On Wednesday, 9 November 2016 13:03:37 UTC, Gervase Markham  wrote:
> On 09/11/16 12:17, Nick Lamb wrote:
> 
> > I am not always very clear on how Censys queries work, but I believe this 
> > query is a useful starting point (within the limited context of Censys)
> > 
> > current_valid_nss: true AND (NOT parsed.extensions.extended_key_usage:1)
> 
> That query produces 8,090 results over 324 pages. Does censys.io have a
> CSV export or similar?

Censys.io has a RESTful API. They recommend using a Python library to access 
it. My Python is... crude and unidiomatic but functional - if it seems to me in 
this or some future thread that the group would benefit from a text dump of 
relevant certificates I will certainly make one.

So far in this case I think it isn't so useful so I won't do it yet.

> Am I right, though, that all such certs would be BR violations? Or is
> there something I've missed?

Yes, I think a public CA issuing a certificate for a web server or similar was 
obliged all the way from version 1 of the Baseline Requirements to add this EKU 
to the certificate. Since Firefox soon won't trust very old (SHA-1) 
certificates anyway, and has never intended to trust non-BR compliant 
Certificate Authorities such as the Federal Bridge, that seems to cover 
everything.

Isn't there still some value in estimating the impact?
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to