Skip to content

Commit ad44f7d

Browse files
committed
Update CA root stores
1 parent e9c0beb commit ad44f7d

File tree

7 files changed

+5724
-5765
lines changed

7 files changed

+5724
-5765
lines changed

etc/Apple.pem

Lines changed: 3426 additions & 3457 deletions
Large diffs are not rendered by default.

etc/DST Root CA X3.txt

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,3 @@
1-
DST Root CA X3
2-
31
-----BEGIN CERTIFICATE-----
42
MIIDSjCCAjKgAwIBAgIQRK+wgNajJ7qJMDmGLvhAazANBgkqhkiG9w0BAQUFADA/
53
MSQwIgYDVQQKExtEaWdpdGFsIFNpZ25hdHVyZSBUcnVzdCBDby4xFzAVBgNVBAMT
@@ -19,4 +17,4 @@ AvHRAosZy5Q6XkjEGB5YGV8eAlrwDPGxrancWYaLbumR9YbK+rlmM6pZW87ipxZz
1917
R8srzJmwN0jP41ZL9c8PDHIyh8bwRLtTcm1D9SZImlJnt1ir/md2cXjbDaJWFBM5
2018
JDGFoqgCWjBH4d1QB7wCCZAA62RjYJsWvIjJEubSfZGL+T0yjWW06XyxV3bqxbYo
2119
Ob8VZRzI9neWagqNdwvYkQsEjgfbKbYK7p2CNTUQ
22-
-----END CERTIFICATE----
20+
-----END CERTIFICATE-----

etc/Java.pem

Lines changed: 3 additions & 270 deletions
Large diffs are not rendered by default.

etc/Linux.pem

Lines changed: 1842 additions & 1823 deletions
Large diffs are not rendered by default.

etc/Microsoft.pem

Lines changed: 263 additions & 48 deletions
Large diffs are not rendered by default.

etc/Mozilla.pem

Lines changed: 185 additions & 160 deletions
Large diffs are not rendered by default.

etc/README.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -5,8 +5,8 @@ The certificate trust stores were retrieved from
55

66
* **Linux:** Copied from an up-to-date Debian Linux machine
77
* **Mozilla:** https://curl.haxx.se/docs/caextract.html
8-
* **Java:** extracted (``keytool -list -rfc -keystore lib/security/cacerts | grep -E -v '^$|^\*\*\*\*\*|^Entry |^Creation |^Alias '``) from a JDK LTS version from https://jdk.java.net/. (use dos2unix).
9-
* **Microsoft:** Following command pulls all certificates from Windows Update services: ``CertUtil -syncWithWU -f -f . `` (see also http://aka.ms/RootCertDownload, https://technet.microsoft.com/en-us/library/dn265983(v=ws.11).aspx#BKMK_CertUtilOptions). They are in DER format. Convert them like ``for f in *.cer; do echo $f >/dev/stderr; openssl x509 -in $f -inform DER -outform PEM ;done >/tmp/Microsoft.pem``
8+
* **Java:** extracted (``keytool -list -rfc -keystore lib/security/cacerts | grep -E -v '^$|^\*\*\*\*\*|^Entry |^Creation |^Alias '``) from a JDK LTS version from https://jdk.java.net/. Use dos2unix for the store which you generated.
9+
* **Microsoft:** Following command pulls all certificates from Windows Update services: ``CertUtil -syncWithWU -f -f . `` (see also http://aka.ms/RootCertDownload, https://technet.microsoft.com/en-us/library/dn265983(v=ws.11).aspx#BKMK_CertUtilOptions). They are in DER format. Convert them like ``for f in *.crt; do echo $f >/dev/stderr; openssl x509 -in $f -inform DER -outform PEM ;done >/tmp/Microsoft.pem``
1010
* **Apple:**
1111
1. __System:__ from Apple OS X keychain app. Open Keychain Access utility, i.e.
1212
In the Finder window, under Favorites --> "Applications" --> "Utilities"
@@ -16,7 +16,7 @@ The certificate trust stores were retrieved from
1616
Select all CA certificates except for "Developer ID Certification Authority", omit expired ones, "File" --> "Export Items"
1717
2. __Internet:__ Pick the latest subdir (=highest number) from https://opensource.apple.com/source/security_certificates/. They are in all DER format despite their file extension. Download them with ``wget --level=1 --cut-dirs=5 --mirror --convert-links --adjust-extension --page-requisites --no-parent https://opensource.apple.com/source/security_certificates/security_certificates-<latest>/certificates/roots/``. Then: ``for f in *.cer *.der *.crt; do echo $f >/dev/stderr; openssl x509 -in $f -inform DER -outform PEM ;done >/tmp/Apple.pem``
1818

19-
**Attention**: You need to remove the DST Root CA X3 which is for your reference in this directory.
19+
**ATTENTION**: From each store you need to remove the _DST Root CA X3_ which is for your reference in this directory. See file ``DST Root CA X3.txt`` in this directory. Apple's file name is ``IdenTrust_Root_X3.der``. For the Microsoft store you have to identify the file beforehand like `` for f in *.crt; do echo $f >/dev/stderr; openssl x509 -in $f -inform DER -text -noout | grep DST ;done``
2020

2121
Google Chromium uses basically the trust stores above, see https://www.chromium.org/Home/chromium-security/root-ca-policy.
2222

@@ -36,6 +36,6 @@ If you want to check trust against e.g. a company internal CA you need to use ``
3636

3737
* ``common-primes.txt`` is used for LOGJAM and the PFS section
3838

39-
* ``client-simulation.txt`` / ``client-simulation.wiresharked.txt`` are as the names indicate data for the client simulation.
39+
* ``client-simulation.txt`` / ``client-simulation.wiresharked.txt`` are -- as the names indicate -- data for the client simulation.
4040
The first one is derived from ``~/utils/update_client_sim_data.pl``, and manually edited to sort and label those we don't want.
4141
The second file provides more client data retrieved from wireshark captures and some instructions how to do that yourself.

0 commit comments

Comments
 (0)