summaryrefslogtreecommitdiffstats
path: root/net/http
diff options
context:
space:
mode:
authoragl@chromium.org <agl@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98>2013-10-28 19:29:35 +0000
committeragl@chromium.org <agl@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98>2013-10-28 19:29:35 +0000
commite60d04105555023b94adf08d6af8b615ae0f9eec (patch)
tree19b23090feeb9d599832592b522b946399cdc3fa /net/http
parenta39e78dc047dbfbb1c1ce6d79cb520de8a119256 (diff)
downloadchromium_src-e60d04105555023b94adf08d6af8b615ae0f9eec.zip
chromium_src-e60d04105555023b94adf08d6af8b615ae0f9eec.tar.gz
chromium_src-e60d04105555023b94adf08d6af8b615ae0f9eec.tar.bz2
net: add pinning for liberty.lavabit.com.
BUG=none R=palmer@chromium.org Review URL: https://codereview.chromium.org/45373002 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@231375 0039d316-1c4b-4281-b951-d872f2087c98
Diffstat (limited to 'net/http')
-rw-r--r--net/http/transport_security_state.cc1
-rw-r--r--net/http/transport_security_state_static.certs38
-rw-r--r--net/http/transport_security_state_static.h14
-rw-r--r--net/http/transport_security_state_static.json7
4 files changed, 60 insertions, 0 deletions
diff --git a/net/http/transport_security_state.cc b/net/http/transport_security_state.cc
index d238e99..df2d95f 100644
--- a/net/http/transport_security_state.cc
+++ b/net/http/transport_security_state.cc
@@ -522,6 +522,7 @@ enum SecondLevelDomainName {
DOMAIN_CHROMIUM_ORG,
DOMAIN_CRYPTO_CAT,
+ DOMAIN_LAVABIT_COM,
// Boundary value for UMA_HISTOGRAM_ENUMERATION:
DOMAIN_NUM_EVENTS
diff --git a/net/http/transport_security_state_static.certs b/net/http/transport_security_state_static.certs
index 90a11c9..dc71f3a 100644
--- a/net/http/transport_security_state_static.certs
+++ b/net/http/transport_security_state_static.certs
@@ -1323,3 +1323,41 @@ TvwjIDhO+wtc3qXjtO1zej3+GBmGz7RcZckturc2pZe3NRWQ7wO8ZzWShWU/ii3z
2PftKlqZo3WAeJoUCPtQNsLnBFGvdUx2rUZwMhdgPuGeV4kEULAtu8M74xR5/Opz
nRGP22zr1K4q
-----END CERTIFICATE-----
+
+Libertylavabitcom
+-----BEGIN CERTIFICATE-----
+MIIGWjCCBUKgAwIBAgIHAMn6RGIIgjANBgkqhkiG9w0BAQUFADCByjELMAkGA1UE
+BhMCVVMxEDAOBgNVBAgTB0FyaXpvbmExEzARBgNVBAcTClNjb3R0c2RhbGUxGjAY
+BgNVBAoTEUdvRGFkZHkuY29tLCBJbmMuMTMwMQYDVQQLEypodHRwOi8vY2VydGlm
+aWNhdGVzLmdvZGFkZHkuY29tL3JlcG9zaXRvcnkxMDAuBgNVBAMTJ0dvIERhZGR5
+IFNlY3VyZSBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eTERMA8GA1UEBRMIMDc5Njky
+ODcwHhcNMTMxMDExMDgzNjAyWhcNMTQxMDExMDgzNjAyWjBBMSEwHwYDVQQLExhE
+b21haW4gQ29udHJvbCBWYWxpZGF0ZWQxHDAaBgNVBAMTE2xpYmVydHkubGF2YWJp
+dC5jb20wggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCo/gQ2t5YtS2dj
+BhIo2ke667uC2qhnUbnroyuqyf+GZafWZC/cmPYpkAWclu14ETBsR3u+6QtDHhOe
+q3OBN0+IVLu5QwYSB2sqYUwyOHZ342uHQktWpPvNiwNHyfl1LsHL4WLuvQw3stK4
+DR+l6H/Ex11bl4KVvfk8uy+kXawcIQv7gr69OwEFEmGqeLSqr+fZdegLKPY20Ujx
+WHSe8ErtW0eMY2A/DvrDrnfw+rVX5sxJIKk77AutIoyt+Ce2TwMVQtfbeQVWy91g
+ST+sqC69wI5BOSguV5zECqIP1zxo939VVVciNGA3+3gyLJa+NDDpbT8xCwXClXN4
+3iektxfP7OgPjPwhDueZNhq54mA5mBY+qdkLyCmvURiczSNeoDTWouqaJq1lKjuh
+CgkAhgoaLueAQv+uGNlVFtbQHApEvYcdz8XTqoL24wf3kadu6vxhrYVS+hguVVEE
+YOc7LJsiQ3ERDjh1naFlL9h5khn6qhjw77oS6PWaCIJT8GfD8bjqCozdOdS1e+Sh
+Bbp2Yg48m/XyQ3ocpEUmTt7n3fRv41XOY4tmBhloqkdPIDccl5deUhI//1VgycJv
+uDqsMgRhyZvdS1kxhDAwbi1GtomURGdB/9kptYshUrR6xk1EP60pjWNxuvB7HMPg
+seGNxPa15U/4z+5h8iSFdKa2TLkk7wIDAQABo4IByzCCAccwDwYDVR0TAQH/BAUw
+AwEBADAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDgYDVR0PAQH/BAQD
+AgWgMDQGA1UdHwQtMCswKaAnoCWGI2h0dHA6Ly9jcmwuZ29kYWRkeS5jb20vZ2Rz
+MS0xMDAuY3JsMFMGA1UdIARMMEowSAYLYIZIAYb9bQEHFwEwOTA3BggrBgEFBQcC
+ARYraHR0cDovL2NlcnRpZmljYXRlcy5nb2RhZGR5LmNvbS9yZXBvc2l0b3J5LzCB
+gAYIKwYBBQUHAQEEdDByMCQGCCsGAQUFBzABhhhodHRwOi8vb2NzcC5nb2RhZGR5
+LmNvbS8wSgYIKwYBBQUHMAKGPmh0dHA6Ly9jZXJ0aWZpY2F0ZXMuZ29kYWRkeS5j
+b20vcmVwb3NpdG9yeS9nZF9pbnRlcm1lZGlhdGUuY3J0MB8GA1UdIwQYMBaAFP2s
+YTKTbEXW4u6FX5q653aZaMznMDcGA1UdEQQwMC6CE2xpYmVydHkubGF2YWJpdC5j
+b22CF3d3dy5saWJlcnR5LmxhdmFiaXQuY29tMB0GA1UdDgQWBBSVRSbXCJKN6lms
+ZtlccHBz/xVLwDANBgkqhkiG9w0BAQUFAAOCAQEAKja1YxyoTuHD1RV4L7wULpiy
+ot4Z3OEuoOZTPJsoHfUCtOtKlUu2ZSwp5+IpaLnC3iCIxy1Yb6qu6Li5dqgtOkxl
+4JqrOooQ9IUzuTLhSzPf6rEtw9gnYN/dpQ2q0YLh+K5SgRUm9y0PHBV4acfSh2TJ
+vyaXDmuonX5zG7u3nz/oCo/qziW46Phz/leMhCAgLnZUYcAv6KPET+RMRmt4n8gg
+C0xlOcCQbMh9VIPZ0WSnmdFn5DUCW+oVlwhxDB/3CvWIa0k/WI6NNW8vg+VdSyW7
+p/dp4mikGH37Tc5VAhcYMbAem69nSg7Qfrs35tak/JPJlx1LWayERGHLvTy7Ag==
+-----END CERTIFICATE-----
diff --git a/net/http/transport_security_state_static.h b/net/http/transport_security_state_static.h
index be1f854..3bfc41b 100644
--- a/net/http/transport_security_state_static.h
+++ b/net/http/transport_security_state_static.h
@@ -246,6 +246,10 @@ static const char kSPKIHash_CryptoCat1[] =
"\x4c\x87\xce\x85\x2c\xf4\xc0\x4d\x67\xa9"
"\xe0\xec\x51\x0c\x7f\x3b\x14\xb3\xe9\xc9";
+static const char kSPKIHash_Libertylavabitcom[] =
+ "\x41\xbb\x3b\x8b\xc7\xcf\x3d\x13\x3f\x17"
+ "\xb3\x25\x7e\xe4\x03\xca\x8a\x5c\x6d\x36";
+
// The following is static data describing the hosts that are hardcoded with
// certificate pins or HSTS information.
@@ -399,6 +403,15 @@ static const char* const kCryptoCatAcceptableCerts[] = {
kNoRejectedPublicKeys, \
}
+static const char* const kLavabitAcceptableCerts[] = {
+ kSPKIHash_Libertylavabitcom,
+ NULL,
+};
+#define kLavabitPins { \
+ kLavabitAcceptableCerts, \
+ kNoRejectedPublicKeys, \
+}
+
#define kNoPins {\
NULL, NULL, \
}
@@ -880,6 +893,7 @@ static const struct HSTSPreload kPreloadedSTS[] = {
{12, true, "\006cybozu\003com", true, kNoPins, DOMAIN_NOT_PINNED },
{17, true, "\013davidlyness\003com", true, kNoPins, DOMAIN_NOT_PINNED },
{12, true, "\006medium\003com", true, kNoPins, DOMAIN_NOT_PINNED },
+ {21, true, "\007liberty\007lavabit\003com", true, kLavabitPins, DOMAIN_LAVABIT_COM },
};
static const size_t kNumPreloadedSTS = ARRAYSIZE_UNSAFE(kPreloadedSTS);
diff --git a/net/http/transport_security_state_static.json b/net/http/transport_security_state_static.json
index 8850fbd..b453e26 100644
--- a/net/http/transport_security_state_static.json
+++ b/net/http/transport_security_state_static.json
@@ -156,6 +156,12 @@
"DigiCertEVRoot",
"CryptoCat1"
]
+ },
+ {
+ "name": "lavabit",
+ "static_spki_hashes": [
+ "Libertylavabitcom"
+ ]
}
],
@@ -654,6 +660,7 @@
{ "name": "cybozu.com", "include_subdomains": true, "mode": "force-https" },
{ "name": "davidlyness.com", "include_subdomains": true, "mode": "force-https" },
{ "name": "medium.com", "include_subdomains": true, "mode": "force-https" },
+ { "name": "liberty.lavabit.com", "include_subdomains": true, "mode": "force-https", "pins": "lavabit" },
// Entries that are only valid if the client supports SNI.
{ "name": "gmail.com", "mode": "force-https", "pins": "google", "snionly": true },