Hurricane Electric's IPv6 Tunnel Broker Forums

Advanced search  

News:

Welcome to Hurricane Electric's Tunnelbroker.net forums!

Author Topic: How or Where to tell?  (Read 189 times)

Walter H.

  • Newbie
  • *
  • Posts: 13
    • View Profile
How or Where to tell?
« on: November 27, 2017, 03:18:22 AM »

Hello,

I noticed on my webserver access for URLs that do not exist any more - I had my own CA - how or where can I contact the person that he/she should delete the root certificate he/she installed from my old web site?

the access is this:


2001:470:1f07:224:8570:356e:2715:7be6 - - [26/Nov/2017:17:00:28 +0100] "GET /certAuth/certFiles/root0CA.crt HTTP/1.1" 404 1573 "-" "com.apple.trustd/1.0"
2001:470:1f07:224:8570:356e:2715:7be6 - - [26/Nov/2017:17:00:28 +0100] "GET /certAuth/certFiles/sub01CA.crt HTTP/1.1" 404 1573 "-" "com.apple.trustd/1.0"
2001:470:1f07:224:8570:356e:2715:7be6 - - [26/Nov/2017:17:00:29 +0100] "GET /certAuth/sub01-ocsp/MFYwVKADAgEAME0wSzBJMAkGBSsOAwIaBQAEFEv14eOItXXlk6X35vX5ywELUtNVBBTt86nFdyMuktmRIXSncpxREuyFSgIQcgeX15gpzUTXjdHimxw8gA%3D%3D HTTP/1.1" 404 1573 "-" "trustd (unknown version) CFNetwork/889.9 Darwin/17.2.0 (x86_64)"
2001:470:1f07:224:8570:356e:2715:7be6 - - [26/Nov/2017:17:00:43 +0100] "GET /certAuth/certFiles/root0CA.crt HTTP/1.1" 404 1573 "-" "com.apple.trustd/1.0"
2001:470:1f07:224:8570:356e:2715:7be6 - - [26/Nov/2017:17:00:44 +0100] "GET /certAuth/certFiles/sub01CA.crt HTTP/1.1" 404 1573 "-" "com.apple.trustd/1.0"
2001:470:1f07:224:8570:356e:2715:7be6 - - [26/Nov/2017:17:00:44 +0100] "GET /certAuth/sub01-ocsp/MFYwVKADAgEAME0wSzBJMAkGBSsOAwIaBQAEFEv14eOItXXlk6X35vX5ywELUtNVBBTt86nFdyMuktmRIXSncpxREuyFSgIQfZyMAz6aa4KAYQUQbZj0AA%3D%3D HTTP/1.1" 404 1573 "-" "trustd (unknown version) CFNetwork/889.9 Darwin/17.2.0 (x86_64)"
2001:470:1f07:224:8570:356e:2715:7be6 - - [26/Nov/2017:17:00:45 +0100] "GET /certAuth/certFiles/root0CA.crt HTTP/1.1" 404 1573 "-" "com.apple.trustd/1.0"
2001:470:1f07:224:8570:356e:2715:7be6 - - [26/Nov/2017:17:00:45 +0100] "GET /certAuth/certFiles/sub01CA.crt HTTP/1.1" 404 1573 "-" "com.apple.trustd/1.0"
2001:470:1f07:224:8570:356e:2715:7be6 - - [26/Nov/2017:17:00:45 +0100] "GET /certAuth/sub01-ocsp/MFYwVKADAgEAME0wSzBJMAkGBSsOAwIaBQAEFEv14eOItXXlk6X35vX5ywELUtNVBBTt86nFdyMuktmRIXSncpxREuyFSgIQfZyMAz6aa4KAYQUQbZj0AA%3D%3D HTTP/1.1" 404 1573 "-" "trustd (unknown version) CFNetwork/889.9 Darwin/17.2.0 (x86_64)"
2001:470:1f07:224:8570:356e:2715:7be6 - - [26/Nov/2017:20:02:35 +0100] "GET /certAuth/certFiles/root0CA.crt HTTP/1.1" 404 1573 "-" "com.apple.trustd/1.0"
2001:470:1f07:224:8570:356e:2715:7be6 - - [26/Nov/2017:20:02:35 +0100] "GET /certAuth/certFiles/sub01CA.crt HTTP/1.1" 404 1573 "-" "com.apple.trustd/1.0"
2001:470:1f07:224:8570:356e:2715:7be6 - - [26/Nov/2017:20:02:36 +0100] "GET /certAuth/sub01-ocsp/MFYwVKADAgEAME0wSzBJMAkGBSsOAwIaBQAEFEv14eOItXXlk6X35vX5ywELUtNVBBTt86nFdyMuktmRIXSncpxREuyFSgIQcgeX15gpzUTXjdHimxw8gA%3D%3D HTTP/1.1" 404 1573 "-" "trustd (unknown version) CFNetwork/889.9 Darwin/17.2.0 (x86_64)"
2001:470:1f07:224:8570:356e:2715:7be6 - - [26/Nov/2017:20:04:39 +0100] "GET /certAuth/certFiles/root0CA.crt HTTP/1.1" 404 1573 "-" "com.apple.trustd/1.0"
2001:470:1f07:224:8570:356e:2715:7be6 - - [26/Nov/2017:20:04:39 +0100] "GET /certAuth/certFiles/sub01CA.crt HTTP/1.1" 404 1573 "-" "com.apple.trustd/1.0"
2001:470:1f07:224:8570:356e:2715:7be6 - - [26/Nov/2017:20:04:39 +0100] "GET /certAuth/sub01-ocsp/MFYwVKADAgEAME0wSzBJMAkGBSsOAwIaBQAEFEv14eOItXXlk6X35vX5ywELUtNVBBTt86nFdyMuktmRIXSncpxREuyFSgIQfZyMAz6aa4KAYQUQbZj0AA%3D%3D HTTP/1.1" 404 1573 "-" "trustd (unknown version) CFNetwork/889.9 Darwin/17.2.0 (x86_64)"
2001:470:1f07:224:8570:356e:2715:7be6 - - [26/Nov/2017:20:04:47 +0100] "GET /certAuth/certFiles/root0CA.crt HTTP/1.1" 404 1573 "-" "com.apple.trustd/1.0"
2001:470:1f07:224:8570:356e:2715:7be6 - - [26/Nov/2017:20:04:48 +0100] "GET /certAuth/certFiles/sub01CA.crt HTTP/1.1" 404 1573 "-" "com.apple.trustd/1.0"
2001:470:1f07:224:8570:356e:2715:7be6 - - [26/Nov/2017:20:04:48 +0100] "GET /certAuth/sub01-ocsp/MFYwVKADAgEAME0wSzBJMAkGBSsOAwIaBQAEFEv14eOItXXlk6X35vX5ywELUtNVBBTt86nFdyMuktmRIXSncpxREuyFSgIQfZyMAz6aa4KAYQUQbZj0AA%3D%3D HTTP/1.1" 404 1573 "-" "trustd (unknown version) CFNetwork/889.9 Darwin/17.2.0 (x86_64)"
Logged

