certificate update for old Macs
Bill Cole
macportsusers-20171215 at billmail.scconsult.com
Tue Jan 4 22:41:25 UTC 2022
On 2022-01-04 at 14:37:18 UTC-0500 (Tue, 4 Jan 2022 11:37:18 -0800)
Michael <keybounce at gmail.com>
is rumored to have said:
> On 2022-01-03, at 4:12 PM, Richard L. Hamilton <rlhamil at smart.net>
> wrote:
>
>> The only problem with that or anything similar, is that unless you go
>> to quite a lot of work to just download rather than install the PEM
>> file, and convert it into something human readable WITHOUT installing
>> it, and investigate every certificate in there, you're trusting that
>> the site you got it from is not only legit, but is secure and hasn't
>> been hacked to alter the file to provide some very bogus certificates
>> that could work together with some sort DNS spoofing to get you to
>> feed sensitive information (ie bank passwords, etc) via an untrusted
>> site that would capture it.
>
> Makes sense. Now, how do you go about turning a certificate into
> something human readable? Serious question, I have *never* seen this
> discussed anywhere.
Get the certificate in PEM format, then:
openssl x509 -text < cert.pem
See the man page ('man x509') for all the very gory details.
> Everyone just says "As long as the roots are good you can trust the
> chain", and that's never made sense to me. The whole "trust what
> strangers say" system seems more like "Find a way for companies to
> make money" than any good security system.
Well, yes: that's what the public CA system is. It is grounded in the
OSI protocol stack, which is big on hierarchical authority, and no one
has figured out a better model that scales and allows strangers to
establish authenticated private data transport. Ultimately it requires
shared trust anchors of some sort, and the model we've stumbled into has
the advantage of not being subject to a single authority and encouraging
the various CAs and bundlers of trust to keep watch on each other.
A mechanism for eliminating the CA-based hierarchical trust layer
already exists in the DANE (DNS-based Authentication of Named Entities)
standard that is in broad use for validating email trasnsport. It
replaces the CA model by binding the trust chain to DNS, making
certificate trust ultimately dependent on DNSSEC and subject to all of
its risks.
--
Bill Cole
bill at scconsult.com or billcole at apache.org
(AKA @grumpybozo and many *@billmail.scconsult.com addresses)
Not Currently Available For Hire
More information about the macports-users
mailing list