13173e
////
13173e
Copyright (C) 2013 Red Hat, Inc.
13173e
13173e
This program is free software; you can redistribute it and/or modify
13173e
it under the terms of the GNU General Public License as published by
13173e
the Free Software Foundation; either version 2 of the License, or
13173e
(at your option) any later version.
13173e
13173e
This program is distributed in the hope that it will be useful,
13173e
but WITHOUT ANY WARRANTY; without even the implied warranty of
13173e
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
13173e
GNU General Public License for more details.
13173e
////
13173e
13173e
13173e
update-ca-trust(8)
13173e
==================
13173e
:doctype: manpage
13173e
:man source: update-ca-trust
13173e
13173e
13173e
NAME
13173e
----
13173e
update-ca-trust - manage consolidated and dynamic configuration of CA 
13173e
certificates and associated trust
13173e
13173e
13173e
SYNOPSIS
13173e
--------
13173e
*update-ca-trust* ['COMMAND']
13173e
13173e
13173e
DESCRIPTION
13173e
-----------
13173e
update-ca-trust(8) is used to manage a consolidated and dynamic configuration 
13173e
feature of Certificate Authority (CA) certificates and associated trust.
13173e
13173e
The feature is available for new applications that read the
13173e
consolidated configuration files found in the /etc/pki/ca-trust/extracted directory
13173e
or that load the PKCS#11 module p11-kit-trust.so
13173e
13173e
Parts of the new feature are also provided in a way to make it useful
13173e
for legacy applications.
13173e
13173e
Many legacy applications expect CA certificates and trust configuration
13173e
in a fixed location, contained in files with particular path and name,
13173e
or by referring to a classic PKCS#11 trust module provided by the 
13173e
NSS cryptographic library.
13173e
13173e
The dynamic configuration feature provides functionally compatible replacements 
13173e
for classic configuration files and for the classic NSS trust module named libnssckbi.
13173e
13173e
In order to enable legacy applications, that read the classic files or 
13173e
access the classic module, to make use of the new consolidated and dynamic configuration 
13173e
feature, the classic filenames have been changed to symbolic links.
13173e
The symbolic links refer to dynamically created and consolidated 
13173e
output stored below the /etc/pki/ca-trust/extracted directory hierarchy.
13173e
13173e
The output is produced using the 'update-ca-trust' command (without parameters),
13173e
or using the 'update-ca-trust extract' command.
13173e
In order to produce the output, a flexible set of source configuration
13173e
is read, as described in section <<sourceconf,SOURCE CONFIGURATION>>.
13173e
13173e
In addition, the classic PKCS#11 module 
13173e
is replaced with a new PKCS#11 module (p11-kit-trust.so) that dynamically 
13173e
reads the same source configuration.
13173e
13173e
13173e
[[sourceconf]]
13173e
SOURCE CONFIGURATION
13173e
--------------------
13173e
The dynamic configuration feature uses several source directories that
13173e
will be scanned for any number of source files. *It is important to select 
13173e
the correct subdirectory for adding files, as the subdirectory defines how 
13173e
contained certificates will be trusted or distrusted, and which file formats are read.*
13173e
13173e
Files in *subdirectories below the directory hierarchy /usr/share/pki/ca-trust-source/* contain CA certificates and 
13173e
trust settings in the PEM file format. The trust settings found here will be
13173e
interpreted with a *low priority*.
13173e
13173e
Files in *subdirectories below the directory hierarchy /etc/pki/ca-trust/source/* contain CA certificates and 
13173e
trust settings in the PEM file format. The trust settings found here will be
13173e
interpreted with a *high priority*.
13173e
13173e
.You may use the following rules of thumb to decide, whether your configuration files should be added to the /etc or rather to the /usr directory hierarchy:
13173e
* If you are manually adding a configuration file to a system, you probably 
13173e
want it to override any other default configuration, and you most likely should
13173e
add it to the respective subdirectory in the /etc hierarchy.
13173e
* If you are creating a package that provides additional root CA certificates,
13173e
that is intended for distribution to several computer systems, but you still
13173e
want to allow the administrator to override your list, then your package should 
13173e
add your files to the respective subdirectory in the /usr hierarchy.
13173e
* If you are creating a package that is supposed to override the default system
13173e
trust settings, that is intended for distribution to several computer systems, then your package should install the files to the respective
13173e
subdirectory in the /etc hierarchy.
