The Mozilla CA root certificate bundle
4050611f40
Resolves: RHEL-46002 Removing: # Certificate "Verisign Class 1 Public Primary Certification Authority - G3" # Certificate "Verisign Class 2 Public Primary Certification Authority - G3" # Certificate "Security Communication Root CA" # Certificate "Autoridad de Certificacion Firmaprofesional CIF A62634068" # Certificate "Symantec Class 1 Public Primary Certification Authority - G6" # Certificate "Symantec Class 2 Public Primary Certification Authority - G6" # Certificate "TrustCor RootCert CA-1" # Certificate "TrustCor RootCert CA-2" # Certificate "TrustCor ECA-1" Adding: # Certificate "TrustAsia Global Root CA G3" # Certificate "TrustAsia Global Root CA G4" # Certificate "CommScope Public Trust ECC Root-01" # Certificate "CommScope Public Trust ECC Root-02" # Certificate "CommScope Public Trust RSA Root-01" # Certificate "CommScope Public Trust RSA Root-02" # Certificate "D-Trust SBR Root CA 1 2022" # Certificate "D-Trust SBR Root CA 2 2022" # Certificate "Telekom Security SMIME ECC Root 2021" # Certificate "Telekom Security TLS ECC Root 2020" # Certificate "Telekom Security SMIME RSA Root 2023" # Certificate "Telekom Security TLS RSA Root 2023" # Certificate "FIRMAPROFESIONAL CA ROOT-A WEB" # Certificate "SECOM Trust.net" # Certificate "VeriSign Class 2 Public Primary Certification Authority - G3" # Certificate "SSL.com Code Signing RSA Root CA 2022" # Certificate "SSL.com Code Signing ECC Root CA 2022" |
||
---|---|---|
tests | ||
.gitignore | ||
ca-certificates.spec | ||
ca-legacy | ||
ca-legacy.8.txt | ||
ca-legacy.conf | ||
certdata2pem.py | ||
certdata.txt | ||
check_certs.sh | ||
fetch_objsign.sh | ||
fetch.sh | ||
mergepem2certdata.py | ||
nssckbi.h | ||
README.edk2 | ||
README.etc | ||
README.etcssl | ||
README.extr | ||
README.java | ||
README.openssl | ||
README.pem | ||
README.src | ||
README.usr | ||
sort-blocks.py | ||
sources | ||
trust-fixes | ||
update-ca-trust | ||
update-ca-trust.8.txt |
This directory /usr/share/pki/ca-trust-source/ contains CA certificates and trust settings in the PEM file format. The trust settings found here will be interpreted with a low priority - lower than the ones found in /etc/pki/ca-trust/source/ . ============================================================================= QUICK HELP: To add a certificate in the simple PEM or DER file formats to the list of CAs trusted on the system: Copy it to the /usr/share/pki/ca-trust-source/anchors/ subdirectory, and run the update-ca-trust command. If your certificate is in the extended BEGIN TRUSTED file format, then place it into the main source/ directory instead. ============================================================================= Please refer to the update-ca-trust(8) manual page for additional information.