(1)
The pkg_add man page sais that digitally signed packages are checked
against authorities in /etc/ssl/pkgca.pem.

I didn't find this pkgca.pem at said place, although pkg_add is indeed
installed.

I suppose checking of digitally signed packages will not be possible
without these certificates.
So where will that pkgca.pem come from?

And how is it constituted?
mozilla has a "CA policy", but I doubt it really works, since rogue CAs
already did bad things (to people) via mozilla's CAs.

How are things done in OpenBSD?

(2)
What I found in /etc/ssl was a cert.pem which apparently contained CAs.
Some question: Where did it come from? How was it constituted by the
OpenBSD team? Is there some kind of CA policy?

(3)
Displaying that certificate file with
openssl x509 -noout -in cert.pem -text [or -issuer or -subject]
yielded data of ONE certificate.

However, with "less cert.pem" it's quickly obvious that the file
contains lots of certificates from different CAs.
This seems quite strange to me. Not even a warning, nothing which tells
that the file contains many certificates.

There does not seem to be an option to list all the certificates in such
a cert.pem file.
Of course I can grep the somewhat cluttered fields.
But shouldn't it be easy to list the CAs contained in such file?
In fact, that cert.pem is a keyring. Which commands exist to examine
such a keyring?

Generally speaking (not especially on OpenBSD!), I find it difficult to
check certificates.
I did this exercise on a linux box and found hundrets of certificates in
different places.
The tools seem to be more or less useful to create certificates from
data, but not at all for easily getting an overview of where all the
trust they represent goes. It's useful to build a hierarchical system,
but not to clearly show it, and how it works, to the user. This seems
bad to me.

Peer

Reply via email to