mirror of
https://git.launchpad.net/ubuntu/+source/ca-certificates
synced 2025-04-13 09:38:26 +00:00
20211004 (patches unapplied)
Imported using git-ubuntu import.
This commit is contained in:
parent
47275c9bd2
commit
702bb40703
Notes:
git-ubuntu importer
2021-10-09 16:55:07 +00:00
[ Debian Janitor ] * Fix day-of-week for changelog entry 20090624. [ Julien Cristau ] * Create temporary ca-certificates.crt on the same file system. Closes: #923784 * Don't remove ca-certificates.crt before updating it, so it doesn't go missing for a short while (closes: #920348). Thanks, Dimitris Aragiorgis! * Bump package priority from optional to standard. * mozilla/{certdata.txt,nssckbi.h}: Update Mozilla certificate authority bundle to version 2.50 The following certificate authorities were added (+): + "AC RAIZ FNMT-RCM SERVIDORES SEGUROS" + "GlobalSign Root R46" + "GlobalSign Root E46" + "GLOBALTRUST 2020" + "ANF Secure Server Root CA" + "Certum EC-384 CA" + "Certum Trusted Root CA" The following certificate authorities were removed (-): - "QuoVadis Root CA" - "Sonera Class 2 Root CA" - "GeoTrust Primary Certification Authority - G2" - "VeriSign Universal Root Certification Authority" - "Chambers of Commerce Root - 2008" - "Global Chambersign Root - 2008" - "Trustis FPS Root CA" - "Staat der Nederlanden Root CA - G3" * Blacklist expired root certificate "DST Root CA X3" (closes: #995432) * mozilla/certdata2pem.py: print a warning for expired certificates.
8 changed files with 1427 additions and 775 deletions
38
debian/changelog
vendored
38
debian/changelog
vendored
|
@ -1,3 +1,39 @@
|
||||||
|
ca-certificates (20211004) unstable; urgency=low
|
||||||
|
|
||||||
|
[ Debian Janitor ]
|
||||||
|
* Fix day-of-week for changelog entry 20090624.
|
||||||
|
|
||||||
|
[ Julien Cristau ]
|
||||||
|
* Create temporary ca-certificates.crt on the same file system.
|
||||||
|
Closes: #923784
|
||||||
|
* Don't remove ca-certificates.crt before updating it, so it doesn't
|
||||||
|
go missing for a short while (closes: #920348). Thanks, Dimitris
|
||||||
|
Aragiorgis!
|
||||||
|
* Bump package priority from optional to standard.
|
||||||
|
* mozilla/{certdata.txt,nssckbi.h}: Update Mozilla certificate authority
|
||||||
|
bundle to version 2.50
|
||||||
|
The following certificate authorities were added (+):
|
||||||
|
+ "AC RAIZ FNMT-RCM SERVIDORES SEGUROS"
|
||||||
|
+ "GlobalSign Root R46"
|
||||||
|
+ "GlobalSign Root E46"
|
||||||
|
+ "GLOBALTRUST 2020"
|
||||||
|
+ "ANF Secure Server Root CA"
|
||||||
|
+ "Certum EC-384 CA"
|
||||||
|
+ "Certum Trusted Root CA"
|
||||||
|
The following certificate authorities were removed (-):
|
||||||
|
- "QuoVadis Root CA"
|
||||||
|
- "Sonera Class 2 Root CA"
|
||||||
|
- "GeoTrust Primary Certification Authority - G2"
|
||||||
|
- "VeriSign Universal Root Certification Authority"
|
||||||
|
- "Chambers of Commerce Root - 2008"
|
||||||
|
- "Global Chambersign Root - 2008"
|
||||||
|
- "Trustis FPS Root CA"
|
||||||
|
- "Staat der Nederlanden Root CA - G3"
|
||||||
|
* Blacklist expired root certificate "DST Root CA X3" (closes: #995432)
|
||||||
|
* mozilla/certdata2pem.py: print a warning for expired certificates.
