Bug 1845988
| Summary: | Upstream removal of GeoTrust Global CA requires investigation | ||
|---|---|---|---|
| Product: | [Fedora] Fedora | Reporter: | Michael Catanzaro <mcatanza> |
| Component: | ca-certificates | Assignee: | Bob Relyea <rrelyea> |
| Status: | CLOSED NOTABUG | QA Contact: | Fedora Extras Quality Assurance <extras-qa> |
| Severity: | medium | Docs Contact: | |
| Priority: | unspecified | ||
| Version: | rawhide | CC: | crypto-team, dueno, jorton, kengert, nmavrogi, pwouters, rrelyea, tmraz |
| Target Milestone: | --- | ||
| Target Release: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| Whiteboard: | |||
| Fixed In Version: | Doc Type: | If docs needed, set a value | |
| Doc Text: | Story Points: | --- | |
| Clone Of: | Environment: | ||
| Last Closed: | 2020-06-15 20:31:01 UTC | Type: | Bug |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
|
Description
Michael Catanzaro
2020-06-10 14:26:02 UTC
Hi Bob, please confirm that you've seen this bug. The next update of ca-certificates will need to be handled carefully to deal with this issue. Debian has decided to simply revert this change. We are guessing Mozilla has some sort of hack in Firefox to whitelist trust for intermediate CAs signed by this root, which isn't a plausible solution to implement for each TLS library available in Fedora. I've seen it. I believe it's removed with the new NOT_AFTER flag. GeoTrust is still in the trust store, and NSS explicitly untrusts it except for certain certificates. I'll put more info after a full investigation. bob So mozilla lists relevent changes between NSS processing and the raw cert trust database here: https://wiki.mozilla.org/CA/Additional_Trust_Changes . NSS was indeed whitelisting accepted intermediates, but it also didn't explicitly removed the target CA's from the trust list. It now uses CKA_NSS_SERVER_DISTRUST_AFTER to handle how it distrusts the given CA's. I've verified that the cert has not been removed from the current trust list, but CKA_NSS_SERVER_DISTRUST_AFTER has been set in the latest version. This means if the certs issued from this CA was issued after the specified date, then the trust would be distrusted, otherwise it will continue to be trusted. I suspect Debian took out the certs from the trust store altogether, rather than process the list straight from mozilla. Upshot: if you process CKA_NSS_SERVER_DISTRUST_AFTER, then you will get safer behavior, otherwise the ca's are still trusted in the latest list. Thanks! (In reply to Bob Relyea from comment #3) > Upshot: if you process CKA_NSS_SERVER_DISTRUST_AFTER, then you will get > safer behavior, otherwise the ca's are still trusted in the latest list. (Something to consider for GnuTLS.) |