Commit Graph

2875 Commits

Author SHA1 Message Date
Jeff Hodges fb657de5f1 Merge branch 'master' into delete_check_caa 2016-02-12 13:09:10 -08:00
Jeff Hodges c36bc382dd remove unused CheckCAA RPC
Helpful for #1486 and was already in my local repo.
2016-02-12 13:01:05 -08:00
Jeff Hodges 7176ac1b2d Merge pull request #1481 from letsencrypt/update_cfssl
update cfssl mostly for the Subject.SerialName
2016-02-11 11:31:42 -08:00
Roland Bracewell Shoemaker 9c68575334 Merge branch 'master' into update_cfssl 2016-02-11 10:37:47 -08:00
Roland Bracewell Shoemaker 0779862439 Merge pull request #1438 from hlandauf/relax-caa
Make CAA checking more compliant with the RFC; CAA refactoring
2016-02-11 10:36:44 -08:00
Jeff Hodges 2746260194 update cfssl mostly for the Subject.SerialName
Resolves a blocker for #1477
2016-02-10 17:14:41 -08:00
Roland Bracewell Shoemaker 423d0c7e79 Merge branch 'master' into relax-caa 2016-02-10 15:35:12 -08:00
Roland Bracewell Shoemaker 67604457d2 Merge pull request #1474 from letsencrypt/objdir_for_1.6
use absolute GOBIN path for Go 1.6
2016-02-10 13:27:19 -08:00
Hugo Landau 1bc980b04a Change to use non-naked returns in checkCAARecords 2016-02-10 20:21:54 +00:00
Jeff Hodges 2e5a2a933a Merge branch 'master' into relax-caa 2016-02-10 11:12:37 -08:00
Jeff Hodges 81a0849e16 Merge branch 'master' into objdir_for_1.6 2016-02-10 11:09:52 -08:00
Jeff Hodges 4945ec859e Merge pull request #1465 from ricardopadilha/master
publicsuffix: update table to latest list from publicsuffix.org on 2016-01-30
2016-02-10 11:07:31 -08:00
Ricardo Padilha ad7e2cc5fe Merge branch 'master' into master 2016-02-10 12:46:53 -02:00
Jeff Hodges b07f425582 Merge branch 'master' into objdir_for_1.6 2016-02-09 14:34:34 -08:00
Jeff Hodges 49ddbc387a Merge pull request #1476 from letsencrypt/client_provide_serial_ca
in ca tests, tell cfssl we are making serials
2016-02-09 14:34:21 -08:00
Jeff Hodges ce9283d3c6 in ca tests, tell cfssl we are making serials
Also in ra tests.

This fixes the spurious ca and ra test failure where the serials are the
wrong size. CFSSL makes ones that are larger than we expect.
2016-02-09 14:10:28 -08:00
Jeff Hodges 1535131d61 Merge branch 'master' into objdir_for_1.6 2016-02-09 11:54:36 -08:00
Jeff Hodges f7ea0290fa use absolute GOBIN path for Go 1.6 2016-02-09 11:53:47 -08:00
Jeff Hodges 7a4c0186d7 Merge pull request #1467 from letsencrypt/drop-ocspresponses
Remove checking of ocspResponses table
2016-02-09 11:18:24 -08:00
Jacob Hoffman-Andrews 0fda27e15a Remove checking of ocspResponses table.
We now use the certificateStatus table.
2016-02-09 10:36:41 -08:00
Roland Bracewell Shoemaker 044cb83291 Merge pull request #1397 from hlandauf/update-deps
Update vendorized cfssl (OCSP extension support)
2016-02-09 10:14:01 -08:00
Hugo Landau d21f6e3d21 Update vendorized cfssl (OCSP extension support)
Since CFSSL now supports OCSP extensions, it should be updated in
preparation for OCSP SCT stapling. Also updates CFSSL dependency
golang.org/x/crypto, including golang.org/x/crypto/ocsp.

