Changeset c10fe29


Ignore:
Timestamp:
05/19/2017 06:02:20 AM (7 years ago)
Author:
DJ Lucas <dj@…>
Branches:
10.0, 10.1, 11.0, 11.1, 11.2, 11.3, 12.0, 12.1, 8.1, 8.2, 8.3, 8.4, 9.0, 9.1, basic, bdubbs/svn, elogind, kea, ken/TL2024, ken/inkscape-core-mods, ken/tuningfonts, lazarus, lxqt, perl-modules, plabs/newcss, plabs/python-mods, python3.11, qt5new, rahul/power-profiles-daemon, renodr/vulkan-addition, trunk, upgradedb, xry111/intltool, xry111/llvm18, xry111/soup3, xry111/test-20220226, xry111/xf86-video-removal
Children:
ef30906a
Parents:
5987bf1
Message:

Use real example for cacerts page, remove i18n.sh from systemd.

git-svn-id: svn://svn.linuxfromscratch.org/BLFS/trunk/BOOK@18741 af4574ff-66df-0310-9fd7-8a98e5e911e0

Location:
postlfs
Files:
2 edited

Legend:

Unmodified
Added
Removed
  • postlfs/config/profile.xml

    r5987bf1 rc10fe29  
    336336    </sect3>
    337337-->
    338     <sect3 id="i18n.sh">
     338    <sect3 id="i18n.sh" revision="sysv">
     339    <!-- This is handled system wide on systemd -->
    339340      <title>/etc/profile.d/i18n.sh</title>
    340341
  • postlfs/security/cacerts.xml

    r5987bf1 rc10fe29  
    114114    certificate distribution, you need to add trust arguments to the
    115115    <command>openssl</command> command, and create a new certificate. There are
    116     three trust types that are recognised by the
     116    three trust types that are recognized by the
    117117    <application>make-ca.sh</application> script, SSL/TLS, S/Mime, and code
    118     signing. For example, to allow a certificate to be trusted for both
    119     SSL/TLS and S/Mime, but explicitly rejected for code signing, you could use
    120     the following commands to create a new trusted certificate that has those
    121     trust attributes:</para>
    122 
    123 <screen><literal>openssl x509 -in MyRootCA.pem -text -fingerprint -setalias "My Root CA 1"     \
    124         -addtrust serverAuth -addtrust emailProtection -addreject codeSigning \
    125         > MyRootCA-trusted.pem</literal></screen>
    126 
    127     <para>If a trust argument is omitted, the certificate is neither trusted,
    128     nor rejected. Clients that use <application>OpenSSL</application> or
    129     <application>NSS</application> encountering this certificate will present
    130     a warning to the user. Clients using <application>GnuTLS</application>
    131     without <application>p11-kit</application> support are not aware of trusted
     118    signing. For example, using the
     119    <ulink url="http://www.cacert.org/">CAcert</ulink> root, if you want it to
     120    be trusted for all three roles, the following commands will create an
     121    appropriate OpenSSL trusted certificate:</para>
     122
     123<screen role="root"><userinput>install -vdm755 /etc/ssl/local &amp;&amp;
     124wget http://www.cacert.org/certs/root.crt &amp;&amp;
     125openssl x509 -in root.crt -text -fingerprint -setalias "CAcert Class 1 root" \
     126        -addtrust serverAuth -addtrust emailProtection -addtrust codeSigning \
     127        > /etc/ssl/local/CAcert_Class_1_root.pem</userinput></screen>
     128
     129    <para>If one of the three trust arguments is omitted, the certificate is
     130    neither trusted, nor rejected for that role. Clients that use
     131    <application>OpenSSL</application> or <application>NSS</application>
     132    encountering this certificate will present a warning to the user. Clients
     133    using <application>GnuTLS</application> without
     134    <application>p11-kit</application> support are not aware of trusted
    132135    certificates. To include this CA into the ca-bundle.crt (used for
    133136    <application>GnuTLS</application>), it must have <envar>serverAuth</envar>
    134     trust.</para>
     137    trust. Additionally, to explicitly disallow a certificate for a particular
     138    use, replace the <parameter>-addtrust</parameter> flag with the
     139    <parameter>-addreject</parameter> flag.</para>
    135140
    136141    <para>To install the various certificate stores, first install the
Note: See TracChangeset for help on using the changeset viewer.