13173e
13173e
.*QUICK HELP 1*: To add a certificate in the simple PEM or DER file formats to the list of CAs trusted on the system:
13173e
* add it as a new file to directory /etc/pki/ca-trust/source/anchors/
13173e
* run 'update-ca-trust extract'
13173e
13173e
.*QUICK HELP 2*: If your certificate is in the extended BEGIN TRUSTED file format (which may contain distrust/blacklist trust flags, or trust flags for usages other than TLS) then:
13173e
* add it as a new file to directory /etc/pki/ca-trust/source/
13173e
* run 'update-ca-trust extract'
13173e
13173e
.In order to offer simplicity and flexibility, the way certificate files are treated depends on the subdirectory they are installed to.
13173e
* simple trust anchors subdirectory: /usr/share/pki/ca-trust-source/anchors/ or /etc/pki/ca-trust/source/anchors/
13173e
* simple blacklist (distrust) subdirectory: /usr/share/pki/ca-trust-source/blacklist/ or /etc/pki/ca-trust/source/blacklist/
13173e
* extended format directory: /usr/share/pki/ca-trust-source/ or /etc/pki/ca-trust/source/
13173e
13173e
.In the main directories /usr/share/pki/ca-trust-source/ or /etc/pki/ca-trust/source/ you may install one or multiple files in the following file formats:
13173e
* certificate files that include trust flags,
13173e
  in the BEGIN/END TRUSTED CERTIFICATE file format
13173e
  (any file name), which have been created using the openssl x509 tool
13173e
  and the -addreject -addtrust options.
13173e
  Bundle files with multiple certificates are supported.
13173e
* files in the p11-kit file format using the .p11-kit file name
13173e
  extension, which can (e.g.) be used to distrust certificates
13173e
  based on serial number and issuer name, without having the
13173e
  full certificate available.
13173e
  (This is currently an undocumented format, to be extended later.
13173e
   For examples of the supported formats, see the files
13173e
   shipped with the ca-certificates package.)
13173e
* certificate files without trust flags in either the DER file format or in
13173e
  the PEM (BEGIN/END CERTIFICATE) file format (any file name). Such files 
13173e
  will be added with neutral trust, neither trusted nor distrusted.
13173e
  They will simply be known to the system, which might be helpful to
13173e
  assist cryptographic software in constructing chains of certificates.
13173e
  (If you want a CA certificate in these file formats to be trusted, you 
13173e
   should remove it from this directory and move it to the 
13173e
   ./anchors subdirectory instead.)
13173e
13173e
In the anchors subdirectories /usr/share/pki/ca-trust-source/anchors/ or /etc/pki/ca-trust/source/anchors/
13173e
you may install one or multiple certificates in either the DER file
13173e
format or in the PEM (BEGIN/END CERTIFICATE) file format.
13173e
Each certificate will be treated as *trusted* for all purposes.
13173e
13173e
In the blacklist subdirectories /usr/share/pki/ca-trust-source/blacklist/ or /etc/pki/ca-trust/source/blacklist/
13173e
you may install one or multiple certificates in either the DER file
13173e
format or in the PEM (BEGIN/END CERTIFICATE) file format.
13173e
Each certificate will be treated as *distrusted* for all purposes.
13173e
13173e
Please refer to the x509(1) manual page for the documentation of the 
13173e
BEGIN/END CERTIFICATE and BEGIN/END TRUSTED CERTIFICATE file formats.
13173e
13173e
Applications that rely on a static file for a list of trusted CAs
13173e
may load one of the files found in the /etc/pki/ca-trust/extracted
13173e
directory. After modifying any file in the
13173e
/usr/share/pki/ca-trust-source/ or /etc/pki/ca-trust/source/
13173e
directories or in any of their subdirectories, or after adding a file, 
13173e
it is necessary to run the 'update-ca-trust extract' command,
13173e
in order to update the consolidated files in /etc/pki/ca-trust/extracted/ .
13173e
13173e
Applications that load the classic PKCS#11 module using filename libnssckbi.so 
13173e
(which has been converted into a symbolic link pointing to the new module)
13173e
and any application capable of 
13173e
loading PKCS#11 modules and loading p11-kit-trust.so, will benefit from
13173e
the dynamically merged set of certificates and trust information stored in the
13173e
/usr/share/pki/ca-trust-source/ and /etc/pki/ca-trust/source/ directories.
13173e
13173e
13173e
[[extractconf]]
13173e
EXTRACTED CONFIGURATION
13173e
-----------------------
13173e
The directory /etc/pki/ca-trust/extracted/ contains generated CA certificate 
13173e
bundle files which are created and updated, based on the <<sourceconf,SOURCE CONFIGURATION>> 
13173e
by running the 'update-ca-trust extract' command.
13173e
13173e
If your application isn't able to load the PKCS#11 module p11-kit-trust.so,
13173e
then you can use these files in your application to load a list of global
13173e
root CA certificates.
