Hi,

>> Yes, with the second operation offline and validating against the NSS
>> root store. I don't have a MS one at the moment, it would be interesting
>> (how do you extract that from Win? The EFF guys should know)
> 
> You might look at https://www.eff.org/files/ssl-observatory-code-r1.tar_.bz2
> in the microsoft_CAs directory.

Yes, I found that, but it seemed to contain a snapshot of PEMs from the
time of the EFF crawl in 2010, so it might be outdated. I would like to
obtain a fresh copy. How did you go about it, did you compile it
manually or is there a software kind of way to extract it directly from
Windows, maybe polling MS?

Ralph

-- 
Dipl.-Inform. Ralph Holz
I8: Network Architectures and Services
Technische Universität München
http://www.net.in.tum.de/de/mitarbeiter/holz/

Attachment: signature.asc
Description: OpenPGP digital signature

_______________________________________________
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography

Reply via email to