10
2
After two recent Slashdot articles (#1 #2) about questionable Root Certificates installed on machines, I decided to take a closer look at what I have installed on my machines.
(I use current versions of Chrome on Win7, which I understand uses the Windows list of CAs)
What I found really surprised me.
- Two relatively clean machines had vastly different lists of CAs.
- Each had a number of CAs that had expired in 1999 and 2004!
- The identity of many of the CAs is not easy to understand.
I also saw that many certificates expire in 2037, shortly before the UNIX-rollover, presumably to avoid any currently unknown Y2K38-type bugs. But other certs are good for much longer.
I searched around, but, somewhat surprisingly, couldn't find a canonical list of which CAs are generally accepted.
- If I had a MITM rogue cert on my machine, how would I even know?
- Does a list of "accepted" certs exist?
- Am I safe in removing the expired CAs?
- Can I know if/when I have ever used a CA for HTTPS?
1
All excellent questions. You may think about searching some security.stackexchange.com posts
– Rich Homolka – 2014-03-10T18:52:22.340