Changeset 6133936 for postlfs


Ignore:
Timestamp:
09/04/2021 03:45:41 AM (3 years ago)
Author:
DJ Lucas <dj@…>
Branches:
11.1, 11.2, 11.3, 12.0, 12.1, kea, ken/TL2024, ken/inkscape-core-mods, ken/tuningfonts, lazarus, lxqt, plabs/newcss, plabs/python-mods, python3.11, qt5new, rahul/power-profiles-daemon, renodr/vulkan-addition, trunk, upgradedb, xry111/intltool, xry111/llvm18, xry111/soup3, xry111/test-20220226, xry111/xf86-video-removal
Children:
31dc50d
Parents:
673c070
Message:

Update to make-ca-1.8.1.

Location:
postlfs/security
Files:
2 edited

Legend:

Unmodified
Added
Removed
  • postlfs/security/make-ca.xml

    r673c070 r6133936  
    1111
    1212  <!ENTITY make-ca-download      "https://github.com/djlucas/make-ca/releases/download/v&make-ca-version;/make-ca-&make-ca-version;.tar.xz">
    13   <!ENTITY make-ca-size          "28.5 KB">
    14   <!ENTITY make-ca-md5sum        "e0356f5ae5623f227a3f69b5e8848ec6">
     13  <!ENTITY make-ca-size          "29.8 KB">
     14  <!ENTITY make-ca-md5sum        "957c39206ba0e9139807c5a47535747f">
    1515]>
    1616
     
    221221    <para>
    222222      The <filename class="directory">/etc/ssl/local</filename> directory
    223       is available to add additional CA certificates to the system. For
    224       instance, you might need to add an organization or government CA
    225       certificate. Files in this directory must be in the
    226       <application>OpenSSL</application> trusted certificate format. To
    227       create an <application>OpenSSL</application> trusted certificate from
    228       a regular PEM encoded file, you need to add trust arguments to the
     223      is available to add additional CA certificates to the system trust store.
     224      This directory is also used to store certificates that were added to or
     225      modified  in the system trust store by <xref linkend="p11-kit"/> so that
     226      trust values are maintained across upgrades. Files in this directory must
     227      be in the <application>OpenSSL</application> trusted certificate format.
     228      Certificates imported using the <command>trust</command> utility from
     229      <xref linkend="p11-kit"/> will utilize the x509 Extended Key Usage values
     230      to assign default trust values for the system anchors.
     231    </para>
     232
     233    <para>If you need to override trust values, or otherwise need to create
     234      an <application>OpenSSL</application> trusted certificate manually
     235      from a regular PEM encoded file, you need to add trust arguments to the
    229236      <command>openssl</command> command, and create a new certificate. For
    230237      example, using the <ulink url="http://www.cacert.org/">CAcert</ulink>
     
    243250        -addtrust serverAuth -addtrust emailProtection -addtrust codeSigning \
    244251        > /etc/ssl/local/CAcert_Class_3_root.pem &amp;&amp;
    245 /usr/sbin/make-ca -r -f</userinput></screen>
     252/usr/sbin/make-ca -r</userinput></screen>
    246253
    247254    <bridgehead renderas="sect3">Overriding Mozilla Trust</bridgehead>
     
    265272             -addreject codeSigning \
    266273       > /etc/ssl/local/Disabled_Makebelieve_CA_Root.pem &amp;&amp;
    267 /usr/sbin/make-ca -r -f</userinput></screen>
     274/usr/sbin/make-ca -r</userinput></screen>
    268275
    269276  </sect2>
  • postlfs/security/p11-kit.xml

    r673c070 r6133936  
    104104/usr/libexec/make-ca/copy-trust-modifications
    105105
    106 # Generate a new trust store
    107 /usr/sbin/make-ca -f -g</literal>
     106# Update trust stores
     107/usr/sbin/make-ca -r</literal>
    108108EOF</userinput></screen>
    109109
Note: See TracChangeset for help on using the changeset viewer.