tech-userlevel archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

Re: [PATCH] HTTPS/TLS CA certificates in base



There was a previous thread that mooted the idea of using the project
built mozilla-rootcerts packages (which are just tarfiles) as the
source for some mechanism to populate on-system certificates, such as
your proposed certctl. (mozilla-rootcerts is the base package which
just populates into PREFIX, not mozilla-rootcerts-openssl which put
data in /etc)

https://mail-index.netbsd.org/tech-userlevel/2023/08/04/msg014092.html

It would probably involve:
- Ensuring that each quarterly package release put the latest
mozilla-rootcerts in a Well Defined Location

Which would give:
- Always getting the latest certificates on install, whether
installing 10.0 the moment its released, or in three years time
- The same location to pick up updated certificates for a previously
installed system

There is still the bootstrapping issue, which could be managed by any of:
- Including just enough NetBSD certificates in base to make the initial download
- Signed packages
- Ignoring the issue and just installing over https without validation

The mechanism for getting the mozilla-rootcerts package data onto the
system could be:
1) certctl Just Downloads And Extracts The Package Tarfile
2) Having the default sysinst flow install pkgin and mozilla-rootcerts
(with opt-out), which also provides a ready mechanism to keep the data
updated (pkgin upgrade)

I rather like option 2), because while it makes the default path to
getting trust anchors installed conditional on installing pkgin, that
_should_ be the default path for someone new to NetBSD, and anyone
running up their own packages and install mechanism can just make sure
mozilla-rootcerts is installed and run certctl.

(Whether any of the above is useful, thanks for taking action on this)

David



Home | Main Index | Thread Index | Old Index