Open fredmaggiowski opened 1 year ago
Hey @fredmaggiowski, thanks for coming along at KCD UK, and for trying out Paranoia.
It's a hard problem to be sure. For me I'd look at alternatives first.
If either of thsoe are true, you could omit the certs alltogether.
Failing that, if you know you only need access to some sites, like specific APIs, then you could bundle just those certs (there's a risk if the developer of those sites changes their CA though — such as moving to Cloudflare).
If you do need generic certs, you're realisticly not going to be able to audit all 100+ certs in the normal bundle by yourself. Honestly the built-in OS bundles are not bad — it's just that they get outdated quickly.
As for what Paranoia can do, there's already a paranoia inspect
command that gives a bit more detail about each CA. It's not all that automated though. I'm super interested in thoughts here!
Hi @JamesLaverack sorry for my late reply, thank you for this thorough answer!
Yes the service needs network access but I guess we could look into trust-manager, when running in k8s it may be a viable alternative (even though the service may also run outside k8s therefore someone would have to ship the necessary CA some other way, which may still be acceptable imho).
I've tried using paranoia inspect
and it gave me an interesting output, currently in my bundle there are 12 certificates with issues
I'm thinking about removing these certificate and put them in the rejection list in my .paranoia.yaml
configuration to make sure I don't have them anymore, this may be a nice starting point in using the tool.
On a side note It would be nice to have fingerprints in both paranoia export
and inspect
commands to make it easier to find out where are certificate located and use the fingerprints for exceptions.
What do you think?
Hi there, I was at KCD UK when I found out about this project; I immediately found it interesting and wanted to experiment a little bit with it.
Now I've tried adding the paranoia action in a project I'm maintaining where unfortunately I was already adding lots of cerfiicates so I now find myself with having three options:
paranoia.yml
file anytime a new certificate is issued.I believe that I should stick with option 1, however if that's not feasible what do you think would be the best option in your experience?
Also, assuming that option 1 is not feasible and that auditing +100certificate will be a pain, do you think option 3 can still be useful? I believe it can if paranoia fails the check for some unexpected issues (such as expired certificates, etc) do you see that coming? or have any plan for some interesting features that may be letting me adopt the tool even with such options at hand?
Thanks in advance! Cheers!