Tools or services used in conjunction with or used by the CCADB.
Status: In use
Description: APIs to enable Certificate Authorities (CAs) to automate retrieving and updating intermediate certificate data in the CCADB.
Usage: The REST API accepts JSON payloads and it is integrated via Salesforce Connected App. GetCertificateIdAPI https:/[HOST_URL]/services/apexrest/get/recordid Returns the root or intermediate certificate record Id (Salesforce Id) in the CCADB. AddUpdateIntermediateCertAPI https:/[HOST_URL]/services/apexrest/create/intermediatecert Add or update an intermediate certificate record in the CCADB.
Used By: This service is only available to CAs whose root certificates are included within the root stores of CCADB root store members.
Status: In use
Description: Extracts EV-enablement data from ExtendedValidation.cpp. Returns a JSON list for each root cert in ExtendedValidation.cpp containing: EV OID, cert SHA256 Fingerprint, Cert Issuer, Cert Serial Number.
Used By: Used to fill in the “ExtendedValidation.cpp OIDs” fields on root certs in the CCADB. There is a CCADB home page report that alerts when that does not match the published “Mozilla EV Policy OID(s)” field.
Status: In use
Description: Web UI for viewing crt.sh's cached certificate linting results. Traverses down the CA hierarchy starting at the specified certificate, for the specified date range and cert statuses, summarizes the specified lint test findings.
Usage: https://cachecker-dot-ccadb-231121.appspot.com/
Used By: Mozilla CA Program Managers, other root store members of the CCADB, and CAs.
Status: BROKEN -- Bugzilla changed, and implementation was never finished.
Description: Identify the CA Compliance bugs that need attention. The intent was to improve our workflow for CA Incident Bugs, such as provide a site for getting a CA Incident Digest that would quickly identify the CA incident bugs that we need to pay attention to.
Usage:
Used By: Would be used by Mozilla CA Program Managers and other root store members of the CCADB.
Status: In use
Description: Checks that certificates for the 3 test websites provided by the CA for their root certificate work as expected, are configured correctly, and pass lint tests. Runs tests to verify that the three sample websites required by the CAB Forum Baseline Requirements (for valid, expired, and revoked certificates) do in fact chain up to the specified root certificate and that the status of TLS certificates are as expected (valid, expired, or revoked). Lint tests are also run on the test website TLS certificates.
Usage: curl -X POST -H "Content-Type: application/json" --data "$TESTINFO" https://ccadb-231121.appspot.com/fromCertificateDetails
example
TESTINFO=$(cat <<EOF { "CertificateDetails":[ { "RecordID":"234571894056781356", "Name":"SSL.com Root Certification Authority ECC", "PEM":"-----BEGIN CERTIFICATE----- MIICjTCCAhSgAwIBAgIIdebfy8FoW6gwCgYIKoZIzj0EAwIwfDELMAkGA1UEBhMC VVMxDjAMBgNVBAgMBVRleGFzMRAwDgYDVQQHDAdIb3VzdG9uMRgwFgYDVQQKDA9T U0wgQ29ycG9yYXRpb24xMTAvBgNVBAMMKFNTTC5jb20gUm9vdCBDZXJ0aWZpY2F0 aW9uIEF1dGhvcml0eSBFQ0MwHhcNMTYwMjEyMTgxNDAzWhcNNDEwMjEyMTgxNDAz WjB8MQswCQYDVQQGEwJVUzEOMAwGA1UECAwFVGV4YXMxEDAOBgNVBAcMB0hvdXN0 b24xGDAWBgNVBAoMD1NTTCBDb3Jwb3JhdGlvbjExMC8GA1UEAwwoU1NMLmNvbSBS b290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5IEVDQzB2MBAGByqGSM49AgEGBSuB BAAiA2IABEVuqVDEpiM2nl8ojRfLliJkP9x6jh3MCLOicSS6jkm5BBtHllirLZXI 7Z4INcgn64mMU1jrYor+8FsPazFSY0E7ic3s7LaNGdM0B9y7xgZ/wkWV7Mt/qCPg CemB+vNH06NjMGEwHQYDVR0OBBYEFILRhXMw5zUE044CkvvlpNHEIejNMA8GA1Ud EwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAUgtGFczDnNQTTjgKS++Wk0cQh6M0wDgYD VR0PAQH/BAQDAgGGMAoGCCqGSM49BAMCA2cAMGQCMG/n61kRpGDPYbCWe+0F+S8T kdzt5fxQaxFGRrMcIQBiu77D5+jNB5n5DQtdcj7EqgIwH7y6C+IwJPt8bYBVCpk+ gA0z5Wajs6O7pdWLjwkspl1+4vAHCGht0nxpbl/f5Wpl -----END CERTIFICATE-----", "TestWebsiteValid":"https://test-dv-ecc.ssl.com", "TestWebsiteRevoked":"https://revoked-ecc-dv.ssl.com", "TestWebsiteExpired":"https://expired-ecc-dv.ssl.com" } ] } EOF )
Used By: Automatically run by CCADB in the TEST WEBSITES tab in Add/Update Root Request cases.