|
||||||
|
|
||||||
|
-- Julien Cristau <jcristau@debian.org> Thu, 07 Oct 2021 17:12:47 +0200
|
||||||
|
|
||||||
ca-certificates (20210119) unstable; urgency=medium
|
ca-certificates (20210119) unstable; urgency=medium
|
||||||
|
|
||||||
[ Julien Cristau ]
|
[ Julien Cristau ]
|
||||||
|
@ -903,7 +939,7 @@ ca-certificates (20090624) unstable; urgency=low
|
||||||
hooks will be empty, though. Failure exit codes of hooks will not
|
hooks will be empty, though. Failure exit codes of hooks will not
|
||||||
tear down the upgrade process anymore. They are printed but ignored.
|
tear down the upgrade process anymore. They are printed but ignored.
|
||||||
|
|
||||||
-- Philipp Kern <pkern@debian.org> Tue, 24 Jun 2009 21:04:08 +0200
|
-- Philipp Kern <pkern@debian.org> Wed, 24 Jun 2009 21:04:08 +0200
|
||||||
|
|
||||||
ca-certificates (20081127) unstable; urgency=low
|
ca-certificates (20081127) unstable; urgency=low
|
||||||
|
|
||||||
|
|
3
debian/control
vendored
3
debian/control
vendored
|
@ -3,12 +3,13 @@ Section: misc
|
||||||
Priority: optional
|
Priority: optional
|
||||||
Maintainer: Julien Cristau <jcristau@debian.org>
|
Maintainer: Julien Cristau <jcristau@debian.org>
|
||||||
Build-Depends: debhelper-compat (= 13), po-debconf
|
Build-Depends: debhelper-compat (= 13), po-debconf
|
||||||
Build-Depends-Indep: python3, openssl
|
Build-Depends-Indep: python3, openssl, python3-cryptography
|
||||||
Standards-Version: 4.5.0.2
|
Standards-Version: 4.5.0.2
|
||||||
Vcs-Git: https://salsa.debian.org/debian/ca-certificates.git
|
Vcs-Git: https://salsa.debian.org/debian/ca-certificates.git
|
||||||
Vcs-Browser: https://salsa.debian.org/debian/ca-certificates
|
Vcs-Browser: https://salsa.debian.org/debian/ca-certificates
|
||||||
|
|
||||||
Package: ca-certificates
|
Package: ca-certificates
|
||||||
|
Priority: standard
|
||||||
Architecture: all
|
Architecture: all
|
||||||
Depends: openssl (>= 1.1.1), ${misc:Depends}
|
Depends: openssl (>= 1.1.1), ${misc:Depends}
|
||||||
Enhances: openssl
|
Enhances: openssl
|
||||||
|
|
|
@ -7,3 +7,6 @@
|
||||||
"MITM subCA 2 issued by Trustwave"
|
"MITM subCA 2 issued by Trustwave"
|
||||||
"TURKTRUST Mis-issued Intermediate CA 1"
|
"TURKTRUST Mis-issued Intermediate CA 1"
|
||||||
"TURKTRUST Mis-issued Intermediate CA 2"
|
"TURKTRUST Mis-issued Intermediate CA 2"
|
||||||
|
|
||||||
|
# Expired CA (#995432)
|
||||||
|
"DST Root CA X3"
|
||||||
|
|
2128
mozilla/certdata.txt
2128
mozilla/certdata.txt
File diff suppressed because it is too large
Load diff
|
@ -21,12 +21,16 @@
|
||||||
# USA.
|
# USA.
|
||||||
|
|
||||||
import base64
|
import base64
|
||||||
|
import datetime
|
||||||
import os.path
|
import os.path
|
||||||
import re
|
import re
|
||||||
import sys
|
import sys
|
||||||
import textwrap
|
import textwrap
|
||||||
import io
|
import io
|
||||||
|
|
||||||
|
from cryptography import x509
|
||||||
|
|
||||||
|
|
||||||
objects = []
|
objects = []
