diff options
author | agl@chromium.org <agl@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98> | 2013-10-28 19:29:35 +0000 |
---|---|---|
committer | agl@chromium.org <agl@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98> | 2013-10-28 19:29:35 +0000 |
commit | e60d04105555023b94adf08d6af8b615ae0f9eec (patch) | |
tree | 19b23090feeb9d599832592b522b946399cdc3fa /net/http | |
parent | a39e78dc047dbfbb1c1ce6d79cb520de8a119256 (diff) | |
download | chromium_src-e60d04105555023b94adf08d6af8b615ae0f9eec.zip chromium_src-e60d04105555023b94adf08d6af8b615ae0f9eec.tar.gz chromium_src-e60d04105555023b94adf08d6af8b615ae0f9eec.tar.bz2 |
net: add pinning for liberty.lavabit.com.
BUG=none
R=palmer@chromium.org
Review URL: https://codereview.chromium.org/45373002
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@231375 0039d316-1c4b-4281-b951-d872f2087c98
Diffstat (limited to 'net/http')
-rw-r--r-- | net/http/transport_security_state.cc | 1 | ||||
-rw-r--r-- | net/http/transport_security_state_static.certs | 38 | ||||
-rw-r--r-- | net/http/transport_security_state_static.h | 14 | ||||
-rw-r--r-- | net/http/transport_security_state_static.json | 7 |
4 files changed, 60 insertions, 0 deletions
diff --git a/net/http/transport_security_state.cc b/net/http/transport_security_state.cc index d238e99..df2d95f 100644 --- a/net/http/transport_security_state.cc +++ b/net/http/transport_security_state.cc @@ -522,6 +522,7 @@ enum SecondLevelDomainName { DOMAIN_CHROMIUM_ORG, DOMAIN_CRYPTO_CAT, + DOMAIN_LAVABIT_COM, // Boundary value for UMA_HISTOGRAM_ENUMERATION: DOMAIN_NUM_EVENTS diff --git a/net/http/transport_security_state_static.certs b/net/http/transport_security_state_static.certs index 90a11c9..dc71f3a 100644 --- a/net/http/transport_security_state_static.certs +++ b/net/http/transport_security_state_static.certs @@ -1323,3 +1323,41 @@ TvwjIDhO+wtc3qXjtO1zej3+GBmGz7RcZckturc2pZe3NRWQ7wO8ZzWShWU/ii3z 2PftKlqZo3WAeJoUCPtQNsLnBFGvdUx2rUZwMhdgPuGeV4kEULAtu8M74xR5/Opz nRGP22zr1K4q -----END CERTIFICATE----- + +Libertylavabitcom +-----BEGIN CERTIFICATE----- +MIIGWjCCBUKgAwIBAgIHAMn6RGIIgjANBgkqhkiG9w0BAQUFADCByjELMAkGA1UE +BhMCVVMxEDAOBgNVBAgTB0FyaXpvbmExEzARBgNVBAcTClNjb3R0c2RhbGUxGjAY +BgNVBAoTEUdvRGFkZHkuY29tLCBJbmMuMTMwMQYDVQQLEypodHRwOi8vY2VydGlm +aWNhdGVzLmdvZGFkZHkuY29tL3JlcG9zaXRvcnkxMDAuBgNVBAMTJ0dvIERhZGR5 +IFNlY3VyZSBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eTERMA8GA1UEBRMIMDc5Njky +ODcwHhcNMTMxMDExMDgzNjAyWhcNMTQxMDExMDgzNjAyWjBBMSEwHwYDVQQLExhE +b21haW4gQ29udHJvbCBWYWxpZGF0ZWQxHDAaBgNVBAMTE2xpYmVydHkubGF2YWJp +dC5jb20wggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCo/gQ2t5YtS2dj +BhIo2ke667uC2qhnUbnroyuqyf+GZafWZC/cmPYpkAWclu14ETBsR3u+6QtDHhOe +q3OBN0+IVLu5QwYSB2sqYUwyOHZ342uHQktWpPvNiwNHyfl1LsHL4WLuvQw3stK4 +DR+l6H/Ex11bl4KVvfk8uy+kXawcIQv7gr69OwEFEmGqeLSqr+fZdegLKPY20Ujx +WHSe8ErtW0eMY2A/DvrDrnfw+rVX5sxJIKk77AutIoyt+Ce2TwMVQtfbeQVWy91g +ST+sqC69wI5BOSguV5zECqIP1zxo939VVVciNGA3+3gyLJa+NDDpbT8xCwXClXN4 +3iektxfP7OgPjPwhDueZNhq54mA5mBY+qdkLyCmvURiczSNeoDTWouqaJq1lKjuh +CgkAhgoaLueAQv+uGNlVFtbQHApEvYcdz8XTqoL24wf3kadu6vxhrYVS+hguVVEE +YOc7LJsiQ3ERDjh1naFlL9h5khn6qhjw77oS6PWaCIJT8GfD8bjqCozdOdS1e+Sh +Bbp2Yg48m/XyQ3ocpEUmTt7n3fRv41XOY4tmBhloqkdPIDccl5deUhI//1VgycJv +uDqsMgRhyZvdS1kxhDAwbi1GtomURGdB/9kptYshUrR6xk1EP60pjWNxuvB7HMPg +seGNxPa15U/4z+5h8iSFdKa2TLkk7wIDAQABo4IByzCCAccwDwYDVR0TAQH/BAUw +AwEBADAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDgYDVR0PAQH/BAQD +AgWgMDQGA1UdHwQtMCswKaAnoCWGI2h0dHA6Ly9jcmwuZ29kYWRkeS5jb20vZ2Rz +MS0xMDAuY3JsMFMGA1UdIARMMEowSAYLYIZIAYb9bQEHFwEwOTA3BggrBgEFBQcC +ARYraHR0cDovL2NlcnRpZmljYXRlcy5nb2RhZGR5LmNvbS9yZXBvc2l0b3J5LzCB +gAYIKwYBBQUHAQEEdDByMCQGCCsGAQUFBzABhhhodHRwOi8vb2NzcC5nb2RhZGR5 +LmNvbS8wSgYIKwYBBQUHMAKGPmh0dHA6Ly9jZXJ0aWZpY2F0ZXMuZ29kYWRkeS5j +b20vcmVwb3NpdG9yeS9nZF9pbnRlcm1lZGlhdGUuY3J0MB8GA1UdIwQYMBaAFP2s +YTKTbEXW4u6FX5q653aZaMznMDcGA1UdEQQwMC6CE2xpYmVydHkubGF2YWJpdC5j +b22CF3d3dy5saWJlcnR5LmxhdmFiaXQuY29tMB0GA1UdDgQWBBSVRSbXCJKN6lms +ZtlccHBz/xVLwDANBgkqhkiG9w0BAQUFAAOCAQEAKja1YxyoTuHD1RV4L7wULpiy +ot4Z3OEuoOZTPJsoHfUCtOtKlUu2ZSwp5+IpaLnC3iCIxy1Yb6qu6Li5dqgtOkxl +4JqrOooQ9IUzuTLhSzPf6rEtw9gnYN/dpQ2q0YLh+K5SgRUm9y0PHBV4acfSh2TJ +vyaXDmuonX5zG7u3nz/oCo/qziW46Phz/leMhCAgLnZUYcAv6KPET+RMRmt4n8gg +C0xlOcCQbMh9VIPZ0WSnmdFn5DUCW+oVlwhxDB/3CvWIa0k/WI6NNW8vg+VdSyW7 +p/dp4mikGH37Tc5VAhcYMbAem69nSg7Qfrs35tak/JPJlx1LWayERGHLvTy7Ag== +-----END CERTIFICATE----- diff --git a/net/http/transport_security_state_static.h b/net/http/transport_security_state_static.h index be1f854..3bfc41b 100644 --- a/net/http/transport_security_state_static.h +++ b/net/http/transport_security_state_static.h @@ -246,6 +246,10 @@ static const char kSPKIHash_CryptoCat1[] = "\x4c\x87\xce\x85\x2c\xf4\xc0\x4d\x67\xa9" "\xe0\xec\x51\x0c\x7f\x3b\x14\xb3\xe9\xc9"; +static const char kSPKIHash_Libertylavabitcom[] = + "\x41\xbb\x3b\x8b\xc7\xcf\x3d\x13\x3f\x17" + "\xb3\x25\x7e\xe4\x03\xca\x8a\x5c\x6d\x36"; + // The following is static data describing the hosts that are hardcoded with // certificate pins or HSTS information. @@ -399,6 +403,15 @@ static const char* const kCryptoCatAcceptableCerts[] = { kNoRejectedPublicKeys, \ } +static const char* const kLavabitAcceptableCerts[] = { + kSPKIHash_Libertylavabitcom, + NULL, +}; +#define kLavabitPins { \ + kLavabitAcceptableCerts, \ + kNoRejectedPublicKeys, \ +} + #define kNoPins {\ NULL, NULL, \ } @@ -880,6 +893,7 @@ static const struct HSTSPreload kPreloadedSTS[] = { {12, true, "\006cybozu\003com", true, kNoPins, DOMAIN_NOT_PINNED }, {17, true, "\013davidlyness\003com", true, kNoPins, DOMAIN_NOT_PINNED }, {12, true, "\006medium\003com", true, kNoPins, DOMAIN_NOT_PINNED }, + {21, true, "\007liberty\007lavabit\003com", true, kLavabitPins, DOMAIN_LAVABIT_COM }, }; static const size_t kNumPreloadedSTS = ARRAYSIZE_UNSAFE(kPreloadedSTS); diff --git a/net/http/transport_security_state_static.json b/net/http/transport_security_state_static.json index 8850fbd..b453e26 100644 --- a/net/http/transport_security_state_static.json +++ b/net/http/transport_security_state_static.json @@ -156,6 +156,12 @@ "DigiCertEVRoot", "CryptoCat1" ] + }, + { + "name": "lavabit", + "static_spki_hashes": [ + "Libertylavabitcom" + ] } ], @@ -654,6 +660,7 @@ { "name": "cybozu.com", "include_subdomains": true, "mode": "force-https" }, { "name": "davidlyness.com", "include_subdomains": true, "mode": "force-https" }, { "name": "medium.com", "include_subdomains": true, "mode": "force-https" }, + { "name": "liberty.lavabit.com", "include_subdomains": true, "mode": "force-https", "pins": "lavabit" }, // Entries that are only valid if the client supports SNI. { "name": "gmail.com", "mode": "force-https", "pins": "google", "snionly": true }, |