[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Debian Policy about administrator X.509 certificate stores [was: Re: dovecot-common: please do not use /etc/ssl/certs for end-entity X.509 certificates (/etc/ssl/certs/dovecot.pem)]



[this discussion started on http://bugs.debian.org/608719]

On 03/19/2012 11:14 PM, Ben Hutchings wrote:
On Sun, 2011-01-02 at 18:20 -0500, Daniel Kahn Gillmor wrote:
It looks like dovecot-common's postinst script creates a new X.509
certificate and places it in /etc/ssl/certs/dovecot.pem.  This
certificate is for use as the IMAP or POP server's end entity
certificate.

However, /etc/ssl/certs/ is used elsewhere in debian (e.g. the default
for wget's --ca-directory option) as a directory of legitimate root
certificate authorities -- *not* end entity certificates.

Is this specified in any policy?  If not, shouldn't it be discussed on
debian-policy?

Sure, that makes sense. I'm cc'ing debian-policy here. I'm not subscribed to that list, so please keep me Cc'ed in the followup.

Personally, I think that it is a bad idea to treat the
certificates in /etc/ssl/certs as automatically trusted.  Even if
packagers follow such a policy, system administrators likely will not
read the policy and will not suspect that installing a certificate there
has this effect.

If this is the consensus within the project, perhaps a bug should be filed against the ca-certificates package then, since /usr/share/doc/ca-certificates/README.Debian states:

------------
“update-ca-certificates” will then update “/etc/ssl/certs” which may be
used by the web browsers in Debian.  It will also generate the hash
symlinks and generate a single-file version in
“/etc/ssl/certs/ca-certificates.crt”.
------------

and update-ca-certificates is run during postinst configure of the ca-certificates package.

It seems to be me that it would be better to create
subdirectories for different categories of certificates, e.g.
'trusted-ca', 'server', 'client'.

Doing this kind of overhaul might be worthwhile, but i would break down the "trusted-ca" category still further. Consider, for example, that libNSS allows the user to identify which root CAs are trusted to:

 * identify web sites,
 * identify e-mail users, or
 * sign code

(some CAs may trusted for all three categories, some for only one or two of them).

If the system store could identify these separate categories differently, then we could divert (or ship a modified) libnssckbi.so that actually drew its configuration from the admin's configuration choices (instead of using the hardcoded builtins).

Is there any existing debian policy about X.509 certificates we should be pursuing? What should the system administrator expect of /etc/ssl/certs? Would more documentation someplace help?

	--dkg


Reply to: