Commit Graph

3094 Commits

Author SHA1 Message Date
Jeff Hodges 1535131d61 Merge branch 'master' into objdir_for_1.6 2016-02-09 11:54:36 -08:00
Jeff Hodges f7ea0290fa use absolute GOBIN path for Go 1.6 2016-02-09 11:53:47 -08:00
Jeff Hodges 7a4c0186d7 Merge pull request #1467 from letsencrypt/drop-ocspresponses
Remove checking of ocspResponses table
2016-02-09 11:18:24 -08:00
Jacob Hoffman-Andrews 0fda27e15a Remove checking of ocspResponses table.
We now use the certificateStatus table.
2016-02-09 10:36:41 -08:00
Roland Bracewell Shoemaker 044cb83291 Merge pull request #1397 from hlandauf/update-deps
Update vendorized cfssl (OCSP extension support)
2016-02-09 10:14:01 -08:00
Hugo Landau d21f6e3d21 Update vendorized cfssl (OCSP extension support)
Since CFSSL now supports OCSP extensions, it should be updated in
preparation for OCSP SCT stapling. Also updates CFSSL dependency
golang.org/x/crypto, including golang.org/x/crypto/ocsp.

Mocks updated to reflect interface change in cfssl.
2016-02-07 12:14:59 +00:00
Ricardo Padilha 68bcee105c publicsuffix: update table to latest list from publicsuffix.org on 2016-01-30
This update comes from this lineage:

- https://github.com/publicsuffix/list:
  24caf4f72bf42a87559685e7211796c94855a90c
- https://go-review.googlesource.com/#/c/19140/:
  6c581b96a7d38dd755f986fcf4f29665597694c0
- https://github.com/letsencrypt/net:
  7eb31e4ef6d2609d3ef5597cbc65cb68c8027f62

Changelog:
- Godeps.json: replaced commit id with 7eb31e4
- _workspace/src/...suffix/table.go: copied from letsencrypt/net@7eb31e4
2016-02-04 08:08:24 -08:00
Jeff Hodges 8237a133c4 Merge pull request #1459 from letsencrypt/ignore_testdata
ignore the cmd/testdata dir in the Makefile
2016-02-02 13:49:21 -08:00
Jeff Hodges b3ac3ccf94 ignore the cmd/testdata dir in the Makefile
testdata won't ever be producing a binary, and "testdata" is a fairly
common name to find in Go projects for the tests to use, so just ignore it.
2016-02-02 13:42:07 -08:00
Roland Bracewell Shoemaker e3922d20b2 Merge pull request #1450 from jmhodges/httpmon_handler
make HTTPMonitor a http.Handler
2016-02-02 13:38:32 -08:00
Jeff Hodges 57b6dd5bb5 make HTTPMonitor a http.Handler 2016-02-01 22:01:21 -08:00
Jacob Hoffman-Andrews ba3763e398 Merge pull request #1451 from letsencrypt/delete_foreign_key_fix
ignore foreign key constraints when clearing tables
2016-02-01 20:58:58 -08:00
Jeff Hodges 6db612ce30 ignore foreign key constraints when clearing tables 2016-02-01 20:16:47 -08:00
Jacob Hoffman-Andrews 031d2f9663 Merge pull request #1449 from letsencrypt/ocsp_response_200
ocsp-responder: 200 on GET /
2016-02-01 20:12:30 -08:00
Jeff Hodges c156f99106 ocsp-responder: 200 on GET /
Some stat services, we believe, are saying the ocsp-responder is down
because / returns 400 Bad Request currently.

Shuffle some code into a new `mux` function to make it easier to test.
2016-02-01 20:03:45 -08:00
Jeff Hodges ee26b8b6de Merge pull request #1327 from letsencrypt/more-revoker
Add revoke auths by domain to admin-revoker
2016-02-01 15:45:15 -08:00
Roland Shoemaker c3a6a837a4 Merge branch 'master' into more-revoker 2016-02-01 15:38:05 -08:00
Roland Shoemaker 7cafa4567f Review fixes 2016-02-01 15:37:21 -08:00
Hugo Landau ea9853a35b Remove issuewild support from CAA patch 2016-01-31 02:01:34 +00:00
Hugo Landau 4f27c24cf3 Make CAA checking more compliant with the RFC; CAA refactoring
The CAA response checking method has been refactored to have a
easier to follow straight-line control flow. Several bugs in it have
been fixed:

  - Firstly, parameters for issue and issuewild directives were not
    parsed, so any attempt to specify parameters would result in
    a string mismatch with the CA CAA identity (e.g. "letsencrypt.org").
    Moreover, the syntax as specified permits leading and trailing
    whitespace, so a parameter-free record such as
    "  letsencrypt.org ;  " would not be considered a match.

    This has been fixed by stripping whitespace and parameters. The RFC
    does not specify the criticality of parameters, so unknown
    parameters (currently all parameters) are considered noncritical.
    I justify this as follows:

    If someone decides to nominate a CA in a CAA record, they can,
    with trivial research, determine what parameters, if any, that
    CA supports, and presumably in trusting them in the first place
    is able to adequately trust that the CA will continue to support
    those parameters. The risk from other CAs is zero because other CAs
    do not process the parameters because the records in which they
    appear they do not relate to them.

  - Previously, all of the flag bits were considered to effectively mean
    'critical'. However, the RFC specifies that all bits except for the
    actual critical bit (decimal 128) should be ignored. In practice,
    many people have misunderstood the RFC to mean that the critical bit
    is decimal 1, so both bits are interpreted to mean 'critical', but
    this change ignores all of the other bits. This ensures that the
    remaining six bits are reasonably usable for future standards action
    if any need should arise.

