[OmniOS-discuss] ssl root CA certs
Paul B. Henson
henson at acm.org
Fri Oct 12 19:11:02 EDT 2012
On 10/12/2012 8:53 AM, Eric Sproul wrote:
> I found where the CA certs live in illumos-gate:
> http://src.illumos.org/source/xref/illumos-gate/usr/src/cmd/cmd-crypto/etc/CA-certs/
[...]
> this collection almost certainly contains stale data. Given that, do
> we still want to encourage the use of that set or just point apps at
> /etc/cacert.pem which is more up to date?
It looks like the ones bundled in illumos-gate also come from Mozilla,
by way of being extracted from libnssckbi.so. OI and OmniOS both include
that library, but it doesn't seem to be part of illumos-gate? At least I
couldn't find it. So I guess that's a distribution value added package
;). In theory it seems it would be good for the libnssckbi.so hardcoded
certificates to match the external certificates, so applications don't
do different things depending on whether or not they use NSS or openssl.
I was going to say that if somebody was going to go to the trouble of
updating CA certs, they might as well do it in upstream illumos-gate so
all distributions can avail of it. However, if NSS is added per
distribution, that would make it pretty difficult to keep them synced
up. If root CA's are going to be maintained by the distribution, it
would seem better for illumos-gate to simply not include any at all,
again so as not to have a different set pending on where you look. The
illumos bundled CA's also include a couple from Sun which are presumably
owned by Oracle now, I'd just as soon not have my omnios box trusting
Oracle for anything 8-/.
I think I will bring this up on the illumos developer list and see what
comes of it. My initial thoughts now are that root CA's should just be
dropped out of illumos-gate and handled at the distribution level, that
way there'll be no confusion or mismatch.
On another note, I think it's a lot more efficient to have a directory
full of hashes to individual certificates rather than one big file full
of all of them. In the first case, openssl can pretty much immediately
find what it wants (or determine it doesn't exist), and the second it
has to read the entire file and search for it. It looks like the
upstream certs have those hashes already in /etc/openssl/certs. Rather
than configuring curl and/or wget to point to the big file, it seems it
would be better to set up the hashed directory and have the openssl
library configured to find it, so all openssl apps would work the same
by default...
More information about the OmniOS-discuss
mailing list