176 Commits

Author SHA1 Message Date
c52f1373f5 Release version 1.16.1. v1.16.1 2025-06-04 13:33:47 -05:00
b831b484c7 Update the URL in make-ca.conf.dist to match the one in make-ca. 2025-06-04 13:32:34 -05:00
8994b70967 Release version 1.16. v1.16 2025-04-08 11:57:52 -05:00
46e3a73137 Add a changelog entry for 1.16. 2025-04-08 11:57:10 -05:00
b651169925 Adjust make-ca to use hg-edge.mozilla.org instead of hg.mozilla.org.
hg.mozilla.org now redirects to hg-edge.mozilla.org. This presents a
couple of unique challenges:

- OpenSSL s_client cannot follow redirects.
- hg-edge.mozilla.org is configured differently than hg.mozilla.org was.
- The certificate used for hg-edge.mozilla.org is signed by Let's
  Encrypt instead of the Mozilla CA root.

To fix this, we have done the following:

- Removed the mozilla CA root from the make-ca package, and replaced it
  with ISRG-Root-X1, which is the signing root certificate for Let's
  Encrypt certificates.
- Adjusted the Makefile to install the new signing root certificate.
- Changed the URL for downloading the certdata.txt file to
  hg-edge.mozilla.org
- Fixed problems with retrieving the certificate data from that website
  by specifying the HTTP version and turning off keep-alive support. As
  part of this we need to change from using "echo" to "printf" due to
  a behavior change in how "\n" is handled. Note that "\n" must be
  specified or else the connection will hang.

This will allow certificate data to be updated once again.
2025-04-08 11:54:01 -05:00
8f59caf832 Add the Let's Encrypt certificate root (also known as ISRG_Root_X1)
This commit adds the Let's Encrypt certificate root so that we can copy it to /etc/make-ca and use it for verification of the initial download of certdata.txt.

This is now needed because Mozilla has moved from hg.mozilla.org to hg-edge.mozilla.org, which is signed using Let's Encrypt instead of the Mozilla Certificate Root.
2025-04-08 11:54:01 -05:00
59576cff0f Remove the old CA Root
This commit deletes the old Mozilla CA Root.

We're going to need to use the root certificate for Let's Encrypt because hg-edge.mozilla.org uses a Let's Encrypt certificate instead of one signed by the Mozilla CA root.
2025-04-08 11:54:01 -05:00
480a5997b6 Prepare for 1.15 release v1.15 2025-02-09 23:04:23 +08:00
b44a287b98 Do not make anchors untrusted because the system date is after the CKA_NSS_*_DISTRUST_AFTER dates
This partially reverts commit 327c7e9306.

Per https://bugzilla.mozilla.org/show_bug.cgi?id=1465613, the intention
of the CKA_NSS_*_DISTRUST_AFTER dates is to distrust the certificate
with this anchor if the certificate is issued after the date, not if the
system date is after the date.

As make-ca cannot know the issue date of downstream certificates, this
is just a wrong location to handle CKA_NSS_*_DISTRUST_AFTER.
Unfortunately it seems nothing is handling it properly: OpenSSL does not
use p11-kit and the raw X509 certificates in /etc/ssl/certs cannot store
the CKA_NSS_*_DISTRUST_AFTER info at all, GnuTLS uses p11-kit but fails
to really fetch the dates.  So BLFS will be slightly overly-permissive
(instead of overly-restrictive) after this change, but AFAIK all other
distros have the same behavior as at now.

