summaryrefslogtreecommitdiff
path: root/src
Commit message (Collapse)AuthorAgeFilesLines
* Always store and return root certificate (closes CATLFISH-55).Linus Nordberg2015-08-031-8/+7
|
* Implement rate limiting of add_chainMagnus Ahltorp2015-06-123-27/+135
|
* Don't answer public requests if STH is too old or nonexistentMagnus Ahltorp2015-06-121-0/+28
|
* Remove unused temporary variable.Linus Nordberg2015-06-101-9/+7
|
* Add verification of whole entry. Implement library call for plop verification.Magnus Ahltorp2015-06-101-6/+44
|
* Fix CATLFISH-45.Linus Nordberg2015-05-111-6/+4
| | | | https://project.nordu.net/browse/CATLFISH-45
* Rename html/2 to err400/2.Linus Nordberg2015-05-061-17/+17
|
* Dialyzer clean.Linus Nordberg2015-05-063-20/+23
|
* Remove an extra annoying debug log printout.Linus Nordberg2015-04-101-3/+0
|
* Fix copyright strings.Linus Nordberg2015-04-096-6/+6
|
* Verify that database entry actually contains the certificateMagnus Ahltorp2015-04-071-3/+6
|
* Cleanup tests and use urllib2.build_openerMagnus Ahltorp2015-03-311-2/+14
| | | | | | | | | Remove unused files Generate test config files directly in release directory Move test database files to "tests" directory Generate log key when preparing tests Report error when STH not found in v1.erl Make merge, fetchallcerts, submitcert, verifysct, and testcase1 take log key as argument
* Allow non-TLS httpMagnus Ahltorp2015-03-312-17/+23
| | | | Closes CATLFISH-31
* Provide function for calculating entryhash from entryMagnus Ahltorp2015-03-271-0/+25
|
* Store rejected certificates.Linus Nordberg2015-03-251-52/+94
| | | | | | | Not storing the full chain, which would be even more useful. No rate limiting, which would be good. Also, reorganise some in x509.erl and add tests.
* Clarify that 0.test.pem is not a valid #'OTPCertificate'{}.Linus Nordberg2015-03-241-14/+14
| | | | Also some cosmetic changes.
* Add spec's for most functions.Linus Nordberg2015-03-232-11/+9
| | | | NOTE: We're not dialyzer clean yet.
* Formatting; remove debug printouts.Linus Nordberg2015-03-232-49/+21
|
* Add precert handling.Linus Nordberg2015-03-233-160/+382
|
* Cache SCT:sMagnus Ahltorp2015-03-081-12/+31
|
* Save STH instead of calculating a new one each time.Magnus Ahltorp2015-03-041-10/+2
|
* Added authentication between frontend and storage nodesMagnus Ahltorp2015-02-271-4/+28
|
* Fix a bug where verification of EC signatures made us crash.Linus Nordberg2015-02-271-33/+40
| | | | | Also, have valid_chain_p return boolean, add some debug logging and detect invalid signature types instead of crashing.
* Verify that known roots are indeed signing themselves.Linus Nordberg2015-02-272-22/+52
| | | | | | | This filters out certificates with signing algorithms that we can't handle. Also, make unit tests better.
* Even more debug logging.Linus Nordberg2015-02-251-0/+3
|
* Add debug logging.Linus Nordberg2015-02-251-0/+5
| | | | Trying to figure out why public_key:verify isn't found in docker images.
* Log time spent serving a requestMagnus Ahltorp2015-02-201-0/+3
|
* Make mochiweb pool size configurableMagnus Ahltorp2015-02-201-0/+1
|
* Stop validating that cert.issuer matches issuer.subject.Linus Nordberg2015-02-201-46/+27
| | | | | | | | | | Even canoncalized versions of this data mismatch in otherwise proper chains. Since we're not here to validate chains for any other reasons than attribution and spam control, let's stop validate cert.issuer==candidate.subject. We still verify the cryptographic chain with signatures of tbsCertificates of course. Resolves CATLFISH-19.
* Make unit tests work again.Linus Nordberg2015-02-194-28/+32
| | | | Makefile target 'check' runs them.
* Verify certificates by decoding them as 'plain' certs rather than 'otp.Linus Nordberg2014-11-182-67/+201
| | | | | | | OTP cert validation is too strict. Let's see if this is forgiving enough for our needs. Also, move all cert reading from disk to x509.erl.
* Entry hash runs over leaf plus chain.Linus Nordberg2014-11-181-2/+2
| | | | Closes CATLFISH-5.
* Log some info about certs that don't parse and why.Linus Nordberg2014-11-052-11/+27
| | | | Also move x509 specific code to the x509 module.
* Rewrite root certificate cache handlingMagnus Ahltorp2014-10-263-18/+30
|
* Stop using jiffyMagnus Ahltorp2014-10-252-121/+107
|
* Move internal HTTP APIs to mochiweb.Magnus Ahltorp2014-10-252-8/+8
|
* Whitespace.Linus Nordberg2014-10-241-16/+19
| | | | No long lines.
* Use 'cacertfile' configuration.Linus Nordberg2014-10-241-1/+2
|
* Catch badly ASN.1-encoded certificates.Linus Nordberg2014-10-242-18/+31
| | | | | | Now not crashing badly encoded certs in the list of known roots, which is good. They're simply ignored. Next step is to figure out if we should accept some anomalies, due to reality.
* Use mochiweb for v1 APIMagnus Ahltorp2014-10-244-56/+123
| | | | | | Conflicts: catlfish.config src/v1.erl
* Merge branch 'validate-certchain' into staging1Linus Nordberg2014-10-244-2/+371
|\ | | | | | | | | Conflicts: src/catlfish.erl
| * Log (info) when adding and rejecting a certificate chain.validate-certchainLinus Nordberg2014-10-232-1/+9
| | | | | | | | Writing to stdout for now, until we've decided on logging framework.
| * Split CertChain properly.Linus Nordberg2014-10-231-1/+1
| | | | | | | | This way, Chain is always a list.
| * Don't use der_encoded().Linus Nordberg2014-10-231-6/+5
| | | | | | | | | | The type definition seem to have disappeared from public_key.hrl in R17 and I don't know how to conditionally define a type.
| * Implement cert chain validation.Linus Nordberg2014-10-224-2/+364
| | | | | | | | NOTE: Presence of and constraints on names are not being validated.
* | Break include dependency on plop.hrlMagnus Ahltorp2014-10-242-8/+4
| |
* | Add copyright and licensing information.copyrightLinus Nordberg2014-10-151-0/+3
|/ | | | After offline discussions with Magnus Ahltorp.
* Fix bug in get-entries limitation of entries.Linus Nordberg2014-10-101-2/+1
|
* Use proper return value format for plop:inclusion_and_entry().Linus Nordberg2014-10-101-1/+1
|
* Limit get-entries to 1000 entries at the time.Linus Nordberg2014-10-091-3/+2
|