|
||||||
|
|
||||||
# Dirty file parser.
|
# Dirty file parser.
|
||||||
|
@ -117,6 +121,13 @@ for obj in objects:
|
||||||
if obj['CKA_CLASS'] == 'CKO_CERTIFICATE':
|
if obj['CKA_CLASS'] == 'CKO_CERTIFICATE':
|
||||||
if not obj['CKA_LABEL'] in trust or not trust[obj['CKA_LABEL']]:
|
if not obj['CKA_LABEL'] in trust or not trust[obj['CKA_LABEL']]:
|
||||||
continue
|
continue
|
||||||
|
|
||||||
|
cert = x509.load_der_x509_certificate(obj['CKA_VALUE'])
|
||||||
|
if cert.not_valid_after < datetime.datetime.now():
|
||||||
|
print('!'*74)
|
||||||
|
print('Trusted but expired certificate found: %s' % obj['CKA_LABEL'])
|
||||||
|
print('!'*74)
|
||||||
|
|
||||||
bname = obj['CKA_LABEL'][1:-1].replace('/', '_')\
|
bname = obj['CKA_LABEL'][1:-1].replace('/', '_')\
|
||||||
.replace(' ', '_')\
|
.replace(' ', '_')\
|
||||||
.replace('(', '=')\
|
.replace('(', '=')\
|
||||||
|
|
|
@ -46,8 +46,8 @@
|
||||||
* It's recommend to switch back to 0 after having reached version 98/99.
|
* It's recommend to switch back to 0 after having reached version 98/99.
|
||||||
*/
|
*/
|
||||||
#define NSS_BUILTINS_LIBRARY_VERSION_MAJOR 2
|
#define NSS_BUILTINS_LIBRARY_VERSION_MAJOR 2
|
||||||
#define NSS_BUILTINS_LIBRARY_VERSION_MINOR 46
|
#define NSS_BUILTINS_LIBRARY_VERSION_MINOR 50
|
||||||
#define NSS_BUILTINS_LIBRARY_VERSION "2.46"
|
#define NSS_BUILTINS_LIBRARY_VERSION "2.50"
|
||||||
|
|
||||||
/* These version numbers detail the semantic changes to the ckfw engine. */
|
/* These version numbers detail the semantic changes to the ckfw engine. */
|
||||||
#define NSS_BUILTINS_HARDWARE_VERSION_MAJOR 1
|
#define NSS_BUILTINS_HARDWARE_VERSION_MAJOR 1
|
||||||
|
|
|
@ -3,9 +3,12 @@
|
||||||
#
|
#
|
||||||
#
|
#
|
||||||
|
|
||||||
|
SBINDIR = /usr/sbin
|
||||||
|
|
||||||
all:
|
all:
|
||||||
|
|
||||||
clean:
|
clean:
|
||||||
|
|
||||||
install:
|
install:
|
||||||
install -m755 update-ca-certificates $(DESTDIR)/usr/sbin/
|
install -d $(DESTDIR)$(SBINDIR)
|
||||||
|
install -m755 update-ca-certificates $(DESTDIR)$(SBINDIR)/
|
||||||
|
|
|
@ -80,9 +80,9 @@ trap cleanup 0
|
||||||
|
|
||||||
# Helper files. (Some of them are not simple arrays because we spawn
|
# Helper files. (Some of them are not simple arrays because we spawn
|
||||||
# subshells later on.)
|
# subshells later on.)
|
||||||
TEMPBUNDLE="$(mktemp -t "${CERTBUNDLE}.tmp.XXXXXX")"
|
TEMPBUNDLE="${ETCCERTSDIR}/${CERTBUNDLE}.new"
|
||||||
ADDED="$(mktemp -t "ca-certificates.tmp.XXXXXX")"
|
ADDED="$(mktemp --tmpdir "ca-certificates.tmp.XXXXXX")"
|
||||||
REMOVED="$(mktemp -t "ca-certificates.tmp.XXXXXX")"
|
REMOVED="$(mktemp --tmpdir "ca-certificates.tmp.XXXXXX")"
|
||||||
|
|
||||||
# Adds a certificate to the list of trusted ones. This includes a symlink
|
# Adds a certificate to the list of trusted ones. This includes a symlink
|
||||||
# in /etc/ssl/certs to the certificate file and its inclusion into the
|
# in /etc/ssl/certs to the certificate file and its inclusion into the
|
||||||
|
@ -164,8 +164,6 @@ then
|
||||||
done
|
done
|
||||||
fi
|
fi
|
||||||
|
|
||||||
rm -f "$CERTBUNDLE"
|
|
||||||
|
|
||||||
ADDED_CNT=$(wc -l < "$ADDED")
|
ADDED_CNT=$(wc -l < "$ADDED")
|
||||||
REMOVED_CNT=$(wc -l < "$REMOVED")
|
REMOVED_CNT=$(wc -l < "$REMOVED")
|
||||||
|
|
||||||
|
|
Loading…
Add table
Reference in a new issue