diff --git a/core/java/src/net/i2p/crypto/KeyStoreUtil.java b/core/java/src/net/i2p/crypto/KeyStoreUtil.java index fe65a7afb057fc8fe625ed0dbaeebbae6fb2d894..53fd9de1954da3acdbfcc35e5b8281a8090eb719 100644 --- a/core/java/src/net/i2p/crypto/KeyStoreUtil.java +++ b/core/java/src/net/i2p/crypto/KeyStoreUtil.java @@ -54,23 +54,47 @@ public class KeyStoreUtil { // DSDTestProvider https://blog.hboeck.de/archives/876-Superfish-2.0-Dangerous-Certificate-on-Dell-Laptops-breaks-encrypted-HTTPS-Connections.html // serial number is actually negative; hex string as reported by certtool below //new BigInteger("a4:4c:38:47:f8:ee:71:80:43:4d:b1:80:b9:a7:e9:62".replace(":", ""), 16) - new BigInteger("-5b:b3:c7:b8:07:11:8e:7f:bc:b2:4e:7f:46:58:16:9e".replace(":", ""), 16) + new BigInteger("-5b:b3:c7:b8:07:11:8e:7f:bc:b2:4e:7f:46:58:16:9e".replace(":", ""), 16), + // Verisign G1 Roots + // https://googleonlinesecurity.blogspot.com/2015/12/proactive-measures-in-digital.html + // https://knowledge.symantec.com/support/ssl-certificates-support/index?page=content&id=ALERT1941 + // SHA-1 + new BigInteger("3c:91:31:cb:1f:f6:d0:1b:0e:9a:b8:d0:44:bf:12:be".replace(":", ""), 16), + // MD2 + new BigInteger("70:ba:e4:1d:10:d9:29:34:b6:38:ca:7b:03:cc:ba:bf".replace(":", ""), 16) }; /** * Corresponding issuer CN for the serial number. * Must be same number of entries as BLACKLIST_SERIAL. - * See removeBlacklistedCerts() below for alternatives if we want - * to blacklist a cert without an issuer CN. + * Either CN or OU must be non-null */ private static final String[] BLACKLIST_ISSUER_CN = new String[] { "CNNIC ROOT", "China Internet Network Information Center EV Certificates Root", "Superfish, Inc.", "eDellRoot", - "DSDTestProvider" + "DSDTestProvider", + null, + null }; + /** + * Corresponding issuer OU for the serial number. + * Must be same number of entries as BLACKLIST_SERIAL. + * Either CN or OU must be non-null + */ + private static final String[] BLACKLIST_ISSUER_OU = new String[] { + null, + null, + null, + null, + null, + "Class 3 Public Primary Certification Authority", + "Class 3 Public Primary Certification Authority" + }; + + /** * Create a new KeyStore object, and load it from ksFile if it is * non-null and it exists. @@ -227,12 +251,10 @@ public class KeyStoreUtil { * @since 0.9.24 */ private static int removeBlacklistedCerts(KeyStore ks) { - // This matches on the CN in the issuer, + // This matches on the CN or OU in the issuer, // and we can't do that on Android. - // We could just match the whole string, and we will have to - // if we want do it on Android or match a cert that has an issuer without a CN. - // Or, most certs that don't have a CN have an OU, that could be a fallback. - // Or do sha1hash(cert.getEncoded()) but that would be slower. + // Alternative is sha1hash(cert.getEncoded()) but that would be slower, + // unless the blacklist gets a little longer. if (SystemVersion.isAndroid()) return 0; int count = 0; @@ -244,22 +266,39 @@ public class KeyStoreUtil { if (c != null && (c instanceof X509Certificate)) { X509Certificate xc = (X509Certificate) c; BigInteger serial = xc.getSerialNumber(); + // debug: + //String xname = CertUtil.getIssuerValue(xc, "CN"); + //info("Found \"" + xname + "\" s/n: " + serial.toString(16)); + //if (xname == null) + // info("name is null, full issuer: " + xc.getIssuerX500Principal().getName()); for (int i = 0; i < BLACKLIST_SERIAL.length; i++) { - // debug: - //String xname = CertUtil.getIssuerValue(xc, "CN"); - //info("Found \"" + xname + "\" s/n: " + serial.toString(16)); - //if (xname == null) - // info("name is null, full issuer: " + xc.getIssuerX500Principal().getName()); if (BLACKLIST_SERIAL[i].equals(serial)) { - String name = CertUtil.getIssuerValue(xc, "CN"); - if (BLACKLIST_ISSUER_CN[i].equals(name)) { - ks.deleteEntry(alias); - count++; - if (!_blacklistLogged) { - // should this be a logAlways? - warn("Ignoring blacklisted certificate \"" + alias + - "\" issued by: \"" + name + - "\" s/n: " + serial.toString(16), null); + if (BLACKLIST_ISSUER_CN[i] != null) { + String name = CertUtil.getIssuerValue(xc, "CN"); + if (BLACKLIST_ISSUER_CN[i].equals(name)) { + ks.deleteEntry(alias); + count++; + if (!_blacklistLogged) { + // should this be a logAlways? + warn("Ignoring blacklisted certificate \"" + alias + + "\" CN: \"" + name + + "\" s/n: " + serial.toString(16), null); + } + break; + } + } + if (BLACKLIST_ISSUER_OU[i] != null) { + String name = CertUtil.getIssuerValue(xc, "OU"); + if (BLACKLIST_ISSUER_OU[i].equals(name)) { + ks.deleteEntry(alias); + count++; + if (!_blacklistLogged) { + // should this be a logAlways? + warn("Ignoring blacklisted certificate \"" + alias + + "\" OU: \"" + name + + "\" s/n: " + serial.toString(16), null); + } + break; } } } @@ -593,6 +632,11 @@ public class KeyStoreUtil { l.log(level, msg, t); } + /** + * Usage: KeyStoreUtil (loads from system keystore) + * KeyStoreUtil foo.ks (loads from system keystore, and from foo.ks keystore if exists, else creates empty) + * KeyStoreUtil certDir (loads from system keystore and all certs in certDir if exists) + */ /**** public static void main(String[] args) { File ksf = (args.length > 0) ? new File(args[0]) : null;