Module Name: src Committed By: riastradh Date: Sat Sep 2 17:41:17 UTC 2023
Modified Files: src/usr.sbin/certctl: certctl.8 Log Message: certctl(8): Minor man page clarifications. - Specify exactly what /etc/openssl/certs gets populated with. - Change HTTPS to TLS. - Specify the permitted character class in certs.conf. (Maybe more conservative than strictly needed; but let's stay on the safe side.) To generate a diff of this commit: cvs rdiff -u -r1.1 -r1.2 src/usr.sbin/certctl/certctl.8 Please note that diffs are not public domain; they are subject to the copyright notices on the relevant files.
Modified files: Index: src/usr.sbin/certctl/certctl.8 diff -u src/usr.sbin/certctl/certctl.8:1.1 src/usr.sbin/certctl/certctl.8:1.2 --- src/usr.sbin/certctl/certctl.8:1.1 Sat Aug 26 05:27:15 2023 +++ src/usr.sbin/certctl/certctl.8 Sat Sep 2 17:41:17 2023 @@ -1,4 +1,4 @@ -.\" $NetBSD: certctl.8,v 1.1 2023/08/26 05:27:15 riastradh Exp $ +.\" $NetBSD: certctl.8,v 1.2 2023/09/02 17:41:17 riastradh Exp $ .\" .\" Copyright (c) 2023 The NetBSD Foundation, Inc. .\" All rights reserved. @@ -56,21 +56,21 @@ The .Nm utility manages certificates used by OpenSSL-based applications as -trust anchors for certificate validation in HTTPS or other purposes. +trust anchors for certificate validation in TLS or other purposes, +for example by +.Xr ftp 1 +in HTTPS. .Nm allows configuring the set of certificates and persistently excluding individual certificates. .Pp -For HTTPS certificate validation, OpenSSL applications typically -use either a directory at +For trust anchors to validate TLS certificates, OpenSSL applications +typically use a directory at .Pa /etc/openssl/certs of hashed certificates in PEM format, with names like .Pa "3513523f.0" -used for lookup -.Pq see Xr openssl_rehash 1 , -or a single-file bundle at -.Pa /etc/openssl/certs/ca-certificates.crt -concatenating all the certificates in PEM format. +used for lookup; see +.Xr openssl_rehash 1 . .Pp .Nm scans all directories in the certificate search path specified by the @@ -87,7 +87,23 @@ in PEM format, except for those that hav and keeps .Ar certsdir .Pq default: Pa /etc/openssl/certs -populated with symlinks to them. +populated with: +.Bl -dash +.It +symlinks to the original files in the certificate search path, for +applications that scan a directory for all files matching +.Pa *.cer , +.Pa *.crt , +or +.Pa *.pem ; +.It +hashed symlinks as in +.Xr openssl_rehash 1 ; and +.It +a single-file bundle +.Pa ca-certificates.crt +concatenating all the certificates in PEM format. +.El .Pp .Nm treats @@ -189,7 +205,9 @@ Add to the certificate search path. .Ar dir must be an absolute pathname, -.Xr vis 3 Ns -encoded . +.Xr vis 3 Ns -encoded +if it has any characters outside the class +.Ql "a-zA-Z0-9,.:=/+-" . .Pp All certificates must have unique base names across all directories in the certificate search path. @@ -211,15 +229,15 @@ update .Sh FILES .Bl -tag -width Pa .It Pa /etc/openssl/certs -Default directory of hashed HTTPS CA certificates. +Default directory of hashed TLS CA certificates. .It Pa /etc/openssl/certs/ca-certificates.crt -Default single-file HTTPS CA certificate bundle. +Default single-file TLS CA certificate bundle. .It Pa /etc/openssl/certs.conf -Default configuration file for HTTPS CA certificates. +Default configuration file for TLS CA certificates. .It Pa /etc/openssl/untrusted Default .Ar untrusted -directory of excluded HTTPS CA certificates. +directory of excluded TLS CA certificates. .It Pa /usr/share/certs/mozilla/all All root CA certificates published by Mozilla, including untrustworthy certificates. @@ -229,7 +247,7 @@ All root CA certificates published by Mo All root CA certificates published by Mozilla for use in email authentication. .It Pa /usr/share/certs/mozilla/server -All root CA certificates published by Mozilla for use in HTTPS server +All root CA certificates published by Mozilla for use in TLS server authentication. .El .\"""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""