Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(631)

Issue 10537153: Do not treat weak keys (<1024 bits || MD5) as fatal errors (Closed)

Created:
8 years, 6 months ago by Ryan Sleevi
Modified:
8 years, 6 months ago
Reviewers:
wtc, agl
CC:
chromium-reviews, cbentzel+watch_chromium.org, darin-cc_chromium.org
Visibility:
Public.

Description

Do not treat weak keys (<1024 bits || MD5) as fatal errors A pending system update from Microsoft, detailed at http://blogs.technet.com/b/pki/archive/2012/06/12/rsa-keys-under-1024-bits-are-blocked.aspx will change the behaviour of CertGetCertificateChain such that it will appropriately flag weak keys in the CERT_TRUST_STATUS.dwError field. To avoid mapping this to CERT_STATUS_INVALID, handle the new error code and map it to CERT_STATUS_WEAK_KEY. BUG=none TEST=net_unittests continue passing on Win when this change is released. Committed: http://src.chromium.org/viewvc/chrome?view=rev&revision=142008

Patch Set 1 #

Total comments: 2

Patch Set 2 : Comment update #

Total comments: 2
Unified diffs Side-by-side diffs Delta from patch set Stats (+21 lines, -1 line) Patch
M net/base/cert_verify_proc_win.cc View 1 2 chunks +21 lines, -1 line 2 comments Download

Messages

Total messages: 6 (0 generated)
Ryan Sleevi
agl: PTAL, since you clued me in to it. Trying to avoid a situation like ...
8 years, 6 months ago (2012-06-13 21:08:36 UTC) #1
agl
LGTM http://codereview.chromium.org/10537153/diff/1/net/base/cert_verify_proc_win.cc File net/base/cert_verify_proc_win.cc (right): http://codereview.chromium.org/10537153/diff/1/net/base/cert_verify_proc_win.cc#newcode150 net/base/cert_verify_proc_win.cc:150: // Check for a 'non-strong-signed' signature. Depending on ...
8 years, 6 months ago (2012-06-13 21:15:12 UTC) #2
Ryan Sleevi
http://codereview.chromium.org/10537153/diff/1/net/base/cert_verify_proc_win.cc File net/base/cert_verify_proc_win.cc (right): http://codereview.chromium.org/10537153/diff/1/net/base/cert_verify_proc_win.cc#newcode150 net/base/cert_verify_proc_win.cc:150: // Check for a 'non-strong-signed' signature. Depending on OS ...
8 years, 6 months ago (2012-06-13 21:22:37 UTC) #3
commit-bot: I haz the power
CQ is trying da patch. Follow status at https://chromium-status.appspot.com/cq/rsleevi@chromium.org/10537153/4
8 years, 6 months ago (2012-06-13 21:23:14 UTC) #4
commit-bot: I haz the power
Change committed as 142008
8 years, 6 months ago (2012-06-13 22:43:50 UTC) #5
wtc
8 years, 6 months ago (2012-06-14 00:33:16 UTC) #6
Patch set 2 LGTM.

http://codereview.chromium.org/10537153/diff/4/net/base/cert_verify_proc_win.cc
File net/base/cert_verify_proc_win.cc (right):

http://codereview.chromium.org/10537153/diff/4/net/base/cert_verify_proc_win....
net/base/cert_verify_proc_win.cc:154: // excluding RSA keys < 2048 bits.
However, if the user has configured

This comment is a little confusing because it's not clear
whether "such as excluding SHA-1 ..." is modifying
"These checks" or "the current weak key criteria implemented
within CertVerifier".

In my first reading I thought it was talking about our current
weak key criteria.

http://codereview.chromium.org/10537153/diff/4/net/base/cert_verify_proc_win....
net/base/cert_verify_proc_win.cc:158: cert_status |= CERT_STATUS_WEAK_KEY;

Could also be CERT_STATUS_WEAK_SIGNATURE_ALGORITHM...
Not sure which is the better cert status bit to set here.

Powered by Google App Engine
This is Rietveld 408576698