2016-03-13 20:38:06 +01:00
2016-03-14 22:40:29 +01:00
#### Certificate stores
2016-03-13 20:38:06 +01:00
The certificate stores were retrieved by
* Mozilla; see https://curl.haxx.se/docs/caextract.html
2016-03-13 21:13:03 +01:00
* Linux: Just copied from an up-to-date Linux machine
2016-03-25 11:52:23 +01:00
* Microsoft: For Windows >= 7/2008 Microsoft decided not to provide
a full certificate store by default or via update as all other OS do.
2016-03-13 21:10:00 +01:00
It's being populated with time -- supposed you use e.g. IE while browsing.
2016-10-12 21:15:37 +02:00
Thus this file is smaller as the others.
2016-03-13 21:10:00 +01:00
This store was destilled from three different windows installations via
2016-03-25 11:52:23 +01:00
"certmgr.msc". It's a PKCS7 export of "Trusted Root Certification Authorities"
2016-10-12 21:15:37 +02:00
and the Third Party Store.
2016-03-25 11:52:23 +01:00
Feedback is welcome, see #317 .
2016-10-12 21:15:37 +02:00
It's still behind what MS publishes what [should be included ](http://social.technet.microsoft.com/wiki/contents/articles/31634.microsoft-trusted-root-certificate-program-participants-v-2016-april.aspx ).
Unfortunately there doesn't seem to be store to DL. Let me know if
you have a pointer
2016-03-25 11:52:23 +01:00
* Apple: It comes from Apple OS X keychain app. Open Keychain Access.
In the Finder window, under Favorites --> "Applications" --> "Utilities"
--> "Keychain Access" (2 click). In that window --> "Keychains" --> "System"
--> "Category" --> "All Items"
Select all CA certificates, "File" --> "Export Items"
2016-03-13 20:38:06 +01:00
2016-03-13 21:10:00 +01:00
In this directory you can also save e.g. your company Root CA(s) in PEM
format, extension ``pem``. This has two catches momentarily: You will still
2016-03-25 11:52:23 +01:00
get a warning for the other certificate stores while scanning internal net-
works. Second catch: If you scan other hosts in the internet the check against
your Root CA will fail, too. This will be fixed in the future, see #230 .
2016-03-13 20:38:06 +01:00
2017-02-24 17:55:20 +01:00
#### Further needed files
* ``mapping-rfc.txt`` uses the hexcode to map OpenSSL against the RFC/IANA names.
* ``ca_hashes.txt`` is used for HPKP test in order to have a fast comparison with known CAs
* ``common-primes.txt`` is used for LOGJAM
* ``client_simulation.txt`` as the name indicates it's the data for the client simulation