snarked

  • Hero Member
  • *****
  • Posts: 704
    • View Profile
Re: How or Where to tell?
« Reply #1 on: November 27, 2017, 01:24:44 PM »

You're asking the wrong question.  The real question should probably be:  Why doesn't this person understand that a 404 means that the resource isn't there, and why they don't get the clue to give up on it....?

Who really cares if they continue to hold a defunct certificate?

There is a way to create a certificate revocation list (to revoke unexpired certificates, including CA certificates).  However, the details of this construct is beyond my knowledge.  Maybe that's what you need to do if you really care to....
Logged

Walter H.

  • Newbie
  • *
  • Posts: 13
    • View Profile
Re: How or Where to tell?
« Reply #2 on: November 28, 2017, 01:36:08 PM »

Not really, I'd just want to tell the guy, which is behind this HE-IPv6-Tunnel to remove the certificates, because these were one
which I created at the early steps of creating my own CA, and how did they get there?
Logged

divad27182

  • Jr. Member
  • **
  • Posts: 57
    • View Profile
Re: How or Where to tell?
« Reply #3 on: December 02, 2017, 06:27:44 PM »

I think the problem may be more complicated than you think.  If person B got one of your certificates, and person C is talking to person B's machine, you could be seeing verification attempts from C when B is where the issue is at.  In any case, the following might give you a starting point:

$ host 2001:470:1f07:224:8570:356e:2715:7be6
Host 6.e.b.7.5.1.7.2.e.6.5.3.0.7.5.8.4.2.2.0.7.0.f.1.0.7.4.0.1.0.0.2.ip6.arpa not found: 3(NXDOMAIN)
$ host 2001:470:1f07:224::1                 
1.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.4.2.2.0.7.0.f.1.0.7.4.0.1.0.0.2.ip6.arpa domain name pointer router.abellohome.net.
$ host 2001:470:1f06:224::1
1.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.4.2.2.0.6.0.f.1.0.7.4.0.1.0.0.2.ip6.arpa domain name pointer vabello.tunnel.tserv4.nyc4.ipv6.he.net.
$

Alternatively, you could try firewall blocking his address.  Or, more likely to get a reaction, putting a rate limiter on the request.  A one byte per 10 second limit might slow some application he's running down enough that he notices it.
Logged