Open
Bug 1295698
Opened 8 years ago
Updated 2 years ago
Tool/Script to check that the CA Community in Salesforce data is in sync with the NSS root store and ExtendedValidation.cpp
Categories
(Core :: Security: PSM, enhancement, P3)
Core
Security: PSM
Tracking
()
NEW
People
(Reporter: kathleen.a.wilson, Unassigned)
Details
(Whiteboard: [psm-backlog])
Request: Tool/script to check that root cert data in the CA Community in Salesforce is in sync with the NSS root store and ExtendedValidation.cpp. Can be a command-line tool with code kept in github.
The Salesforce data is available here:
https://wiki.mozilla.org/CA:IncludedCAs
CSV Format of Spreadsheet of Included CA Certificates:
https://mozillacaprogram.secure.force.com/CA/IncludedCACertificateReportCSVFormat
The tool/script would compare the data in the IncludedCACertificateReportCSVFormat file with the data in the NSS root store, and list any root certs that are on one and not the other. Output would show the deltas: the Certificate Issuer Organization, Certificate Subject Name, and SHA1 (or SHA256) Fingerprint.
The tool/script would also compare the data in the IncludedCACertificateReportCSVFormat file with the contents of the ExtendedValidation.cpp, and list any root certs that are indicated to receive EV treatment in one and not the other. Output would show the deltas: the Certificate Issuer Organization, Certificate Subject Name, and SHA1 (or SHA256) Fingerprint, the EV Policy OID.
Thanks,
Kathleen
Updated•8 years ago
|
Priority: -- → P3
Whiteboard: [psm-backlog]
Reporter | ||
Comment 1•8 years ago
|
||
Need to build external controls to detect anomalies in the Salesforce database (Common CA Database / CA Community in Salesforce). For example, by comparing the list of trusted roots between NSS and Salesforce and sending notifications to the CA team when differences are spotted. The same could be done for whitelisted/blacklisted intermediate certs.
Comment 2•8 years ago
|
||
I think it would make sense to implement this as a periodic job in the TLS Observatory: https://github.com/mozilla/tls-observatory/issues/165
Reporter | ||
Comment 3•6 years ago
|
||
Current Status:
We have a "Data Integrity - certdata.txt" tool that I run in the CCADB on a regular basis, that compares the root cert data in the CCADB with the Beta version of certdata.txt.
We don't yet have the tool for comparing the data in the CCADB with the data in ExtendedValidation.cpp. It's still on our to-do list.
Updated•2 years ago
|
Severity: normal → S3
You need to log in
before you can comment on or make changes to this bug.
Description
•