On Fri, 2026-05-08 at 13:37 -0400, Daniel Jakots wrote:
> On Wed, 6 May 2026 17:35:08 +0100, Tom Smyth
> <[email protected]> wrote:
> 
> > Folks,
> > is there a more elegant way of adding private trusted cas to
> > openBSD...
> 
> Out of curiosity, what's your use-case for the private CAs?
> 
> I have a private CA to use mtls on some services. I just configure the
> relevant software to use specifically that CA. For instance with
> redis:
> 
> $ grep ^tls /etc/redis/redis.conf 
> [...]
> tls-cert-file /etc/ssl/chownme.crt
> tls-key-file /etc/ssl/redis-chownme.key
> tls-ca-cert-file /etc/ssl/chownme-cacert.pem
> 
> Cheers,
> Daniel
> 

I'm also interested in a more convenient way of handling additional
certificate authorities as I use a custom CA to issue certificates to
other machines on the local network. My CA's cert needs to be included
in every connecting client's cert.pem, otherwise you obviously get an
error when connecting to websites or web services.

Would it make sense to have cert.base.pem instead of cert.pem and folder
/etc/ssl/ssl.d where you would store all the other trusted CAs? Then
you would run a utility "newcerts" (akin to newaliases) that creates
cert.pem which is an amalgamation of system provided certificates plus
everything in folder ssl.d.

Stuart mentioned that you also might not want trust some existing
authorities. I guess that would require the main file to be split into
separate certificates so that when you run newcerts it would ignore
those the administrator listed in a blacklist file or something of the
similar nature.

Reply via email to