Hmm, Rob's reply never made it to my inbox. I'll reply to that separately now I know it's a thing.
On Thu, Dec 27, 2018 at 05:56:08PM +0900, Hector Martin 'marcan' via dev-security-policy wrote: > On 19/12/2018 20:09, Rob Stradling via dev-security-policy wrote: > > I'm wondering how I might add a pwnedkeys check to crt.sh. I think I'd > > prefer to have a table of SHA-256(SPKI) stored locally on the crt.sh DB. > > Yes, I think the right approach for an upstream source is to provide a big > list of hashes. People can then postprocess that into whatever database or > filter format they want. The reason I haven't provided that (yet) is because, unlike pwnedpasswords, the set of pwned keys increases in real-time, as my scrapers go out into the world and find more keys. Thus, a once-off dump of what's in the database today isn't going to be very useful tomorrow, or next week, or next month. I don't want to put up a dump of everything until I've got a solid mechanism for people to retrieve and load updates of the dataset. The last thing I want to do is give people any encouragement to use a stale data set. Implementation of an auto-update mechanism is on the todo list, but it's quite a bit lower down the priority list than other things, like improving key scraping, and implementing a bloom filter of keys, which I feel is more useful, because you've got to hit the API anyway to get the attestation of compromise, so something with a bit of a false-positive rate isn't a big deal. - Matt _______________________________________________ dev-security-policy mailing list dev-security-policy@lists.mozilla.org https://lists.mozilla.org/listinfo/dev-security-policy