Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Support verifying TLSA for RSA and ECDSA certificates, when a server offers both #5

Open
dilyanpalauzov opened this issue Nov 3, 2019 · 0 comments

Comments

@dilyanpalauzov
Copy link

README.md says: testing ECDSA in preference to RSA is typically a feature, not a bug.

Note that recently https://github.com/matteocorti/check_ssl_cert got support to check for valid “3 0 1”, “3 0 2”, “3 1 1” and “2 1 1” records for RSA and EC signature types. This means it can verify, that there is valid a TLSA “3 0 2” record for a TLS connection, when a RSA certificate is requested and obtained and (with different command line parameters) verify that there is a valid “3 1 1” TLSA record for the same destination, when ECDSA certificate is requested and obtained (and also verify any other combination of RSA/ECDSA/any + 301/311/302/211/any).

While testing explicitly by danecheck for RSA over ECDSA can be called a lacking feature, for monitoring TLSA https://github.com/matteocorti/check_ssl_cert is more feature-rich. In pure theory, the lack of possibility to monitor TLSA records differentially for RSA and ECDSA in danecheck, could prevent somebody to offer two types of certificates.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant