On 2013-10-03 at 11:04 -0700, Zack Williams wrote:
> On Oct 3, 2013, at 10:01 AM, Matt Disney <mdis...@gmail.com> wrote:
> > Is anyone doing something you like for managing SSL CA certs (for example, 
> > distributing your own internal CA cert) on a broad range of operating 
> > systems and browsers in a work/enterprise environment? 
> > 
> > Windows+IE is easy enough through AD. It's all the other stuff I'm 
> > wondering about (Mac, Linux, Firefox, Chrome, Safari, other?).
> 
> For Mac, certificates are stored the keychain.  The `security` CLI tool can 
> modify keychains. Example here:
> 
> http://derflounder.wordpress.com/2011/03/13/adding-new-trusted-root-certificates-to-system-keychain/
> 
> In practical use, I distribute certs with a script, with the cert(s) embedded 
> in the script via heredoc so I only have a single file to manage.

Years ago, I wrote some instructions for Mozilla and Chrome based stuff,
amongst others; the text is still up at
<https://www.security.spodhuis.org/> (but should probably move to a
sub-page and be updated).

While the Chrome enterprise controls let you set a lot of policy
controls and master preferences, they don't let you set machine-wide
trust stores, unfortunately.  :(  So if you're not using an OS where the
certificate storage is integrated with OS facilities (such as on a Mac),
then you're bitten by this:

  https://code.google.com/p/chromium/issues/detail?id=209788

and the best advice I have to offer is to use the certutil manipulations
I describe in my page above.  For _other_ settings in Chrome, the
"Chrome for Business FAQ" might prove useful:

  https://support.google.com/chrome/a/answer/188447?hl=en
  http://www.chromium.org/administrators/policy-list-3

I have not checked recently to see which browsers, mail-clients, etc
have transitioned to the NSS Shared DB -- I'm not optimistic; for those
that have, the ~/.pki/nssdb location will catch them all.  But in
practice, you're going to want to script up checking a few other
locations too, with each browser profile (and handling multiple browser
profiles).  I don't know of a machine-wide cert db location for NSS, my
vague recollection from when I looked is that the default certs get
baked into the library.

Oh, this brings back memories of the pain of getting Thunderbird
configured correctly, with its separate trust stores.

-Phil
_______________________________________________
Tech mailing list
Tech@lists.lopsa.org
https://lists.lopsa.org/cgi-bin/mailman/listinfo/tech
This list provided by the League of Professional System Administrators
 http://lopsa.org/

Reply via email to