-
Notifications
You must be signed in to change notification settings - Fork 1.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Reports Certificate Serial number #1333
base: master
Are you sure you want to change the base?
Reports Certificate Serial number #1333
Conversation
cb4909e
to
0982412
Compare
Adds `serialnumber` to `probe_ssl_last_chain_info` Output looks like Test: `curl -s http://localhost:9115/probe\?target\=https://example.com\&module\=http_2xx` ``` probe_ssl_last_chain_info{fingerprint_sha256="efba26d8c1ce3779ac77630a90f82163a3d6892ed6afee408672cf19eba7a362",issuer="CN=DigiCert Global G2 TLS RSA SHA256 2020 CA1,O=DigiCert Inc,C=US",serialnumber="075bcef30689c8addf13e51af4afe187",subject="CN=www.example.org,O=Internet Corporation for Assigned Names and Numbers,L=Los Angeles,ST=California,C=US",subjectalternative="www.example.org,example.net,example.edu,example.com,example.org,www.example.com,www.example.edu,www.example.net"} 1 ``` Relates to prometheus#1103 Signed-off-by: Rhys Evans <[email protected]>
0982412
to
b4999a4
Compare
Signed-off-by: Rhys Evans <[email protected]>
Confirmed to work on grpc , with local test
|
Apologies for pinging you directly, but are you able to assist with the process to get this PR reviewed? Thanks |
plus one |
Apologies, extending the list @roidelapluie @mem Apologies for pinging you directly, but are you able to assist with the process to get this PR reviewed? Thanks |
I would love to better understand the use-case here to evaluate the feature. what would be use-case where the existing |
For CDN, it is possible to have multiple certificates with the same pub/priv key pair issued for different purposes. These certificates will share the same fingerprint but will have distinct serial numbers. Also, if I am not wrong when a CA is compromised, OCSP responses typically identify certificates by their serial numbers. |
Hi My, primary, use case is around normalising the language used in communicating certificate status etc. So outside of technical circles, I almost never hear business people using the This would allow me at present not to build another "translation" layer between technical and non-technical people (think governance, compliance, etc etc). With this both teams could look at the relevant dashboards and get the informantion they need, and when talking to each other, they will have a common data set and "language" Te reason for including SN (Serial number) and CN (Common Name) is this convo particularly, is around the fact I have multiple certs issued via different CA's with the same common name. Note: I think the comment about OCSP, relying on the serial number is mentioend in https://www.rfc-editor.org/rfc/rfc6960.txt I hope this helps, but let me know, if you need any further info Thanks |
I see, now that use-cases are more clear to me. l will do reviews and we can get this in after review. |
Co-pilot helped Signed-off-by: Rhys Evans <[email protected]>
1656a6e
to
e0bbd77
Compare
Signed-off-by: Rhys Evans <[email protected]>
other then the two comments, rest of the PR looks good to me. I will ✅ after the comment is addressed. thanks for adding the test. before I merge, I will give time to other maintainers to review. please feel free to remind me, if I don't come back to it in few weeks. |
Signed-off-by: Rhys Evans <[email protected]>
`%x` - https://go.dev/play/p/Fylce70N2Zl Leading Zeros - mozilla/tls-observatory#245 Signed-off-by: Rhys Evans <[email protected]>
Adds
serialnumber
toprobe_ssl_last_chain_info
Output looks like
Test:
curl -s http://localhost:9115/probe\?target\=https://example.com\&module\=http_2xx
Relates to #1103