Ignore:
File:
1 edited

Legend:

Unmodified
Added
Removed
  • postlfs/security/make-ca.xml

    r31dc50d r9873d1ea  
    1111
    1212  <!ENTITY make-ca-download      "https://github.com/djlucas/make-ca/releases/download/v&make-ca-version;/make-ca-&make-ca-version;.tar.xz">
    13   <!ENTITY make-ca-size          "30 KB">
    14   <!ENTITY make-ca-md5sum        "957c39206ba0e9139807c5a47535747f">
     13  <!ENTITY make-ca-size          "28.5 KB">
     14  <!ENTITY make-ca-md5sum        "e0356f5ae5623f227a3f69b5e8848ec6">
    1515]>
    1616
     
    1919
    2020  <sect1info>
     21    <othername>$LastChangedBy$</othername>
    2122    <date>$Date$</date>
    2223  </sect1info>
     
    5253    </para>
    5354
    54   &lfs110a_checked;
     55  &lfs10_checked;
    5556
    5657    <bridgehead renderas="sect3">Package Information</bridgehead>
     
    221222    <para>
    222223      The <filename class="directory">/etc/ssl/local</filename> directory
    223       is available to add additional CA certificates to the system trust store.
    224       This directory is also used to store certificates that were added to or
    225       modified  in the system trust store by <xref linkend="p11-kit"/> so that
    226       trust values are maintained across upgrades. Files in this directory must
    227       be in the <application>OpenSSL</application> trusted certificate format.
    228       Certificates imported using the <command>trust</command> utility from
    229       <xref linkend="p11-kit"/> will utilize the x509 Extended Key Usage values
    230       to assign default trust values for the system anchors.
    231     </para>
    232 
    233     <para>If you need to override trust values, or otherwise need to create
    234       an <application>OpenSSL</application> trusted certificate manually
    235       from a regular PEM encoded file, you need to add trust arguments to the
     224      is available to add additional CA certificates to the system. For
     225      instance, you might need to add an organization or government CA
     226      certificate. Files in this directory must be in the
     227      <application>OpenSSL</application> trusted certificate format. To
     228      create an <application>OpenSSL</application> trusted certificate from
     229      a regular PEM encoded file, you need to add trust arguments to the
    236230      <command>openssl</command> command, and create a new certificate. For
    237231      example, using the <ulink url="http://www.cacert.org/">CAcert</ulink>
     
    250244        -addtrust serverAuth -addtrust emailProtection -addtrust codeSigning \
    251245        > /etc/ssl/local/CAcert_Class_3_root.pem &amp;&amp;
    252 /usr/sbin/make-ca -r</userinput></screen>
     246/usr/sbin/make-ca -r -f</userinput></screen>
    253247
    254248    <bridgehead renderas="sect3">Overriding Mozilla Trust</bridgehead>
     
    272266             -addreject codeSigning \
    273267       > /etc/ssl/local/Disabled_Makebelieve_CA_Root.pem &amp;&amp;
    274 /usr/sbin/make-ca -r</userinput></screen>
     268/usr/sbin/make-ca -r -f</userinput></screen>
    275269
    276270  </sect2>
     
    301295            is a shell script that adapts a current version of
    302296            <filename>certdata.txt</filename>, and prepares it for use
    303             as the system trust store
     297            as the system trust store.
    304298          </para>
    305299          <indexterm zone="make-ca make-ca">
     
    311305
    312306  </sect2>
    313 
    314307</sect1>
Note: See TracChangeset for help on using the changeset viewer.