  - Previously, existence of an "issue" directive but no "issuewild"
    directive was essentially equivalent to an unsatisfiable "issuewild"
    directive, meaning that no wildcard identifiers could pass the CAA
    check. This is contrary to the RFC, which states that issuewild
    should default to what is specified for "issue" if no issuewild
    directives are specified. (This is somewhat moot since boulder
    doesn't currently support wildcard issuance.)

  - Conversely, existence of an "issuewild" directive but no "issue"
    directive would cause CAA validation for a non-wildcard identifier
    to fail, which was contrary to the RFC. This has been fixed.

  - More generally, existence of any unknown non-critical directive, say
    "foobar", would cause the CAA checking code to act as though an
    unsatisfiable "issue" directive existed, preventing any issuance.
    This has been fixed.

Test coverage for corner cases is enhanced and provides regression
testing for these bugs.

statsd statistics have been added for tracking the relative frequency
of occurrence of different CAA features and outcomes. I added these on
a whim suspecting that they may be of interest.

Fixes #1436.
2016-01-31 01:51:28 +00:00
bifurcation 1ec567e1bb Merge branch 'master' into must-staple 2016-01-29 10:09:52 -05:00
Jeff Hodges e0bfb710b9 Merge pull request #1445 from letsencrypt/contributing
Remove GA note from CONTRIBUTING.md.
2016-01-28 16:41:55 -08:00
Jacob Hoffman-Andrews 8f179c0d9a Remove GA note from CONTRIBUTING.md. 2016-01-28 16:32:08 -08:00
bifurcation 4157112974 Merge branch 'master' into must-staple 2016-01-28 15:28:21 -05:00
Jeff Hodges f6794db9a7 Merge pull request #1441 from letsencrypt/no-final-hyphen
Reject final "-" in DNS label.
2016-01-28 11:16:34 -08:00
Jacob Hoffman-Andrews cecb4d08e9 Reject final "-" in DNS label. 2016-01-28 11:08:10 -08:00
Jacob Hoffman-Andrews 5c8ef56c37 Merge pull request #1423 from letsencrypt/dedup_reg_email_templates
dedup emails sent to same reg in given batch
2016-01-28 10:54:58 -08:00
Jeff Hodges 8e8161f94b dedup emails sent to same reg in given batch
This deduplicates the certificate expiration emails sent to a given
registration in a given batch defined by the Mailer.CertLimit option.

Fixes #1358.
2016-01-27 20:39:52 -08:00
bifurcation d9fdfac666 Merge branch 'master' into must-staple 2016-01-27 23:28:00 -05:00
Jeff Hodges e23cf3991e Merge pull request #1430 from letsencrypt/caa-flag-fix
Remove incorrect CAA critical flag check
2016-01-27 20:01:10 -08:00
Roland Shoemaker 82c7d0b7a5 Merge branch 'caa-flag-fix' of github.com:letsencrypt/boulder into caa-flag-fix 2016-01-27 14:15:26 -08:00
Roland Shoemaker d5d4795626 Fix mock CAA response in test 2016-01-27 14:15:16 -08:00
Roland Shoemaker aa58556605 Remove comment 2016-01-27 14:04:55 -08:00
Jeff Hodges cb8085541e Merge branch 'master' into more-revoker 2016-01-27 13:57:55 -08:00
Jeff Hodges 1c8c05053a Merge branch 'master' into caa-flag-fix 2016-01-27 13:57:33 -08:00
Roland Shoemaker 7ea91448e4 Merge branch 'master' into more-revoker 2016-01-27 13:51:36 -08:00
Roland Shoemaker 56f5cfeb4a Review fixes 2016-01-27 13:50:45 -08:00
bifurcation 0afa843317 Merge branch 'master' into must-staple 2016-01-27 16:10:55 -05:00
Jacob Hoffman-Andrews fb9e8e84b2 Merge pull request #1433 from duesee/nonce_wrong_err_usage
Fix usage of wrong err object in NewNonceService()
2016-01-27 12:43:47 -08:00
Damian Poddebniak 8a2fc079e4 Merge branch 'master' into nonce_wrong_err_usage 2016-01-27 21:34:19 +01:00
bifurcation 51c1a1c88f Merge branch 'master' into must-staple 2016-01-27 14:56:57 -05:00
Roland Bracewell Shoemaker 98984c3ef4 Merge pull request #1413 from letsencrypt/smtp-secret
Read SMTP password from file
2016-01-27 11:33:22 -08:00
Jeff Hodges 6233be1ff0 Merge branch 'master' into smtp-secret 2016-01-27 11:00:55 -08:00
Damian Duesentrieb 6f3a275c87 Fixed usage of wrong err object 2016-01-27 18:02:27 +01:00
Richard Barnes 06ac584b8e Printf clean-up 2016-01-27 08:58:19 -05:00
Richard Barnes 4c3f14bb9c Merge branch 'master' into must-staple 2016-01-27 08:57:12 -05:00
Jeff Hodges 1afa91f33c Merge pull request #1378 from letsencrypt/orphan-finder
Orphan finder
2016-01-26 16:46:34 -08:00
Roland Shoemaker 184b0b06bb Merge branch 'smtp-secret' of github.com:letsencrypt/boulder into smtp-secret 2016-01-26 15:48:33 -08:00
Roland Shoemaker b92d1b7ca9 Move test_secret file 2016-01-26 15:48:16 -08:00
Roland Shoemaker 29127d5779 Add tool to find orphaned certificates in boulder-ca logs 2016-01-26 15:43:23 -08:00