Trust store generator scripts for various Gemini clients
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
nervuri 0046798424
fix IDN conversion failure in generator scripts
3 weeks ago
agunua fix IDN conversion failure in generator scripts 3 weeks ago
amfora fix IDN conversion failure in generator scripts 3 weeks ago
lagrange fix IDN conversion failure in generator scripts 3 weeks ago
LICENSE.txt init 2 months ago
README.md add hosts from Lupa 3 weeks ago
cert-details.sh init 2 months ago
expiry-boundaries.sh init 2 months ago
get-certs.sh output certs to stderr on Tor verification failure 3 weeks ago
get-hosts.sh add hosts from Lupa 3 weeks ago
main.sh add start and end date/time to main.sh 2 months ago
test-hosts init 2 months ago

README.md

Gemini Trust Store Generators

Geminispace is (currently) small enough that we can afford to download all known capsules' TLS certificates and use them to generate trust stores for various Gemini clients. If verified via multiple network perspectives, using a pre-generated trust store is a major improvement over blindly trusting-on-first-use.

This repo contains scripts for:

  1. downloading a list of hosts from geminispace.info and Lupa
  2. downloading the TLS certificates of those hosts
  3. generating a table containing details about each certificate
  4. generating trust stores for various Gemini clients, currently:

Trust stores generated by these scripts can be found at https://tildegit.org/nervuri/trust-stores

Dependencies

Required: OpenSSL, idn

Optional: torsocks (for .onion capsules and for double-checking certificates using a different network perspective)

To install them in Debian, run: sudo apt install openssl idn torsocks

Usage

./main.sh will run all scripts. For the trust stores repo, I use time ./main.sh >log-stdout 2>log-stderr. For 893 hosts, the command takes around 80 minutes to complete with Tor verification and 45 minutes without.

get-certs.sh accepts tor as an optional argument, to double-check certificates using the Tor network. If you have torsocks installed, this option will automatically be used when you run ./main.sh.

All trust store generators accept certificate expiry boundaries as arguments. Ex:

./generate.sh          # all certs
./generate.sh 90+      # certs that will expire in more than 90 days from now
./generate.sh 30-      # certs that have expired more than 30 days ago
./generate.sh 30- 90+  # both of the above; in other words, certs are excluded if:
                       # {30 days ago} < cert_expiry < {90 days from now}

This is to assist client developers who wish to bundle pre-generated trust stores with their clients, but only want to include long-lived (and long-expired) certificates.

How to contribute

The project is hosted at tildegit.org. If you don't want to make an account, just shoot me an email with your patch/suggestion/bug report/whatever else.