Mocks updated to reflect interface change in cfssl.
2016-02-07 12:14:59 +00:00
Ricardo Padilha 68bcee105c publicsuffix: update table to latest list from publicsuffix.org on 2016-01-30
This update comes from this lineage:

- https://github.com/publicsuffix/list:
  24caf4f72bf42a87559685e7211796c94855a90c
- https://go-review.googlesource.com/#/c/19140/:
  6c581b96a7d38dd755f986fcf4f29665597694c0
- https://github.com/letsencrypt/net:
  7eb31e4ef6d2609d3ef5597cbc65cb68c8027f62

Changelog:
- Godeps.json: replaced commit id with 7eb31e4
- _workspace/src/...suffix/table.go: copied from letsencrypt/net@7eb31e4
2016-02-04 08:08:24 -08:00
Jeff Hodges 8237a133c4 Merge pull request #1459 from letsencrypt/ignore_testdata
ignore the cmd/testdata dir in the Makefile
2016-02-02 13:49:21 -08:00
Jeff Hodges b3ac3ccf94 ignore the cmd/testdata dir in the Makefile
testdata won't ever be producing a binary, and "testdata" is a fairly
common name to find in Go projects for the tests to use, so just ignore it.
2016-02-02 13:42:07 -08:00
Roland Bracewell Shoemaker e3922d20b2 Merge pull request #1450 from jmhodges/httpmon_handler
make HTTPMonitor a http.Handler
2016-02-02 13:38:32 -08:00
Jeff Hodges 57b6dd5bb5 make HTTPMonitor a http.Handler 2016-02-01 22:01:21 -08:00
Jacob Hoffman-Andrews ba3763e398 Merge pull request #1451 from letsencrypt/delete_foreign_key_fix
ignore foreign key constraints when clearing tables
2016-02-01 20:58:58 -08:00
Jeff Hodges 6db612ce30 ignore foreign key constraints when clearing tables 2016-02-01 20:16:47 -08:00
Jacob Hoffman-Andrews 031d2f9663 Merge pull request #1449 from letsencrypt/ocsp_response_200
ocsp-responder: 200 on GET /
2016-02-01 20:12:30 -08:00
Jeff Hodges c156f99106 ocsp-responder: 200 on GET /
Some stat services, we believe, are saying the ocsp-responder is down
because / returns 400 Bad Request currently.

Shuffle some code into a new `mux` function to make it easier to test.
2016-02-01 20:03:45 -08:00
Jeff Hodges ee26b8b6de Merge pull request #1327 from letsencrypt/more-revoker
Add revoke auths by domain to admin-revoker
2016-02-01 15:45:15 -08:00
Roland Shoemaker c3a6a837a4 Merge branch 'master' into more-revoker 2016-02-01 15:38:05 -08:00
Roland Shoemaker 7cafa4567f Review fixes 2016-02-01 15:37:21 -08:00
Hugo Landau ea9853a35b Remove issuewild support from CAA patch 2016-01-31 02:01:34 +00:00
Hugo Landau 4f27c24cf3 Make CAA checking more compliant with the RFC; CAA refactoring
The CAA response checking method has been refactored to have a
easier to follow straight-line control flow. Several bugs in it have
been fixed:

  - Firstly, parameters for issue and issuewild directives were not
    parsed, so any attempt to specify parameters would result in
    a string mismatch with the CA CAA identity (e.g. "letsencrypt.org").
    Moreover, the syntax as specified permits leading and trailing
    whitespace, so a parameter-free record such as
    "  letsencrypt.org ;  " would not be considered a match.

    This has been fixed by stripping whitespace and parameters. The RFC
    does not specify the criticality of parameters, so unknown
    parameters (currently all parameters) are considered noncritical.
    I justify this as follows:

    If someone decides to nominate a CA in a CAA record, they can,
    with trivial research, determine what parameters, if any, that
    CA supports, and presumably in trusting them in the first place
    is able to adequately trust that the CA will continue to support
    those parameters. The risk from other CAs is zero because other CAs
    do not process the parameters because the records in which they
    appear they do not relate to them.

