tech-userlevel archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

Re: [Christos Zoulas] CVS commit: src/usr.bin/ftp



On 02/09/2022 18:32, Martin Husemann wrote:
Could be something easy like using the mozilla root certs from last quarters
pkgsrc branch, downloadable from some well known NetBSD.org URL.

Either the original bin pkg and a (special) base system script to unpack
and update (w/o pkg_add and architecture check), or some automatic
magic on the server side to rebundle them in the format expected by the
update script on the client side.

I like the way curl.se delivers it.  It's also the mozilla bundle but as a single file, which is easier to track for changes.

https://curl.se/ca/cacert.pem
https://curl.se/ca/cacert.pem.sha256
(gets updated now and then)

However, it often requires some tuning, as most applications are expecting a path for trust anchors, not a single file.

Postfix

        #smtpd_tls_CApath = no
        smtpd_tls_CAfile = /etc/openssl/cacert.pem

        #smtp_tls_CApath = no
        smtp_tls_CAfile = /etc/openssl/cacert.pem

wget

        vi /etc/wgetrc

        ca_certificate = /etc/openssl/cacert.pem

GIT

        vi ~/.gitconfig

        [http]
                sslCAinfo = /etc/openssl/cacert.pem

for curl itself

        vi ~/.curlrc

        cacert /etc/openssl/cacert.pem

--OR--

        vi ~/.profile

        export CURL_CA_BUNDLE=/etc/openssl/cacert.pem

I am not sure in what situation some application might require the hashed filename flavor of the certs, see c_rehash(1ssl).  I could happily live with that setup for cert verification, for a while and without problems.

-pph


Home | Main Index | Thread Index | Old Index