Link: https://gitlab.com/gnutls/gnutls/-/issues/1656
Link: https://github.com/openssl/openssl/issues/24784
2025-02-09 22:48:09 +08:00
ed6c5572bc build: Prevent translated date in the man page v1.14 2024-07-14 11:34:30 +08:00
e49d1c5744 Prepare for 1.14 release 2024-07-14 11:29:16 +08:00
60dbdee107 Don't Use Statically Named tempfiles and Instead Use mktemp (#31) 2024-06-28 10:30:14 +08:00
25252d2a16 silenced openssl x509 warning using -in (#30) 2024-06-22 20:34:11 +08:00
832f544098 Prepare a new release
It's needed because there is a new root certificate for hg.mozilla.org
v1.13
2023-09-26 22:11:58 +02:00
63b9a3bf6f Update mozilla CA root certificate
It seems it has changed on September 19th, 2023
2023-09-26 22:05:49 +02:00
9291cf9319 make-ca.conf.dist: remove link to aurora v1.12 2022-12-27 20:12:26 -06:00
5fec9b5317 CS.txt: Update to latestest list of Microsoft certs. 2022-12-27 20:10:32 -06:00
6eee45ffc9 CHANGELOG: add missing changelog entries. 2022-12-27 20:07:18 -06:00
327c7e9306 make-ca{,.conf.dist}: set nss tree to default source and introduce workaround for p11-kit mishandling of nss-{email,server}-distrust-after values. 2022-12-21 23:10:22 -06:00
dac19a3cf1 make-ca: Keep upstream formatting and remove Opnessl data 2022-11-25 11:17:50 -06:00
10d6241bd2 make-ca: post-release version bump 2022-11-23 10:55:18 -06:00
0b408bda43 Update CHANGELOG v1.11 2022-11-23 10:06:27 -06:00
1528fdd47c update-mscertsign.sh: Fix ouput error in script 2022-11-23 10:01:26 -06:00
55f8847147 Update CS.txt
Fix comment
2022-11-23 09:59:56 -06:00
62ce400648 Update CS.txt before release 2022-11-23 09:59:23 -06:00
accd6b49fb Merge pull request #22 from xry111/ship-mozilla-ca-root
verify hg.mozilla.org with bundled CA root
2022-11-23 08:31:07 -06:00
d3562bc2f0 verify hg.mozilla.org with bundled CA root
Before this, make-ca does not verify the certificate of hg.mozilla.org
at all.  It makes sense as make-ca often runs on systems without trust
anchor.  But, a MIM can easily fake hg.mozilla.org and completely hijack
the trust anchor of a BLFS system.

To improve the situation, we ship the certificate of the CA root for
hg.mozilla.org (DigiCert Global Root CA) in the make-ca package, and use
it to verify hg.mozilla.org.
2022-01-31 19:07:08 +08:00
3093851fdd Update CHANGELOG v1.10 2022-01-10 00:17:38 -06:00
76fa47f5d0 Don't install systemd timers on non-systemd
Fixes #18
2022-01-10 00:16:47 -06:00
a7ceb85300 Update CS.txt (no changes since last release) 2022-01-10 00:12:39 -06:00
23daa436c8 Merge pull request #20 from xry111/fix-19
make-ca: use --filter=ca-anchors for all stores
2022-01-09 22:56:51 -06:00
151af87198 make-ca: use --filter=ca-anchors for all stores
Fixes #19.
2022-01-09 00:00:22 +08:00
6d1c729972 CHANGELOG: all current updates. v1.9 2021-09-16 18:56:59 -05:00
92dbb064c5 CS.txt,update-mscertsign.sh: Add update script for CS.txt now that MS has update CCADB. 2021-09-16 18:56:30 -05:00
1ff5a0a672 make-ca: Update help text for -i/--mscodesign switch. 2021-09-13 22:05:16 -05:00
4ee256bfb9 README,Makefile: move distfiles to /etc/make-ca.
Closes #16.
2021-09-13 22:01:58 -05:00
c3620b3636 make-ca: guard overrides on first run.
Closes #17.
2021-09-13 21:50:21 -05:00
c22c228e3e Update README 2021-09-13 21:16:41 -05:00
aacfcb6b69 make-ca,CHANGELOG: Post-release version bump. 2021-08-29 23:46:04 -05:00
1ba7f4319b make-ca: bump version. v1.8.1 2021-08-29 23:33:15 -05:00
79082f4814 Changelog 2021-08-29 23:32:18 -05:00
3eca3a7dba make-ca: set default for code signing to 0. 2021-08-29 23:31:20 -05:00
4bbde9a90b make-ca: Remove unneeded variable (leftover from testing). v1.8 2021-08-09 22:17:29 -05:00
b138f67112 make-ca: Backup and restore anchors with PKIX extensions. 2021-08-09 22:14:46 -05:00
c2a3d1d837 make-ca: Fix typo. 2021-08-08 22:32:37 -05:00
c41b7f3d4b Makefile,make-ca: Use Microsoft's trust for code signing with -i | --mscodesign. 2021-08-08 11:03:12 -05:00
53ac95f8fd make-ca: remove workarounds and use certdata.txt values first, remove trailing spaces from x509 Subject derived p11label. 2021-08-08 00:26:59 -05:00
2c1da33970 make-ca: Special case for poorly named 'NetLock Arany' certs. 2021-08-07 20:16:17 -05:00
6e7e5a391c CHANGELOG: yet another typo. 2021-08-07 20:01:19 -05:00
5d764d2756 CHANGELOG: typo 2021-08-07 19:59:16 -05:00