature.

In the case that a client determines that the server configuration is inconsistent with a policy specifying support for the TLS status_request extension it SHOULD reject the TLS configuration.

*Let's Encrypt has apparently supported this since mid-2016, with --must-staple on its Certbot client.

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.