<feed xmlns='http://www.w3.org/2005/Atom'>
<title>src/secure/caroot/trusted/T-TeleSec_GlobalRoot_Class_3.pem, branch stable/14</title>
<subtitle>FreeBSD source tree</subtitle>
<link rel='alternate' type='text/html' href='http://cgit.freebsd.org/src/'/>
<entry>
<title>caroot: regenerate the root bundle with OpenSSL 3</title>
<updated>2023-09-05T14:55:09+00:00</updated>
<author>
<name>Kyle Evans</name>
<email>kevans@FreeBSD.org</email>
</author>
<published>2023-08-26T01:15:39+00:00</published>
<link rel='alternate' type='text/html' href='http://cgit.freebsd.org/src/commit/?id=e7109724468c0415386f20b62bfb8ed34df8e8eb'/>
<id>e7109724468c0415386f20b62bfb8ed34df8e8eb</id>
<content type='text'>
No functional change intended.

Approved by:	re (kib)

(cherry picked from commit 8ed0ecf8024d10e9cd21f5880723a6cec4fd4ae6)
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
No functional change intended.

Approved by:	re (kib)

(cherry picked from commit 8ed0ecf8024d10e9cd21f5880723a6cec4fd4ae6)
</pre>
</div>
</content>
</entry>
<entry>
<title>caroot: drop the VERSION tag from already-processed certs</title>
<updated>2023-09-05T14:54:55+00:00</updated>
<author>
<name>Kyle Evans</name>
<email>kevans@FreeBSD.org</email>
</author>
<published>2023-08-26T00:55:32+00:00</published>
<link rel='alternate' type='text/html' href='http://cgit.freebsd.org/src/commit/?id=7c52963832b8e827cc4a2fd9cea842c05cbddd71'/>
<id>7c52963832b8e827cc4a2fd9cea842c05cbddd71</id>
<content type='text'>
An update is imminent; drop these now to make it easier to audit the
results.

Approved by:	re (kib)

(cherry picked from commit 3f84d4b0fe1445bca5f3b6a70fc5641b88c31217)
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
An update is imminent; drop these now to make it easier to audit the
results.

Approved by:	re (kib)

(cherry picked from commit 3f84d4b0fe1445bca5f3b6a70fc5641b88c31217)
</pre>
</div>
</content>
</entry>
<entry>
<title>caroot: reroll the remaining certs</title>
<updated>2021-04-13T21:59:34+00:00</updated>
<author>
<name>Kyle Evans</name>
<email>kevans@FreeBSD.org</email>
</author>
<published>2021-04-13T21:51:47+00:00</published>
<link rel='alternate' type='text/html' href='http://cgit.freebsd.org/src/commit/?id=3016c5c2bf68d8c6ebf303939f20092478e7a4ca'/>
<id>3016c5c2bf68d8c6ebf303939f20092478e7a4ca</id>
<content type='text'>
This adds a specific note that these are explicitly trusted for
server auth.

MFC after:	3 days
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
This adds a specific note that these are explicitly trusted for
server auth.

MFC after:	3 days
</pre>
</div>
</content>
</entry>
<entry>
<title>caroot: drop $FreeBSD$ expansion from root bundle</title>
<updated>2020-12-28T03:47:41+00:00</updated>
<author>
<name>Kyle Evans</name>
<email>kevans@FreeBSD.org</email>
</author>
<published>2020-12-28T03:47:41+00:00</published>
<link rel='alternate' type='text/html' href='http://cgit.freebsd.org/src/commit/?id=f20c0e3319524d51ab474608851bc705d57a7482'/>
<id>f20c0e3319524d51ab474608851bc705d57a7482</id>
<content type='text'>
This debatably could have waited until the next update would have taken
place, but it's easier to see what changes if we get it out of the way
now.

MFC after:	3 days
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
This debatably could have waited until the next update would have taken
place, but it's easier to see what changes if we get it out of the way
now.

MFC after:	3 days
</pre>
</div>
</content>
</entry>
<entry>
<title>caroot: commit initial bundle</title>
<updated>2019-10-04T02:34:20+00:00</updated>
<author>
<name>Kyle Evans</name>
<email>kevans@FreeBSD.org</email>
</author>
<published>2019-10-04T02:34:20+00:00</published>
<link rel='alternate' type='text/html' href='http://cgit.freebsd.org/src/commit/?id=b25bf676f0db2a0cf15b6187d54d2cffe68f4fc4'/>
<id>b25bf676f0db2a0cf15b6187d54d2cffe68f4fc4</id>
<content type='text'>
Interested users can blacklist any/all of these with certctl(8), examples:

- mv /usr/share/certs/trusted/... /usr/share/certs/blacklisted/...; \
    certctl rehash
- certctl blacklist /usr/share/certs/trusted/*; \
    certctl rehash

Certs can be easily examined after installation with `certctl list`, and
certctl blacklist will accept the hashed filename as output by list or as
seen in /etc/ssl/certs

No objection from:	secteam
Relnotes:	Definite maybe
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Interested users can blacklist any/all of these with certctl(8), examples:

- mv /usr/share/certs/trusted/... /usr/share/certs/blacklisted/...; \
    certctl rehash
- certctl blacklist /usr/share/certs/trusted/*; \
    certctl rehash

Certs can be easily examined after installation with `certctl list`, and
certctl blacklist will accept the hashed filename as output by list or as
seen in /etc/ssl/certs

No objection from:	secteam
Relnotes:	Definite maybe
</pre>
</div>
</content>
</entry>
</feed>