Status: In use
Description: Identifies the differences between a given certdata.txt file and the corresponding data in the CCADB, in regards to which root certificates are included in Mozilla’s root store, and which trust bits are enabled for each root certificate.
Usage: https://github.com/mozilla/CCADB-Tools/tree/master/certdataDiffCCADB
Used By: Mozilla root store managers run a report in the CCADB that calls https://certdatadiff-dot-ccadb-231121.appspot.com/certdata which compares a CCADB report of current data with the cerdata.txt in Firefox Beta.
Status: In use
Description: Parses the PEM of a certificate and outputs a JSON response that CCADB uses to fill in the data on the certificate record in the CCADB.
Usage: curl -X POST -F certificate=@certificate.pem https://certificate-dot-ccadb-231121.appspot.com/certificate
Used By: Used by the CCADB to create a root or intermediate certificate record corresponding to the certificate PEM.
Status: In use
Description: Verify that there is an entry for the certificate in the CRL. Checks that the revoked certificate’s entry for a given CRL is as expected: there is an entry in the given CRL whose serial matches the given serial, its revocation date matches that which is provided, and revocation reason matches the provided reason.
Usage: Example: curl -d '{"crl": "http://crl.ws.symantec.com/pca1-g3.crl","serial": "fc788d52d4441678243b9882cb15b4","revocationDate": "2019/05/07"}' https://crlverification-dot-ccadb-231121.appspot.com/
Used By: Automatically run by CCADB when a certificate is indicated to be revoked. Also can be invoked via the 'Verify Revocation' button on intermediate certificate records.
Status: In use
Description: Checks if the root cert and its chain are properly configured for EV Treatment. This test is done for verification of root inclusion requests for which EV is to be enabled.
Usage: https://evready-dot-ccadb-231121.appspot.com/evready
Used By: Used by CAs and root store operators.
Status: BROKEN -- Broke when Firefox profile directory names became randomized.
Description: Computes the set differences between Kinto, Firefox Nightly's cert_storage, and (optionally) revocations.txt.
Usage:
Used By: Was used by “Data Integrity - OneCRL cert-storage” and “Data Integrity - OneCRL revocations.txt” reports in the CCADB.
Status: BROKEN -- was replaced by kinto_integrity when the OneCRL mechanism was changed.
Description: Compare CCADB data against OneCRL data. Compares the "OneCRL Status" field from each certificate in PublicIntermediateCertsRevokedWithPEMCSV and attempts to find it within OneCRL.
Usage: https://onecrldiff-dot-ccadb-231121.appspot.com
Used By: Was used by “Data Integrity - OneCRL cert-storage” report in the CCADB
Status: BROKEN
Description: Was intended to serve as a version controlled history of OneCRL. Finds incremental differences in OneCRL and uses a git repository as a way to provide a history of OneCRL. Also attempts to find the associate certificate for each OneCRL entry in crt.sh.
Usage:
Used By: Implementation was not completed.