Skip to content
This repository has been archived by the owner on Apr 22, 2023. It is now read-only.

Add missing GlobalSign root certificate which supports more secure sha25... #8679

Closed
wants to merge 1 commit into from
Closed

Add missing GlobalSign root certificate which supports more secure sha25... #8679

wants to merge 1 commit into from

Conversation

dodtsair
Copy link

@dodtsair dodtsair commented Nov 6, 2014

...6 algorithm.

Global Sign has three relevant root certificates:

GlobalSign Root R1
GlobalSign Root R2
GlobalSign Root R3

Both R1 and R2 are present, but R3 is missing.

R3 is the more secure root certificate authority that uses SHA256 instead of the degrading SHA1. The root certificate list should be fixed to include all three Global Sign Root certificates.

See article about SHA1's degrading viability as a secure hash algorithm:
https://www.schneier.com/blog/archives/2005/02/cryptanalysis_o.html

For validation here is the source of the certificate: https://support.globalsign.com/customer/portal/articles/1426602-globalsign-root-certificates

…a256 algorithm.

Global Sign has three relevant root certificates:

GlobalSign Root R1
GlobalSign Root R2
GlobalSign Root R3

Both R1 and R2 are present, but R3 is missing.

R3 is the more secure root certificate authority that uses SHA256 instead of the degrading SHA1. The root certificate list should be fixed to include all three Global Sign Root certificates.

See article about SHA1's degrading viability as a secure hash algorithm:
https://www.schneier.com/blog/archives/2005/02/cryptanalysis_o.html

For validation here is the source of the certificate: https://support.globalsign.com/customer/portal/articles/1426602-globalsign-root-certificates
indutny added a commit to indutny/node that referenced this pull request Nov 11, 2014
NOTE:

To reproduce/update this - run:

1. `perl tools/mk-ca-bundle.perl`
2. `node tools/rebuild-root-certs.js ca-bundle.crt > src/node_root_certs.h`
3. `rm ca-bundle.crt certdata.txt`

fix nodejs#8679
indutny added a commit to indutny/node that referenced this pull request Nov 11, 2014
NOTE:

To reproduce/update this - run:

1. `perl tools/mk-ca-bundle.perl`
2. `node tools/rebuild-root-certs.js ca-bundle.crt > src/node_root_certs.h`
3. `rm ca-bundle.crt certdata.txt`

fix nodejs#8679
@indutny
Copy link
Member

indutny commented Nov 11, 2014

Sorry, but I think we should just automatically update it, since the file is automatically generated anyway. See: #8709 for details.

indutny added a commit to indutny/node that referenced this pull request Nov 11, 2014
NOTE:

To reproduce/update this - run:

1. `perl tools/mk-ca-bundle.perl`
2. `node tools/rebuild-root-certs.js ca-bundle.crt > src/node_root_certs.h`
3. `rm ca-bundle.crt certdata.txt`

fix nodejs#8679
@dodtsair
Copy link
Author

Agreed, very nice.

@dodtsair dodtsair closed this Nov 13, 2014
@dodtsair dodtsair deleted the add-globalsign-sha256 branch November 13, 2014 02:22
bnoordhuis added a commit to bnoordhuis/node that referenced this pull request Nov 14, 2014
Update tools/certdata.txt to [0] (last updated on 2014-11-14) and
rebuild src/node_root_certs.h.

Refs nodejs#8679 and nodejs#8709.

[0] https://hg.mozilla.org/mozilla-central/raw-file/64206634959a/security/nss/lib/ckfw/builtins/certdata.txt
indutny pushed a commit that referenced this pull request Dec 4, 2014
Update tools/certdata.txt to [0] (last updated on 2014-11-14) and
rebuild src/node_root_certs.h.

Refs #8679 and #8709.

[0] https://hg.mozilla.org/mozilla-central/raw-file/64206634959a/security/nss/lib/ckfw/builtins/certdata.txt
mscdex pushed a commit to mscdex/node that referenced this pull request Dec 25, 2014
Update tools/certdata.txt to [0] (last updated on 2014-11-14) and
rebuild src/node_root_certs.h.

Refs nodejs#8679 and nodejs#8709.

[0] https://hg.mozilla.org/mozilla-central/raw-file/64206634959a/security/nss/lib/ckfw/builtins/certdata.txt
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants