Changeset c10fe29
- Timestamp:
- 05/19/2017 06:02:20 AM (7 years ago)
- Branches:
- 10.0, 10.1, 11.0, 11.1, 11.2, 11.3, 12.0, 8.1, 8.2, 8.3, 8.4, 9.0, 9.1, basic, bdubbs/svn, elogind, kea, ken/inkscape-core-mods, ken/tuningfonts, lazarus, lxqt, perl-modules, plabs/python-mods, qt5new, renodr/vulkan-addition, trunk, upgradedb, xry111/intltool, xry111/soup3, xry111/test-20220226, xry111/xf86-video-removal
- Children:
- ef30906
- Parents:
- 5987bf1
- Location:
- postlfs
- Files:
-
- 2 edited
Legend:
- Unmodified
- Added
- Removed
-
postlfs/config/profile.xml
r5987bf1 rc10fe29 336 336 </sect3> 337 337 --> 338 <sect3 id="i18n.sh"> 338 <sect3 id="i18n.sh" revision="sysv"> 339 <!-- This is handled system wide on systemd --> 339 340 <title>/etc/profile.d/i18n.sh</title> 340 341 -
postlfs/security/cacerts.xml
r5987bf1 rc10fe29 114 114 certificate distribution, you need to add trust arguments to the 115 115 <command>openssl</command> command, and create a new certificate. There are 116 three trust types that are recogni sed by the116 three trust types that are recognized by the 117 117 <application>make-ca.sh</application> script, SSL/TLS, S/Mime, and code 118 signing. For example, to allow a certificate to be trusted for both 119 SSL/TLS and S/Mime, but explicitly rejected for code signing, you could use 120 the following commands to create a new trusted certificate that has those 121 trust attributes:</para> 122 123 <screen><literal>openssl x509 -in MyRootCA.pem -text -fingerprint -setalias "My Root CA 1" \ 124 -addtrust serverAuth -addtrust emailProtection -addreject codeSigning \ 125 > MyRootCA-trusted.pem</literal></screen> 126 127 <para>If a trust argument is omitted, the certificate is neither trusted, 128 nor rejected. Clients that use <application>OpenSSL</application> or 129 <application>NSS</application> encountering this certificate will present 130 a warning to the user. Clients using <application>GnuTLS</application> 131 without <application>p11-kit</application> support are not aware of trusted 118 signing. For example, using the 119 <ulink url="http://www.cacert.org/">CAcert</ulink> root, if you want it to 120 be trusted for all three roles, the following commands will create an 121 appropriate OpenSSL trusted certificate:</para> 122 123 <screen role="root"><userinput>install -vdm755 /etc/ssl/local && 124 wget http://www.cacert.org/certs/root.crt && 125 openssl x509 -in root.crt -text -fingerprint -setalias "CAcert Class 1 root" \ 126 -addtrust serverAuth -addtrust emailProtection -addtrust codeSigning \ 127 > /etc/ssl/local/CAcert_Class_1_root.pem</userinput></screen> 128 129 <para>If one of the three trust arguments is omitted, the certificate is 130 neither trusted, nor rejected for that role. Clients that use 131 <application>OpenSSL</application> or <application>NSS</application> 132 encountering this certificate will present a warning to the user. Clients 133 using <application>GnuTLS</application> without 134 <application>p11-kit</application> support are not aware of trusted 132 135 certificates. To include this CA into the ca-bundle.crt (used for 133 136 <application>GnuTLS</application>), it must have <envar>serverAuth</envar> 134 trust.</para> 137 trust. Additionally, to explicitly disallow a certificate for a particular 138 use, replace the <parameter>-addtrust</parameter> flag with the 139 <parameter>-addreject</parameter> flag.</para> 135 140 136 141 <para>To install the various certificate stores, first install the
Note:
See TracChangeset
for help on using the changeset viewer.