Re: update on ca-certificates, introducing the ca-legacy utility

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 





On Fri, 2014-11-21 at 14:03 +0100, Kai Engert wrote:
> On Fri, 2014-10-31 at 14:05 +0100, Kai Engert wrote:
> > All legacy root CA certificates, which seem to be required for full
> > compatibility with either OpenSSL or GnuTLS, will continue to be
> > included and enabled in the ca-certificates package.
> > 
> > For users who are willing to accept the breakage and prefer using the
> > latest trust, only, we provide a mechanism to disable the legacy trust.
> > 
> > I've described the proposed approach in more detail at
> > https://bugzilla.redhat.com/show_bug.cgi?id=1158197
> > 
> > I've pushed experimental packages with this implementation to Rawhide
> > and updates-testing for Fedora 21. I have disabled the karma automatism,
> > because I'll be offline for the next 2 weeks, and don't want things to
> > go live while I'm away. I think it will be helpful to collect test
> > feedback during that time, and see if it's suitable, and make a
> > ship/no-ship decision of this approach later.
> 
> 
> In the meantime, while I was on vacation, the above has been
> (accidentally) pushed as a stable update for Fedora 21 already:
>     ca-certificates-2014.2.1-1.5.fc21.noarch
> 
> It seems it will be included in the final release of Fedora 21. Given
> that we keep legacy trust enabled, and given that I haven't seen any
> problem reports, it's probably OK.
> 
> Using the new ca-legacy utility, users/administrators who are willing to
> accept the compatibility issues and who prefer to closely follow the
> Mozilla CA trust decisions, can disable trust for the legacy root CA
> certificates as a systemwide configuration, by executing this command as
> root:
>   ca-legacy disable
> 
> The configuration will be remembered in /etc/pki/ca-trust/ca-legacy.conf
> and will be used on future package upgrades, when additional
> certificates are moved to the legacy state.
> 
> If required, it's possible to undo the configuration and restore to the
> current default, using:
>   ca-legacy enable
> 
> The current configuration can be shown using:
>   ca-legacy check
> 
> Regarding Fedora 19 and Fedora 20:
> 
> On F19/F20, GnuTLS is also affected by the breakage, when disabling
> trust for the legacy CAs, because GnuTLS has been enhanced in Fedora 21
> and later, only.
> 
> Updated packages for F19 and F20, that provide the update to version 2.1
> of the ca-certificates list, and which also include the new ca-legacy
> utility and configuration mechanism, have been pushed to
> updates-testing:
> https://admin.fedoraproject.org/updates/ca-certificates-2014.2.1-1.5.fc19
> https://admin.fedoraproject.org/updates/ca-certificates-2014.2.1-1.5.fc20
> 
> Kai
> 
> 

Kai, this is very important information buried at the bottom of a long
email thread; would you mind re-sending this summary in a new thread
(also to devel-announce) so that people are sure to see it?

Attachment: signature.asc
Description: This is a digitally signed message part

-- 
devel mailing list
devel@xxxxxxxxxxxxxxxxxxxxxxx
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Index of Archives]     [Fedora Announce]     [Fedora Kernel]     [Fedora Testing]     [Fedora Formulas]     [Fedora PHP Devel]     [Kernel Development]     [Fedora Legacy]     [Fedora Maintainers]     [Fedora Desktop]     [PAM]     [Red Hat Development]     [Gimp]     [Yosemite News]
  Powered by Linux