The Mozilla CA root certificate bundle
- Update fetchobjsign.sh and merge2certdata.py to their
ca-certificate-scripts equivalent.
- Update to CKBI 2.62-v7.0.401 from NSS 3.93
Removing:
# Certificate "Camerfirma Chambers of Commerce Root"
# Certificate "Hongkong Post Root CA 1"
# Certificate "FNMT-RCM"
Adding:
# Certificate "LAWtrust Root CA2 (4096)"
# Certificate "Sectigo Public Email Protection Root E46"
# Certificate "Sectigo Public Email Protection Root R46"
# Certificate "Sectigo Public Server Authentication Root E46"
# Certificate "Sectigo Public Server Authentication Root R46"
# Certificate "SSL.com TLS RSA Root CA 2022"
# Certificate "SSL.com TLS ECC Root CA 2022"
# Certificate "SSL.com Client ECC Root CA 2022"
# Certificate "SSL.com Client RSA Root CA 2022"
# Certificate "Atos TrustedRoot Root CA ECC G2 2020"
# Certificate "Atos TrustedRoot Root CA RSA G2 2020"
# Certificate "Atos TrustedRoot Root CA ECC TLS 2021"
# Certificate "Atos TrustedRoot Root CA RSA TLS 2021"
# Certificate "Chambers of Commerce Root"
|
||
|---|---|---|
| tests | ||
| .gitignore | ||
| ca-certificates.spec | ||
| ca-legacy | ||
| ca-legacy.8.txt | ||
| ca-legacy.conf | ||
| certdata2pem.py | ||
| certdata.txt | ||
| check_certs.sh | ||
| fetch_objsign.sh | ||
| fetch.sh | ||
| mergepem2certdata.py | ||
| nssckbi.h | ||
| README.edk2 | ||
| README.etc | ||
| README.etcssl | ||
| README.extr | ||
| README.java | ||
| README.openssl | ||
| README.pem | ||
| README.src | ||
| README.usr | ||
| sort-blocks.py | ||
| sources | ||
| trust-fixes | ||
| update-ca-trust | ||
| update-ca-trust.8.txt | ||
This directory /usr/share/pki/ca-trust-source/ contains CA certificates and
trust settings in the PEM file format. The trust settings found here will be
interpreted with a low priority - lower than the ones found in
/etc/pki/ca-trust/source/ .
=============================================================================
QUICK HELP: To add a certificate in the simple PEM or DER file formats to the
list of CAs trusted on the system:
Copy it to the
/usr/share/pki/ca-trust-source/anchors/
subdirectory, and run the
update-ca-trust
command.
If your certificate is in the extended BEGIN TRUSTED file format,
then place it into the main source/ directory instead.
=============================================================================
Please refer to the update-ca-trust(8) manual page for additional information.