On 01/12/2018 05:54 PM, [email protected] wrote:
Hi,

I do have a TLS certificate issue in BLFS, maybe someone can enlighten me what's happening here:

<snip>

Adding the actual root certificate of dev-static.rust-lang.org to /etc/ssl/certs (i.e. the one without additional Trusted Uses) makes curl and therefore rustc happy.

Please undo this and see below.

What am I missing? Who added that trust? Why is the one without trust needed instead? What would be in charge of ignoring the trust? Is anybody else seeing this?

In order...

Your curl was built against Gnutls for the TLS provider but wasn't configured to use it (pass --with-ca-bundle=/etc/ssl/ca-bundle.crt to configure).

Mozilla selected the trust bits. Take a look over the ca-certificates page to understand how and why. I did put some effort into making that page understandable. If I've failed in that endeavor, I'd like to know how to make it better.

See the answer to the first question.

Nope! :-) Gnutls's OpenSSL compatibility is incomplete and cannot use the OpenSSL trusted certificates in /etc/ssl/certs, though it can _probably_ use PCKS#11 via P11-kit to support out of band trust (but I have no idea host to configure it).

Most prefer OpenSSL for the TLS provider for curl. However, if there is some aversion to OpenSSL (licensing, security, other), there is NSS or Libre-SSL (or any of like 9 providers, and possibly using Gnutls with P11-kit). Alternately, very few people ever use curl as an alternate client, or really for anything more than downloading files, so you might get away without a rebuild by adding "cacert=/etc/ssl/ca-bundle.crt" to your ~/.curlrc.

HTH

--DJ

--
http://lists.linuxfromscratch.org/listinfo/blfs-support
FAQ: http://www.linuxfromscratch.org/blfs/faq.html
Unsubscribe: See the above information page

Reply via email to