![]() |
[SECURITY] Another compromised Certificate Authority
Beware:
http://googleonlinesecurity.blogspot...-security.html Fremantle Community SSU will issue an update ASAP. Maybe Harmattan users should call Nokia Support for an update. Or it is HiFo that should do that, I don't know. Please someone from the HiFo board comment on what should Harmattan users do (in light of the "email to elop" concerns) |
Re: [SECURITY] Another compromised Certificate Authority
Quote:
Meanwhile, since I have incepted my device I tried to fix it myself: Code:
~ $ ariadne mv /etc/ssl/certs/d937b34e05fdd9cf9f1216aeb6892feb253a881c.pem /etc/ssl/certs/d937b34e05fdd9cf9f1216aeb6892feb253a881c.pem.donttrust |
Re: [SECURITY] Another compromised Certificate Authority
ssl certs are not under aegis protection
just enter full credentials mode by "ariadne sh" and then move/delete untrusted cert |
Re: [SECURITY] Another compromised Certificate Authority
if you want the 'proper' way to remove it, then the right command would be:
opensh -c "acmcli -C aegis-certman-common-ca::CertCACommonAdd -lc common-ca -r d937b34e05fdd9cf9f1216aeb6892feb253a881c" This assumes that you have installed opensh with all the capas. You can run the acmcli with all capa inception shell too. |
Re: [SECURITY] Another compromised Certificate Authority
Thanks rainisto, that fixed it :)
The aegis-certman-common-ca package installed the certificates into /usr/share/aegis-certman-common-ca, any idea if that is used for something? The turktrust certificate over there can be (re)moved using more conventional ways tho. |
Re: [SECURITY] Another compromised Certificate Authority
you don't need to remove any files after running that acmcli command. They will not be used by harmattan system.
|
Re: [SECURITY] Another compromised Certificate Authority
1 Attachment(s)
Is it a coincidence this cert is the first in the Certmanager list?
Can certs be revoked manually on N900? |
Re: [SECURITY] Another compromised Certificate Authority
Is opensh needed? or is open mode + devel-su + develsh enough?
|
Re: [SECURITY] Another compromised Certificate Authority
Quote:
You may check with Code:
dbus-send --system --type=method_call --dest=com.nokia.osso_browser /com/nokia/osso_browser/request com.nokia.osso_browser.load_url string:"chrome://pippki/content/certManager.xul" Quote:
Quote:
For N9 users, do we need to delete that CA also from browser? (but according to open mentioned bug, there is no such possibility?) Simple script/guide to remove fraudulent CAs: Code:
#!/bin/sh --edit BUT, one more question arises here: I do see two certificate IDs for TÜRKTRUST Quote:
Quote:
So maybe for harmattan users, you also check bettwer twice? I have no idea, why we do have them twice. Or if we need to block/delete both. Or if only one is fraudulent ... |
Re: [SECURITY] Another compromised Certificate Authority
https://blog.mozilla.org/security/20...t-certficates/
According to this page Mozilla is revoking both certificates, so there's no reason why we should not. |
All times are GMT. The time now is 23:03. |
vBulletin® Version 3.8.8