No, it is due to the cert name begins with "(". You may check with Code: dbus-send --system --type=method_call --dest=com.nokia.osso_browser /com/nokia/osso_browser/request com.nokia.osso_browser.load_url string:"chrome://pippki/content/certManager.xul" Yes, there is such possibility. I will put a script (produced at DigiNotar times) at the end of post. For N900 users, please refer to below script. For N9 users, do we need to delete that CA also from browser? (but according to open mentioned bug, there is no such possibility?) Simple script/guide to remove fraudulent CAs: Code: #!/bin/sh #removing fraudulent CAs echo enter the cert\(ifier\) You are looking for: read cert cmcli -T common-ca -L | grep "$cert" echo now copy the full cert ID ... read nothing echo and give it as input \(for removal\) read certID if [ `id -u` != 0 ] ; then sudo cp /etc/certs/common-ca/$certID.pem /etc/certs/common-ca/$certID.pem.old sudo cmcli -c common-ca -r $certID else cp /etc/certs/common-ca/$certID.pem /etc/certs/common-ca/$certID.pem.old cmcli -c common-ca -r $certID fi echo now open microb and goto echo chrome://pippki/content/certManager.xul echo and delete the cert also there in the CA manager read nothing dbus-send --system --type=method_call --dest=com.nokia.osso_browser /com/nokia/osso_browser/request com.nokia.osso_browser.load_url string:"chrome://pippki/content/certManager.xul" --edit BUT, one more question arises here: I do see two certificate IDs for TÜRKTRUST and also in browsers they do appear twice. So maybe for harmattan users, you also check bettwer twice? I have no idea, why we do have them twice. Or if we need to block/delete both. Or if only one is fraudulent ...
dbus-send --system --type=method_call --dest=com.nokia.osso_browser /com/nokia/osso_browser/request com.nokia.osso_browser.load_url string:"chrome://pippki/content/certManager.xul"
#!/bin/sh #removing fraudulent CAs echo enter the cert\(ifier\) You are looking for: read cert cmcli -T common-ca -L | grep "$cert" echo now copy the full cert ID ... read nothing echo and give it as input \(for removal\) read certID if [ `id -u` != 0 ] ; then sudo cp /etc/certs/common-ca/$certID.pem /etc/certs/common-ca/$certID.pem.old sudo cmcli -c common-ca -r $certID else cp /etc/certs/common-ca/$certID.pem /etc/certs/common-ca/$certID.pem.old cmcli -c common-ca -r $certID fi echo now open microb and goto echo chrome://pippki/content/certManager.xul echo and delete the cert also there in the CA manager read nothing dbus-send --system --type=method_call --dest=com.nokia.osso_browser /com/nokia/osso_browser/request com.nokia.osso_browser.load_url string:"chrome://pippki/content/certManager.xul"
$ perl /usr/bin/c_rehash /etc/certs/common-ca