![]() |
Re: [SECURITY] Another compromised Certificate Authority
Quote:
But if your in open mode then you can just install opensh with (if you have downloaded the deb package to your device). Harmattan openmode: apt-get install wget wget http://maemo.cloud-7.de/HARM/N9/open...nsh/opensh.deb AEGIS_FIXED_ORIGIN=com.nokia.maemo dpkg -i opensh.deb |
Re: [SECURITY] Another compromised Certificate Authority
Quote:
and others won't work on sane default sudo setup, so you'll have to run this in a root account instead (install rootsh, do `root`) Quote:
/j |
Re: [SECURITY] Another compromised Certificate Authority
Quote:
But why would anybody try to run this as non-root? Code:
#!/bin/sh Quote:
Thanks for correction/confirming. |
Re: [SECURITY] Another compromised Certificate Authority
1 Attachment(s)
Should Turktrust still be shown as valid in Smaemo6?
|
Re: [SECURITY] Another compromised Certificate Authority
@sixwheeledbeast: This certificate applet had bug - it shown blacklisted certificates as valid. Bug was fixed in PR1.3.1 by this commit: https://gitorious.org/maemo-5-certif...4945c1dce4bf6e
So for blacklisting you *need* PR1.3.1 |
Re: [SECURITY] Another compromised Certificate Authority
Quote:
Code:
$ perl /usr/bin/c_rehash /etc/certs/common-ca |
Re: [SECURITY] Another compromised Certificate Authority
Quote:
|
Re: [SECURITY] Another compromised Certificate Authority
hi all, can anyone please some up, is N9 with PR1.3 vulnerable, or is it not?
|
All times are GMT. The time now is 19:45. |
vBulletin® Version 3.8.8