diff --git a/backend/generic_handler.py b/backend/generic_handler.py index e27301ee8b701777c44815ea338198a85ae9a011..ec83369d1c94e9c38e0ae3fc216ea0c35b3a15c1 100644 --- a/backend/generic_handler.py +++ b/backend/generic_handler.py @@ -37,6 +37,9 @@ class Verificator: expiry = handler.connect(False) return TLSDetails(domain_name=domain, expires_in_days=expiry) elif e.verify_code == REVOKED: + # This never happens, as we do not have any CRLs or OCSP set up :( + # It's a massive pain and I'm not sure it's worth the considerable extra code + # Maybe look into MetLife/OCSPChecker but idk return TLSDetails(domain_name=domain, error_message="was revoked.") elif e.verify_code == SELF_SIGNED: return TLSDetails(domain_name=domain, error_message="is self-signed.") diff --git a/backend/input.json b/backend/input.json index cb40cfbf146ccef1a1ca9287ce99bdd1ba7517c7..039b8cd9c82d4827904f894c2848cb4573a7ad1e 100644 --- a/backend/input.json +++ b/backend/input.json @@ -6,6 +6,7 @@ "self-signed.badssl.com", "untrusted-root.badssl.com", "revoked.badssl.com", + "rsa-revoked.ca-2.test.pkiworks.com", "pinning-test.badssl.com", "c3l.lu", "www.c3l.lu",