View Single Post
Posts: 3,617 | Thanked: 2,412 times | Joined on Nov 2009 @ Cambridge, UK
#27
Originally Posted by lancewex View Post
So for those of us who don't understand these things you are doing to remove the old certificates--are we just screwed?
You're not screwed, no - you're pretty unlikely (outside Iran) to run into one of these fraudulent certificates. It's probably worth making the effort to follow the instructions though - they're not overly complex, even for casual users.
  1. Install rootsh from App Manager (if not installed)
  2. Launch X Terminal
  3. Type "root" and press Enter
  4. Type "cmcli -c common-ca -r 8868bfe08e35c43b386b62f7283b8481c80cd74d" and press Enter
  5. Close X Terminal and launch the Web browser
  6. Type in "chrome://pippki/content/certManager.xul" as the URL
  7. Tap on "Authorities" to view the CA tab
  8. Scroll down to DigiNotar (they're in alphabetical order)
  9. Select the DigiNotar certificate (if there's more than one, repeat this and the next two steps for each)
  10. Click on the "Delete..." button
  11. Confirm to delete the certificate
  12. Once you're finished deleting all DigiNotar certificates, click on the "OK" button
  13. Browse to "https://www.diginotar.com" and check that you get a security error

Last edited by Rob1n; 2011-09-05 at 08:15. Reason: Removed erroneous http:// prefix from URL
 

The Following 2 Users Say Thank You to Rob1n For This Useful Post: