Hi Kay, This update has potential to break RubyGems with error: $ gem fetch power_assert ERROR: Could not find a valid gem 'power_assert' (>= 0), here is why: Unable to download data from https://rubygems.org/ - SSL_connect returned=1 errno=0 state=SSLv3 read server certificate B: certificate verify failed (https://s3.amazonaws.com/production.s3.rubygems.org/latest_specs.4.8.gz) Upstream RubyGems ships the certificates, but on your request, I removed the bundled certificates [1]. Now, 3 months later are RubyGems broken in F21+ due to this update. Luckily, I have never backported this commit to F20, so this particular update is not harmful for stable Fedora release, but what am I supposed to do with F21+? I don't feel like contacting Amazon. You claim that nothing should break and Mozilla contacted everybody, so why not Amazon? Are they so negligible? Should I follow your advises or follow upstream? Sorry, but this puzzles me ... Vít [1] http://pkgs.fedoraproject.org/cgit/ruby.git/commit/?id=efdf386e3192775d84b69006d3bc12d5532455d2 Dne 18.8.2014 23:48, Kai Engert napsal(a): > Hello, > > this is a heads-up for an update to the ca-certificates package that > I've just submitted for updates-testing for Fedora 19 and 20. > > The upstream Mozilla CA list maintainers have decided to start removing > CA certificates that use a weak 1024-bit key. Although those > certificates are still valid, Mozilla has worked with the CAs, and they > did agree that it's OK to remove them. > > However, there are end-entity and intermediate-CA certificates which > have been issued by the removed CAs, which are still valid, and they > might still be used by some - despite the CAs having attempted to reach > out to all their customers and getting them to reconfigure their > systems. > > This means, when installing the updated ca-certificates package version > 2014.2.1, some SSL/TLS connections might suddenly fail, because the > related CA certificate is no longer trusted. > > If you experience such situations, the right approach is to contact the > owner of the certificate (or the server), and ask them to get a > replacement certificate, or to install a replacement certificate on > their SSL/TLS server. > > Additional details can be found in the update description, which I'll > paste at the end of this message. > > (I have disabled karma-automation for this update, in case there's a > need for a longer testing period. Note that this updated set of CA > certificates is currently planned to be part of Firefox 32, which will > get released around SEP 02.) > > Regards > Kai > > > Update description: > =================== > This is an update to the latest released set of CA certificates > according to the Mozilla CA Policy. It's the same set that has been > released in NSS versions 3.16.4 and 3.17. > > It's noteworthy that several CA certificates with a weak key size of > 1024-bits have been removed, prior to their expiration. (It is expected > that additional CA certificates with weak 1024-bit keys will be removed > in future releases.) > > The removed CA certificates have been used to issue end-entity and > intermediate-CA certificates which are still valid. Those certificates > are likely to be rejected when using this upated ca-certificates > package. The owners of affected certificates should contact their CA and > ask for replacement certificates. In some scenarios it might be > sufficient to install an alternative intermediate CA certificate (e.g. > on a TLS server), allowing an alternative trust chain to another root CA > certificate to be found. > > More information about the affected CA certificates and other recent > modifications can be found in the NSS release notes for version 3.16.3 > at > https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.16.3_release_notes with amendments to the changes as explained in the NSS release notes for version 3.16.4 https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.16.4_release_notes > > -- devel mailing list devel@xxxxxxxxxxxxxxxxxxxxxxx https://admin.fedoraproject.org/mailman/listinfo/devel Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct