Re: [openssl-users] openssl verify with 1B certificates

2017-03-31 Thread Michael Wojcik
A lot depends on what you mean by "verify", too. TLS endpoints should perform a large number of checks on certificates; some of them aren't relevant for your purposes, and others might not be. For example, a TLS client such as a browser will check whether the received entity certificate identi

Re: [openssl-users] openssl verify with 1B certificates

2017-03-31 Thread Jakob Bohm
Also consider using the functions that the "openssl verify" command uses (source file: apps/verify.c), perhaps from a bulk process that can be run on each CPU node on your compute cluster. With a little thought, these can be done efficiently, with lots of reused (i.e. not repeated) actions, such

Re: [openssl-users] openssl verify with 1B certificates

2017-03-30 Thread Richard Moore
Depends what information you need - if you just need a binary valid/not valid then prune it first then verify. If you want a more fine grained data set then don't. Write some code - forking and running openssl verify each time will be insanely slow - don't do that. I doubt you really have a billio

[openssl-users] openssl verify with 1B certificates

2017-03-30 Thread ebe ebe
Hello, I am a CS graduate student and doing a measurement study regarding the SSL ecosystem. I have approximately 1 billion SSL certificates and I would like to run openssl verify on each certificate to sift out invalid certificates. My major concern, as you might guess, is whether doing this v