pkgsrc/security/ca-certificates/files
kim 40491cd477 security/ca-certificates: Add configurability for certificate store
- The location of the system certificate store can now be set using
  a new configuration file (ca-certificates-dir.conf).

- Installing the certificates to the system certificate store must
  be enabled by the administrator.
2022-06-12 07:05:30 +00:00
..
ca-certificates-dir.conf security/ca-certificates: Add configurability for certificate store 2022-06-12 07:05:30 +00:00
ca-certificates.conf
README.pkgsrc security/ca-certificates: Add configurability for certificate store 2022-06-12 07:05:30 +00:00

$NetBSD: README.pkgsrc,v 1.2 2022/06/12 07:05:30 kim Exp $

This package provides the certificates distributed by the Mozilla
Project and can be used to install the certificates trusted by the
Mozilla Project in the system certificate store, so that they can be
used by third party applications using OpenSSL.

To enable management of the system certificate store and to set its
location, edit the configuration in

    /etc/ca-certificates-dir.conf

To further select which certificates are installed, you can edit the
configuration in

    /etc/ca-certificates.conf

To install local certificate authorities to be implicitly trusted,
place the certificate files in /usr/local/share/ca-certificates/
as single files ending with ".crt".

After changing the configuration and adding local certificates run this
command to install and rehash the certificates:

    # /usr/sbin/update-ca-certificates

After removing local certificates run this command to remove dangling
symlinks from /etc/ssl/certs:

    # /usr/sbin/update-ca-certificates --fresh

The update-ca-certificates tool also creates a single file certificate
bundle in PEM format in /etc/ssl/certs/ca-certificates.crt
which can be used by applications using GnuTLS.

To mark the installed certificates as trusted for users of gnupg2 do
the following (assuming default PKG_SYSCONFBASE and a Bourne shell):

    # mkdir -p /usr/pkg/etc/gnupg
    # cd /usr/pkg/etc/gnupg
    # for c in /etc/ssl/certs/*.pem; do
    > openssl x509 -in $c -noout -fingerprint|sed 's|^.*=\(.*\)|\1 S|'
    > done > trustlist.txt