-
Notifications
You must be signed in to change notification settings - Fork 384
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Can't detect multiple certificates #208
Comments
Hi @agrandville, This is an interesting idea - I've seen a few sites that have multiple certificates like this, so it would be nice to have some detection for that. However, we need to think about how we can display that (the certificate display is already very verbose, and returning multiple certificates is a breaking change to the XML). In terms of scanning, I guess this would have to sit in the loop where we detect which signature algorithms the server supports, although this would be made more complicated by servers that claim to support arbitrary algorithms. So maybe it would have to be in a separate loop... @jtesta what are your thoughts on this? |
I think the user should be given maximum information by default. Then
if they feel like they'd rather have less, they can use the right args
to cut the output down. If we need to update the XML schema, then so be it.
In terms of an implementation, perhaps we could do the signature
algorithm enumeration first, build a list that's been accepted, then use
it to request certificates. So if the server accepts RSA and ECDSA sig
algs, later request one RSA certificate and one ECDSA certificate (just
like @agrandville is doing with the openssl command line tool).
|
@jtesta one potential issue with using a list of accepted algorithms is that if the server accepts the bogus one, then not further testing is carried out for them - so we'd either always have to run the full test, or have a default list to try in that case. If the XML change is going to happen then that should be before version 2.0 gets released properly, and hopefully it won't break too much stuff. |
The XML schema can be changed quickly before we add the certificate
enumeration code. In the short term, it'll only report one certificate
like before, but force users to assume there may be more.
For example, add a "<certificates>" block with a single "<certificate
subject='blah' [...]>" entry in it (or however it works at the moment...).
…--
Joseph S. Testa II
Founder & Principal Security Consultant
Positron Security
|
That's a fair point. Actually, looking at the current code, you can already get multiple That should probably be cleaned up, and the |
One option is to add a comment in the XML to warn users that multiple
certs are possible. Like:
<certificates>
<!-- Warning: more than one certificate may be returned here. Do
not assume that only one will be present. -->
<certificate [...]>
</certificates>
It won't help with existing implementations until a human looks at the
XML, but they might be forced to do that with the changes in v2.0 anyway...
|
To be honest, it's not a huge deal if we change the XML a bit for 2.0 (especially given it's a bit dodgy at the moment). I'll look at adding the |
For performance improvement some sites let client choose which signature algorithm they want to use (mainly RSA or ECDSA).
eg: www.google.com
wouldn't it more accurate to show all certificates when
--show-certificate(s)
is requested ?The text was updated successfully, but these errors were encountered: