forked from I2P_Developers/i2p.i2p
Block DSDTestProvider CA cert
This commit is contained in:
@ -40,7 +40,8 @@ public class KeyStoreUtil {
|
|||||||
private static final int DEFAULT_KEY_VALID_DAYS = 3652; // 10 years
|
private static final int DEFAULT_KEY_VALID_DAYS = 3652; // 10 years
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* No reports of these in a Java keystore but just to be safe...
|
* No reports of some of these in a Java keystore but just to be safe...
|
||||||
|
* CNNIC ones are in Ubuntu keystore.
|
||||||
*/
|
*/
|
||||||
private static final BigInteger[] BLACKLIST_SERIAL = new BigInteger[] {
|
private static final BigInteger[] BLACKLIST_SERIAL = new BigInteger[] {
|
||||||
// CNNIC https://googleonlinesecurity.blogspot.com/2015/03/maintaining-digital-certificate-security.html
|
// CNNIC https://googleonlinesecurity.blogspot.com/2015/03/maintaining-digital-certificate-security.html
|
||||||
@ -50,7 +51,11 @@ public class KeyStoreUtil {
|
|||||||
// Superfish http://blog.erratasec.com/2015/02/extracting-superfish-certificate.html
|
// Superfish http://blog.erratasec.com/2015/02/extracting-superfish-certificate.html
|
||||||
new BigInteger("d2:fc:13:87:a9:44:dc:e7".replace(":", ""), 16),
|
new BigInteger("d2:fc:13:87:a9:44:dc:e7".replace(":", ""), 16),
|
||||||
// eDellRoot https://www.reddit.com/r/technology/comments/3twmfv/dell_ships_laptops_with_rogue_root_ca_exactly/
|
// eDellRoot https://www.reddit.com/r/technology/comments/3twmfv/dell_ships_laptops_with_rogue_root_ca_exactly/
|
||||||
new BigInteger("6b:c5:7b:95:18:93:aa:97:4b:62:4a:c0:88:fc:3b:b6".replace(":", ""), 16)
|
new BigInteger("6b:c5:7b:95:18:93:aa:97:4b:62:4a:c0:88:fc:3b:b6".replace(":", ""), 16),
|
||||||
|
// DSDTestProvider https://blog.hboeck.de/archives/876-Superfish-2.0-Dangerous-Certificate-on-Dell-Laptops-breaks-encrypted-HTTPS-Connections.html
|
||||||
|
// serial number is actually negative; hex string as reported by certtool below
|
||||||
|
//new BigInteger("a4:4c:38:47:f8:ee:71:80:43:4d:b1:80:b9:a7:e9:62".replace(":", ""), 16)
|
||||||
|
new BigInteger("-5b:b3:c7:b8:07:11:8e:7f:bc:b2:4e:7f:46:58:16:9e".replace(":", ""), 16)
|
||||||
};
|
};
|
||||||
|
|
||||||
/**
|
/**
|
||||||
@ -63,7 +68,8 @@ public class KeyStoreUtil {
|
|||||||
"CNNIC ROOT",
|
"CNNIC ROOT",
|
||||||
"China Internet Network Information Center EV Certificates Root",
|
"China Internet Network Information Center EV Certificates Root",
|
||||||
"Superfish, Inc.",
|
"Superfish, Inc.",
|
||||||
"eDellRoot"
|
"eDellRoot",
|
||||||
|
"DSDTestProvider"
|
||||||
};
|
};
|
||||||
|
|
||||||
/**
|
/**
|
||||||
@ -318,6 +324,7 @@ public class KeyStoreUtil {
|
|||||||
X509Certificate cert = (X509Certificate)cf.generateCertificate(fis);
|
X509Certificate cert = (X509Certificate)cf.generateCertificate(fis);
|
||||||
info("Read X509 Certificate from " + file.getAbsolutePath() +
|
info("Read X509 Certificate from " + file.getAbsolutePath() +
|
||||||
" Issuer: " + cert.getIssuerX500Principal() +
|
" Issuer: " + cert.getIssuerX500Principal() +
|
||||||
|
" Serial: " + cert.getSerialNumber().toString(16) +
|
||||||
"; Valid From: " + cert.getNotBefore() +
|
"; Valid From: " + cert.getNotBefore() +
|
||||||
" To: " + cert.getNotAfter());
|
" To: " + cert.getNotAfter());
|
||||||
try {
|
try {
|
||||||
|
Reference in New Issue
Block a user