On 2/23/19 9:38 PM, Douglas R. Reno via blfs-support wrote:


On 2/23/19 2:35 PM, Bruce Dubbs via blfs-support wrote:
On 2/23/19 1:59 PM, DJ Lucas via blfs-support wrote:

On 2/23/2019 3:54 AM, Ken Moffat wrote:
On Sat, Feb 23, 2019 at 09:32:18AM +0000, DJ Lucas via blfs-support wrote:
On 2/23/2019 3:14 AM, Ken Moffat via blfs-support wrote:
I had a reply off-list suggesting that I try without the local cert
directory. So I renamed that, and retried. Running make-ca -g
succeeded but told me that the certs were up to date. Running make-ca
-f succeeded, the final output was: Certificate: Global Chambersign
Root - 2008 Keyhash: 0c4c9b6c Added to p11-kit anchor directory with
trust 'C,C,'. Extracting OpenSSL certificates to
/etc/ssl/certs...Done! Extracting GNUTLS server auth certificates to
/etc/pki/tls/certs/ca-bundle.crt...Done! Extracting GNUTLS S-Mime
certificates to /etc/pki/tls/certs/email-ca-bundle.crt...Done!
Extracting GNUTLS code signing certificates to
/etc/pki/tls/certs/objsign-ca-bundle.crt...Done! Extracting Java
cacerts (JKS) to /etc/pki/tls/java/cacerts...Done! And running links
to an https: site from chroot now works. I'll keep this around for a
bit in case you are replying to my earlier reply, but I need to sort
out some food, then I'll probably go shopping and then wind down and
go to bed.
Bad cert in the /etc/ssl/local directory caused that to cascade like
that? I can't see how, but I'll have to figure it out. If you still have
it around and it's not too much trouble (and nothing private in
/etc/ssl/local), could you tar up the contents and send, or is it just
the example cacert.org certs?
--DJ

I don't have any current use for local certs, I was just trying to
follow the book.  Maybe something in what I thought I had copied
from the book is wrong.  So here is the commented-out part. KM_LOG
points to my log for this package, and apologies if I've mis-pasted
or failed to update this and wasted your time.


#install -vdm755 /etc/ssl/local >$KM_LOG 2>&1
#wget http://www.cacert.org/certs/root.crt >>$KM_LOG 2>&1
#wget http://www.cacert.org/certs/class3.crt >>$KM_LOG 2>&1
#openssl x509 -in root.crt -text -fingerprint -setalias "CAcert Class 1 root" \ #        -addtrust serverAuth -addtrust emailProtection -addtrust codeSigning \
#        > /etc/ssl/local/CAcert_Class_1_root.pem >>$KM_LOG 2>&1
#openssl x509 -in class3.crt -text -fingerprint -setalias "CAcert Class 3 root" \ #        -addtrust serverAuth -addtrust emailProtection -addtrust codeSigning \
#        > /etc/ssl/local/CAcert_Class_3_root.pem >>$KM_LOG 2>&1

But, looking at the contents: clearly wget has failed.

-rw-r--r-- 1 root root 0 Feb 23 05:15 CAcert_Class_1_root.pem
-rw-r--r-- 1 root root 0 Feb 23 05:15 CAcert_Class_3_root.pem

Is there something more pertinent out there? In addition to those, I
install the US military CAs and intermediates, but that's a mess of 111
certificates and a nasty script in and of itself (I just cleaned it up
and pushed it to http://www.linuxfromscratch.org/~dj/get-us-gov-certs.sh
if anybody needs them). I think we should just drop the example all
together, and leave the instructions in the man page. I figure for
better than 99% of our users, the Mozilla CAs are sufficient. Only a
handful of users would want to do overrides or append for local use
cases. Even Windows domains (if named properly) can use LE certs.

Any objections?

I'm not sure I understand the issue.   I've used the current instructions on my workstation, development system, and just yesterday on my laptop without problem.

In the dependencies, we might want to add wget.


I have had a problem with p11 configuration.  We now have

if [ -e /usr/lib/libnssckbi.so ]; then
  readlink /usr/lib/libnssckbi.so ||
  rm -fv /usr/lib/libnssckbi.so    &&
  ln -sfv ./pkcs11/p11-kit-trust.so /usr/lib/libnssckbi.so
fi

I think this could be replaced by just:

ln -sfvn ./pkcs11/p11-kit-trust.so /usr/lib/libnssckbi.so

  -- Bruce

The problematic instructions in question reside in this block:

install -vdm755 /etc/ssl/local &&
wgethttp://www.cacert.org/certs/root.crt  &&
wgethttp://www.cacert.org/certs/class3.crt  &&
openssl x509 -in root.crt -text -fingerprint -setalias "CAcert Class 1 root" \
         -addtrust serverAuth -addtrust emailProtection -addtrust codeSigning \
         > /etc/ssl/local/CAcert_Class_1_root.pem &&
openssl x509 -in class3.crt -text -fingerprint -setalias "CAcert Class 3 root" \
         -addtrust serverAuth -addtrust emailProtection -addtrust codeSigning \
         > /etc/ssl/local/CAcert_Class_3_root.pem

They seem to cause problems and are confusing. They also seem to be unnecessary. All I run is 'make install && make-ca -g' when I need to install this package. It seems those instructions were part of Ken's problem.



Those instructions are clearly presented as an example, not as instructions for building the package. And it is clearly stated that wget is needed to run them.They have role="nodump" (I agree it is not visible on the rendered book).

Recommending wget in the dependency section would create an unnecessary circular dependency, since the CA certificates are needed by wget for accessing https sites...

Pierre

-- 
http://lists.linuxfromscratch.org/listinfo/blfs-support
FAQ: http://www.linuxfromscratch.org/blfs/faq.html
Unsubscribe: See the above information page

Reply via email to