home bbs files messages ]

Forums before death by AOL, social media and spammers... "We can't have nice things"

   linux.debian.bugs.dist      Ohh some weird Debian bug report thing      28,835 messages   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]

   Message 28,418 of 28,835   
   Simon Josefsson to All   
   Bug#1128593: Disable CAs that doesn't of   
   21 Feb 26 18:30:01   
   
   From: simon@josefsson.org   
      
   Package: ca-certificates   
   Version: 20250419   
   Severity: wishlist   
      
   Quoting a recent security update for 'ca-certificates':   
      
   > Mozilla certificate authority bundle was updated to version 2.60   
   > The following certificate authorities were added (+):   
   >     + "AC RAIZ FNMT-RCM SERVIDORES SEGUROS"   
   >     + "ANF Secure Server Root CA"   
   >     + "Autoridad de Certificacion Firmaprofesional CIF A62634068"   
   >     + "Certainly Root E1"   
   >     + "Certainly Root R1"   
   >     + "Certum EC-384 CA"   
   >     + "Certum Trusted Root CA"   
   >     + "D-TRUST BR Root CA 1 2020"   
   >     + "D-TRUST EV Root CA 1 2020"   
   >     + "DigiCert TLS ECC P384 Root G5"   
   >     + "DigiCert TLS RSA4096 Root G5"   
   >     + "E-Tugra Global Root CA ECC v3"   
   >     + "E-Tugra Global Root CA RSA v3"   
   >     + "GlobalSign Root R46"   
   >     + "GlobalSign Root E46"   
   >     + "GLOBALTRUST 2020"   
   >     + "HARICA TLS ECC Root CA 2021"   
   >     + "HARICA TLS RSA Root CA 2021"   
   >     + "HiPKI Root CA - G1"   
   >     + "ISRG Root X2"   
   >     + "Security Communication ECC RootCA1"   
   >     + "Security Communication RootCA3"   
   >     + "Telia Root CA v2"   
   >     + "TunTrust Root CA"   
   >     + "vTrus ECC Root CA"   
   >     + "vTrus Root CA"   
      
   Not thinking of any of those CAs specifically, but generally, I wonder   
   if Debian's users are served by having all of the WebPKI CAs enabled by   
   default.   
      
   Including any public CA certificate is definitely useful, for users to   
   be able to find necessary trust-points in a simple manner.   
      
   However enabling them all by default, which allow any of the CAs to   
   successfully MITM your TLS connections for any application using the   
   bundles, (should) trigger some additional concerns and review.   
      
   Right now there doesn't seem to be any distinction between the two cases   
   above, and the Debian criteria looks effectively like accept-all.   
      
   By "enabling" I mean including them in the global   
   /etc/ssl/certs/ca-certificates.crt bundle.   
      
   Could Debian establish a set of criteria for which CAs to enable by   
   default?   
      
   One simple criteria could be that the CA supports Certificate   
   Transparency and offer a public log of all their issued certificates, so   
   that people can audit the CA and look for issued MITM certs like   
   *.google.com or similar.   
      
   We shouldn't cause user TLS certification errors needlessly as a   
   consequence of a change like this.  I suspect that the majority of   
   end-entity certs would be covered by the well-known CAs that has   
   supported Certificate Transparency for many years.  Doing experiments   
   with which CAs are important to enable by default could be done.   
      
   Thoughts?   
      
   /Simon   
      
   -----BEGIN PGP SIGNATURE-----   
      
   iQNoBAEWCgMQFiEEo8ychwudMQq61M8vUXIrCP5HRaIFAmmZ6psUHHNpbW9uQGpv   
   c2Vmc3Nvbi5vcmfCHCYAmDMEXJLOtBYJKwYBBAHaRw8BAQdACIcrZIvhrxDBkK9f   
   V+QlTmXxo2naObDuGtw58YaxlOu0JVNpbW9uIEpvc2Vmc3NvbiA8c2ltb25Aam9z   
   ZWZzc29uLm9yZz6IlgQTFggAPgIbAwULCQgHAgYVCAkKCwIEFgIDAQIeAQIXgBYh   
   BLHSvRN1vst4TPT4xNc89jjFPAa+BQJn0XQkBQkNZGbwAAoJENc89jjFPAa+BtIA   
   /iR73CfBurG9y8pASh3cbGOMHpDZfMAtosu6jbpO69GHAP4p7l57d+iVty2VQMsx   
   +3TCSAvZkpr4P/FuTzZ8JZe8BrgzBFySz4EWCSsGAQQB2kcPAQEHQOxTCIOaeXAx   
   I2hIX4HK9bQTpNVei708oNr1Klm8qCGKiPUEGBYIACYCGwIWIQSx0r0Tdb7LeEz0   
   +MTXPPY4xTwGvgUCZ9F0SgUJDWRmSQCBdiAEGRYIAB0WIQSjzJyHC50xCrrUzy9R   
   cisI/kdFogUCXJLPgQAKCRBRcisI/kdFoqdMAQCgH45aseZgIrwKOvUOA9QfsmeE   
   8GZHYNuFHmM9FEQS6AD6A4x5aYvoY6lo98pgtw2HPDhmcCXFItjXCrV4A0GmJA4J   
   ENc89jjFPAa+wUUBAO64fbZek6FPlRK0DrlWsrjCXuLi6PUxyzCAY6lG2nhUAQC6   
   qobB9mkZlZ0qihy1x4JRtflqFcqqT9n7iUZkCDIiDbg4BFySz2oSCisGAQQBl1UB   
   BQEBB0AxlRumDW6nZY7A+VCfek9VpEx6PJmdJyYPt3lNHMd6HAMBCAeIfgQYFggA   
   JgIbDBYhBLHSvRN1vst4TPT4xNc89jjFPAa+BQJn0XTSBQkNZGboAAoJENc89jjF   
   PAa+0M0BAPPRq73kLnHYNDMniVBOzUdi2XeF32idjEWWfjvyIJUOAP4wZ+ALxIeh   
   is3Uw2BzGZE6ttXQ2Q+DeCJO3TPpIqaXDAAKCRBRcisI/kdFog8lAQD25Lr27R5L   
   2uCh1GOHkELKl6jbRHmnTwFD+VGqS4uNiwD8CtaEvHjHbjznnxtz07R/YoTpN3tl   
   EnzVoRhdGCgPxQM=   
   =jYXK   
   -----END PGP SIGNATURE-----   
      
   --- SoupGate-Win32 v1.05   
    * Origin: you cannot sedate... all the things you hate (1:229/2)   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]


(c) 1994,  bbs@darkrealms.ca