Raw files related to the newly introduced Russian national certificate authority.
Read my blog post: Russia's certificate authority for sanctioned organizations
graph TD
r1(Russian Trusted Root CA):::r --> s1(Russian Trusted Sub CA):::s
r1 --> s2(Test SubCA):::s
s1 --> l1(*.vtb.ru):::l
s1 --> l2(*.cbr.ru):::l
s2 --> l3(*.mydomain.ru):::l
classDef r fill:#FFE7D4,stroke:#FF8C00;
classDef s fill:#CAE9ED,stroke:#0099B0
classDef l fill:#CEE4F6,stroke:#007EDC
Encrypted configuration files can be decrypted as follows.
cd ./yandex
key=".5I(oR[LGJ7gGr4*Q-Tw90M8VNa6D^io"
# first block is the IV
iv="$(head -c16 ./custom_root_certs.enc)"
# skip the first block and decrypt
tail -c +17 ./custom_root_certs.enc | \
openssl aes-256-cbc -d -K "$(echo -n $key | xxd -p -c32)" -iv "$(echo -n $iv | xxd -p)" | jq