This tool revokes certain CA certificates for OpenSSL and NSS-based applications on Linux (most notably, Firefox & Chrome).
On Linux there are multiple libraries for SSL/TLS and each may have its own
certificate store. The /etc/ca-certificates.conf configures the trusted
Root CAs for OpenSSL (which wget uses by default). Another widely used
library is NSS by Mozilla, which supports blacklisting a specific intermediate
CA without fiddling with the Root CA.
Please make sure all scripts must have execute permission.
This tool is experimental. DO MAKE BACKUPS before you do anything!
First you need to have packages installed to provide certutil. On Ubuntu it would be:
sudo apt-get install libnss3-toolsThen, use the revoke-china-certs.sh to do the revocation.
For most NSS-based applications including Chrome, it would be:
./revoke-china-certs.sh extended $HOME/.pki/nssdbto revoke trust of CAs within the extended set. Change extended to all or base
or restore to revoke other sets of certs.
Since Firefox maintains different certificate store for different browser profile (rather
than per Linux user for Chrome), you need to do this for every profile under ~/.mozilla/firefox.
for profile in `ls -d ~/.mozilla/firefox/*.default`; do
./revoke-china-certs.sh extended "$profile"
doneCertificate pinning test is implemented in certificate_pinning_test.py.
Use it as:
./certificate_pinning_test.pyThis should reveal any HTTPS Man-In-The-Middle devices that may eavesdrop your connection (with Google), including but not limited to a transparent proxy.
The pinning test uses signatures extracted from Android.
(This is experimental. If you do encounter an error, please file an issue with the certificate you get.)
Most NSS-based applications use ~/.pki/nssdb, including but not limited to:
- Curl
- Google Chrome
- Chromium
- Evolution
- GNUnet
- Wine
- Firefox/Iceweasel
~/.mozilla/firefox/*.default/ - Thunderbird/Icedove
~/.thunderbird/*.default
- Deselecting a CA by
dpkg-reconfigure ca-certificatesdoes NOT affect any NSS-based applications. - There is a global database at
/etc/pki/nssdb. On Debian/Ubuntu, this global database is installed bylibnss3-nssdb. And it actually links to/var/lib/nssdb/, which is an empty database. And since most NSS based applications only read it, so it's safe to assume that it is empty. On Arch it is not created by default, too. On Fedora/etc/pki/nssdbexists but is also not enabled by default. Though OpenSuse will install certificates into/etc/pki/nssdbprovided thatmozilla-nss-sysinitis installed. Thus if you worry about it, you can check its emptiness withcertutil -d sql:${DBPATH} -Lyourself. And revoke certificates in it viarevoke-china-certs.shif necessary.
sudo ./cac_revoke.sh extendedThe above command will revoke trust of CAs within the extended set.
Change extended to all or base to revoke other sets of certs.
Change extended to restore to restore the revocation.
Make sure wget is available on your $PATH.
./validator.shA note about SSL/TLS trusted certificate stores, and platforms (OpenSSL and GnuTLS)
This Linux utility is distributed under the Apache License.