  - Previously, all of the flag bits were considered to effectively mean
    'critical'. However, the RFC specifies that all bits except for the
    actual critical bit (decimal 128) should be ignored. In practice,
    many people have misunderstood the RFC to mean that the critical bit
    is decimal 1, so both bits are interpreted to mean 'critical', but
    this change ignores all of the other bits. This ensures that the
    remaining six bits are reasonably usable for future standards action
    if any need should arise.

  - Previously, existence of an "issue" directive but no "issuewild"
    directive was essentially equivalent to an unsatisfiable "issuewild"
    directive, meaning that no wildcard identifiers could pass the CAA
    check. This is contrary to the RFC, which states that issuewild
    should default to what is specified for "issue" if no issuewild
    directives are specified. (This is somewhat moot since boulder
    doesn't currently support wildcard issuance.)

  - Conversely, existence of an "issuewild" directive but no "issue"
    directive would cause CAA validation for a non-wildcard identifier
    to fail, which was contrary to the RFC. This has been fixed.

  - More generally, existence of any unknown non-critical directive, say
    "foobar", would cause the CAA checking code to act as though an
    unsatisfiable "issue" directive existed, preventing any issuance.
    This has been fixed.

Test coverage for corner cases is enhanced and provides regression
testing for these bugs.

statsd statistics have been added for tracking the relative frequency
of occurrence of different CAA features and outcomes. I added these on
a whim suspecting that they may be of interest.

Fixes #1436.
2016-01-31 01:51:28 +00:00
Jeff Hodges e0bfb710b9 Merge pull request #1445 from letsencrypt/contributing
Remove GA note from CONTRIBUTING.md.
2016-01-28 16:41:55 -08:00
Jacob Hoffman-Andrews 8f179c0d9a Remove GA note from CONTRIBUTING.md. 2016-01-28 16:32:08 -08:00
Jeff Hodges f6794db9a7 Merge pull request #1441 from letsencrypt/no-final-hyphen
Reject final "-" in DNS label.
2016-01-28 11:16:34 -08:00
Jacob Hoffman-Andrews cecb4d08e9 Reject final "-" in DNS label. 2016-01-28 11:08:10 -08:00
Jacob Hoffman-Andrews 5c8ef56c37 Merge pull request #1423 from letsencrypt/dedup_reg_email_templates
dedup emails sent to same reg in given batch
2016-01-28 10:54:58 -08:00
Jeff Hodges 8e8161f94b dedup emails sent to same reg in given batch
This deduplicates the certificate expiration emails sent to a given
registration in a given batch defined by the Mailer.CertLimit option.

Fixes #1358.
2016-01-27 20:39:52 -08:00
Jeff Hodges e23cf3991e Merge pull request #1430 from letsencrypt/caa-flag-fix
Remove incorrect CAA critical flag check
2016-01-27 20:01:10 -08:00
Roland Shoemaker 82c7d0b7a5 Merge branch 'caa-flag-fix' of github.com:letsencrypt/boulder into caa-flag-fix 2016-01-27 14:15:26 -08:00
Roland Shoemaker d5d4795626 Fix mock CAA response in test 2016-01-27 14:15:16 -08:00
Roland Shoemaker aa58556605 Remove comment 2016-01-27 14:04:55 -08:00
Jeff Hodges cb8085541e Merge branch 'master' into more-revoker 2016-01-27 13:57:55 -08:00
Jeff Hodges 1c8c05053a Merge branch 'master' into caa-flag-fix 2016-01-27 13:57:33 -08:00
Roland Shoemaker 7ea91448e4 Merge branch 'master' into more-revoker 2016-01-27 13:51:36 -08:00
Roland Shoemaker 56f5cfeb4a Review fixes 2016-01-27 13:50:45 -08:00