Index: net/data/ssl/symantec/README.md |
diff --git a/net/data/ssl/symantec/README.md b/net/data/ssl/symantec/README.md |
new file mode 100644 |
index 0000000000000000000000000000000000000000..963c1a9ab34518f098c1036b8e8b0086e746e1ca |
--- /dev/null |
+++ b/net/data/ssl/symantec/README.md |
@@ -0,0 +1,52 @@ |
+# Symantec Certificates |
+ |
+This directory contains the set of known active and legacy root certificates |
+operated by Symantec Corporation. In order for certificates issued from |
+roots to be trusted, it is required that the certificates be logged using |
+Certificate Transparency. |
+ |
+For details about why, see <https://security.googleblog.com/2015/10/sustaining-digital-certificate-security.html> |
eroman
2016/06/29 23:22:21
Here you are using the <...> notation, whereas in
Ryan Sleevi
2016/06/30 00:03:20
Yeah, Markdown syntax (which is why I fixed the bl
|
+ |
+The exception to this is sub-CAs which have been disclosed as independently |
+operated, whose keys are not in control of Symantec, and which are maintaining |
+a current and appropriate audit. |
+ |
+## Roots |
+ |
+The full set of roots are in the [roots/](roots/) directory, organized by SHA-256 hash of the certificate file. |
eroman
2016/06/29 23:22:21
nit: The above lines look to be wrapped, whereas t
|
+ |
+The following command can be used to match certificates and their key hashes: |
+ |
+`` for f in roots/*.pem; do openssl x509 -noout -pubkey -in "${f}" | openssl asn1parse -inform pem -out /tmp/pubkey.out -noout; digest=`cat /tmp/pubkey.out | openssl dgst -sha256 -c | awk -F " " '{print $2}' | sed s/:/,0x/g `; echo "0x${digest} ${f##*/}"; done | sort `` |
+ |
+## Excluded Sub-CAs |
+ |
+### Aetna |
+ |
Ryan Sleevi
2016/06/29 22:03:25
Symantec has sent the audit details directly, beca
|
+[Certification Practices Statement](http://crl.aetna.com/aetnacps.pdf) |
+Note: Not issuing new certificates and can be removed after October 2016. |
+ |
+ * [d6e4e7b9af3bd5a8f2d6321cde26639c25644f7307ce16aad347d9ad53d3ce13.pem](excluded/d6e4e7b9af3bd5a8f2d6321cde26639c25644f7307ce16aad347d9ad53d3ce13.pem) |
+ |
+### Apple |
+ |
Ryan Sleevi
2016/06/29 22:03:25
Yes, the omission of IST 1 and IST 3 are intention
|
+[WebTrust Audit](https://cert.webtrust.org/ViewSeal?id=1917) |
+[Certification Practices Statement](http://images.apple.com/certificateauthority/pdf/Apple_IST_CPS_v2.0.pdf) |
+ |
+ * [17f96609ac6ad0a2d6ab0a21b2d1b5b2946bd04dbf120703d1def6fb62f4b661.pem](excluded/17f96609ac6ad0a2d6ab0a21b2d1b5b2946bd04dbf120703d1def6fb62f4b661.pem) |
+ * [3db76d1dd7d3a759dccc3f8fa7f68675c080cb095e4881063a6b850fdd68b8bc.pem](excluded/3db76d1dd7d3a759dccc3f8fa7f68675c080cb095e4881063a6b850fdd68b8bc.pem) |
+ * [6115f06a338a649e61585210e76f2ece3989bca65a62b066040cd7c5f408edd0.pem](excluded/6115f06a338a649e61585210e76f2ece3989bca65a62b066040cd7c5f408edd0.pem) |
+ * [904fb5a437754b1b32b80ebae7416db63d05f56a9939720b7c8e3dcc54f6a3d1.pem](excluded/904fb5a437754b1b32b80ebae7416db63d05f56a9939720b7c8e3dcc54f6a3d1.pem) |
+ * [ac2b922ecfd5e01711772fea8ed372de9d1e2245fce3f57a9cdbec77296a424b.pem](excluded/ac2b922ecfd5e01711772fea8ed372de9d1e2245fce3f57a9cdbec77296a424b.pem) |
+ |
+ |
+[WebTrust Audit](https://cert.webtrust.org/ViewSeal?id=1941) |
+[Certification Practices Statement](http://static.googleusercontent.com/media/pki.google.com/en//GIAG2-CPS-1.3.pdf) |
+ |
+ * [c3f697a92a293d86f9a3ee7ccb970e20e0050b8728cc83ed1b996ce9005d4c36.pem](excluded/c3f697a92a293d86f9a3ee7ccb970e20e0050b8728cc83ed1b996ce9005d4c36.pem) |
+ |
+### Unicredit |
+ |
Ryan Sleevi
2016/06/29 22:03:25
CPS & audit are still forthcoming; this may not ma
|
+ * [8c31013d19f8eea618c95fda6d21f5777c6e930c7413031559ee863d78dfe809.pem](excluded/8c31013d19f8eea618c95fda6d21f5777c6e930c7413031559ee863d78dfe809.pem) |
+ |