provide latest OS root certificates via port?

raf macports at raf.org
Wed Nov 3 04:39:57 UTC 2021


On Mon, Nov 01, 2021 at 06:37:08AM -0400, "Richard L. Hamilton" <rlhamil at smart.net> wrote:

> 
> 
> > On Nov 1, 2021, at 03:12, raf <macports at raf.org> wrote:
> > 
> > On Sat, Oct 30, 2021 at 05:49:11AM -0700, Al Varnell via macports-users <macports-users at lists.macports.org> wrote:
> > 
> >> I see that I already have the latest ISRG Root X1 certificate in the
> >> System Roots keychain, so not sure why I would need to add it to my
> >> System keychain.
> > 
> > It doesn't sound sensible, does it? I followed those instructions,
> > then added it to System Roots because it hadn't changed anything,
> > only to discover (on 10.6) that only TLSv1.0 was supported by the
> > system-supplied software so things wouldn't work anyway.
> > 
> > I still don't understand why /usr/bin/curl isn't working for me on
> > 10.14 but Safari is.
> 
> /usr/bin/curl (also?) uses /etc/ssl/cert.pem file. Copy that file to
> /etc/ssl/cert.pem.orig as a backup and look around line 1130 for the
> following:
> 
> ### Digital Signature Trust Co.
> 
> === /O=Digital Signature Trust Co./CN=DST Root CA X3
> Certificate:
>     Data:
>         Version: 3 (0x2)
>         Serial Number:
>             44:af:b0:80:d6:a3:27:ba:89:30:39:86:2e:f8:40:6b
>     Signature Algorithm: sha1WithRSAEncryption
>         Validity
>             Not Before: Sep 30 21:12:19 2000 GMT
>             Not After : Sep 30 14:01:15 2021 GMT
>         Subject: O=Digital Signature Trust Co., CN=DST Root CA X3
>         X509v3 extensions:
>             X509v3 Basic Constraints: critical
>                 CA:TRUE 
>             X509v3 Key Usage: critical
>                 Certificate Sign, CRL Sign 
>             X509v3 Subject Key Identifier:
>                 C4:A7:B1:A4:7B:2C:71:FA:DB:E1:4B:90:75:FF:C4:15:60:85:89:10
> SHA1 Fingerprint=DA:C9:02:4F:54:D8:F6:DF:94:93:5F:B1:73:26:38:CA:6A:D7:7C:13
> SHA256 Fingerprint=06:87:26:03:31:A7:24:03:D9:09:F1:05:E6:9B:CF:0D:32:E1:BD:24:93:FF:C6:D9:20:6D:11:BC:D6:77:07:39
> -----BEGIN CERTIFICATE-----
> 
> 
> Remove from there (if it is line 1130) to the matching
> -----END CERTIFICATE-----
> line in /etc/ssl/cert.pem (around 1171) and that gets rid of the
> expired X3 cert that doesn't really need to be in the certificate
> chain. After that,
> /opt/local/libexec/mpstats submit
> works for me on 10.14. Still doesn't help with what's presumably the
> TLS problem on older versions (10.6.8 being the only older version I
> have available, so I don't know just what version is the cutoff for
> that problem).

Thanks! That worked on 10.14. I couldn't find the equivalent cert.pem
file for /usr/bin/curl on 10.6.8 (not that the same thing would have
worked there anyway), so I did this instead:

  cd /usr/bin
  mv curl curl.orig
  ln -s /opt/local/bin/curl curl

After that, "/usr/bin/curl https://ports.macports.org" worked
but "/opt/local/libexec/mpstats submit" still fails
with the same error.

cheers,
raf



More information about the macports-users mailing list