The Mozilla CA root certificate bundle
fe9aee3d97
- Update fetchobjsign.sh and merge2certdata.py to their ca-certificate-scripts equivalent. - Update to CKBI 2.62-v7.0.401 from NSS 3.93 Removing: # Certificate "Camerfirma Chambers of Commerce Root" # Certificate "Hongkong Post Root CA 1" # Certificate "FNMT-RCM" Adding: # Certificate "LAWtrust Root CA2 (4096)" # Certificate "Sectigo Public Email Protection Root E46" # Certificate "Sectigo Public Email Protection Root R46" # Certificate "Sectigo Public Server Authentication Root E46" # Certificate "Sectigo Public Server Authentication Root R46" # Certificate "SSL.com TLS RSA Root CA 2022" # Certificate "SSL.com TLS ECC Root CA 2022" # Certificate "SSL.com Client ECC Root CA 2022" # Certificate "SSL.com Client RSA Root CA 2022" # Certificate "Atos TrustedRoot Root CA ECC G2 2020" # Certificate "Atos TrustedRoot Root CA RSA G2 2020" # Certificate "Atos TrustedRoot Root CA ECC TLS 2021" # Certificate "Atos TrustedRoot Root CA RSA TLS 2021" # Certificate "Chambers of Commerce Root" |
||
---|---|---|
tests | ||
.gitignore | ||
ca-certificates.spec | ||
ca-legacy | ||
ca-legacy.8.txt | ||
ca-legacy.conf | ||
certdata2pem.py | ||
certdata.txt | ||
check_certs.sh | ||
fetch_objsign.sh | ||
fetch.sh | ||
mergepem2certdata.py | ||
nssckbi.h | ||
README.edk2 | ||
README.etc | ||
README.etcssl | ||
README.extr | ||
README.java | ||
README.openssl | ||
README.pem | ||
README.src | ||
README.usr | ||
sort-blocks.py | ||
sources | ||
trust-fixes | ||
update-ca-trust | ||
update-ca-trust.8.txt |
This directory /usr/share/pki/ca-trust-source/ contains CA certificates and trust settings in the PEM file format. The trust settings found here will be interpreted with a low priority - lower than the ones found in /etc/pki/ca-trust/source/ . ============================================================================= QUICK HELP: To add a certificate in the simple PEM or DER file formats to the list of CAs trusted on the system: Copy it to the /usr/share/pki/ca-trust-source/anchors/ subdirectory, and run the update-ca-trust command. If your certificate is in the extended BEGIN TRUSTED file format, then place it into the main source/ directory instead. ============================================================================= Please refer to the update-ca-trust(8) manual page for additional information.