13173e
13173e
Please never manually edit the files stored in this directory,
13173e
because your changes will be lost and the files automatically overwritten,
13173e
each time the 'update-ca-trust extract' command gets executed.
13173e
13173e
In order to install new trusted or distrusted certificates,
13173e
please rather install them in the respective subdirectory below the
13173e
/usr/share/pki/ca-trust-source/ or /etc/pki/ca-trust/source/
13173e
directories, as described in the <<sourceconf,SOURCE CONFIGURATION>> section.
13173e
13173e
The directory /etc/pki/ca-trust/extracted/java/ contains 
13173e
a CA certificate bundle in the java keystore file format.
13173e
Distrust information cannot be represented in this file format,
13173e
and distrusted certificates are missing from these files.
13173e
File cacerts contains CA certificates trusted for TLS server authentication.
13173e
13173e
The directory /etc/pki/ca-trust/extracted/openssl/ contains 
13173e
CA certificate bundle files in the extended BEGIN/END TRUSTED CERTIFICATE file format, 
13173e
as described in the x509(1) manual page.
13173e
File ca-bundle.trust.crt contains the full set of all trusted
13173e
or distrusted certificates, including the associated trust flags.
13173e
13173e
The directory /etc/pki/ca-trust/extracted/pem/ contains 
13173e
CA certificate bundle files in the simple BEGIN/END CERTIFICATE file format, 
13173e
as described in the x509(1) manual page.
13173e
Distrust information cannot be represented in this file format,
13173e
and distrusted certificates are missing from these files.
13173e
File tls-ca-bundle.pem contains CA certificates 
13173e
trusted for TLS server authentication.
13173e
File email-ca-bundle.pem contains CA certificates 
13173e
trusted for E-Mail protection.
13173e
File objsign-ca-bundle.pem contains CA certificates 
13173e
trusted for code signing.
13173e
13173e
The directory /etc/pki/ca-trust/extracted/edk2/ contains a CA
13173e
certificate bundle ("cacerts.bin") in the "sequence of
13173e
EFI_SIGNATURE_LISTs" format, defined in the UEFI-2.7 specification,
13173e
sections "31.4.1 Signature Database" and
13173e
"EFI_CERT_X509_GUID". Distrust information cannot be represented in
13173e
this file format, and distrusted certificates are missing from these
13173e
files. File "cacerts.bin" contains CA certificates trusted for TLS
13173e
server authentication.
13173e
13173e
13173e
COMMANDS
13173e
--------
13173e
(absent/empty command)::
13173e
    Same as the *extract* command described below. (However, the command may
13173e
    print fewer warnings, as this command is being run during rpm package 
13173e
    installation, where non-fatal status output is undesired.)
13173e
13173e
*extract*::
13173e
    Instruct update-ca-trust to scan the <<sourceconf,SOURCE CONFIGURATION>> and produce 
13173e
    updated versions of the consolidated configuration files stored below
13173e
    the /etc/pki/ca-trust/extracted directory hierarchy.
13173e
13173e
FILES
13173e
-----
13173e
/etc/pki/tls/certs/ca-bundle.crt::
13173e
	Classic filename, file contains a list of CA certificates trusted for TLS server authentication usage, in the simple BEGIN/END CERTIFICATE file format, without distrust information.
13173e
	This file is a symbolic link that refers to the consolidated output created by the update-ca-trust command.
13173e
13173e
/etc/pki/tls/certs/ca-bundle.trust.crt::
13173e
	Classic filename, file contains a list of CA certificates in the extended BEGIN/END TRUSTED CERTIFICATE file format, which includes trust (and/or distrust) flags specific to certificate usage.
13173e
	This file is a symbolic link that refers to the consolidated output created by the update-ca-trust command.
13173e
13173e
/etc/pki/java/cacerts::
13173e
	Classic filename, file contains a list of CA certificates trusted for TLS server authentication usage, in the Java keystore file format, without distrust information.
13173e
	This file is a symbolic link that refers to the consolidated output created by the update-ca-trust command.
13173e
13173e
/usr/share/pki/ca-trust-source::
13173e
	Contains multiple, low priority source configuration files as explained in section <<sourceconf,SOURCE CONFIGURATION>>. Please pay attention to the specific meanings of the respective subdirectories.
13173e
13173e
/etc/pki/ca-trust/source::
13173e
	Contains multiple, high priority source configuration files as explained in section <<sourceconf,SOURCE CONFIGURATION>>. Please pay attention to the specific meanings of the respective subdirectories.
13173e
13173e
/etc/pki/ca-trust/extracted::
13173e
	Contains consolidated and automatically generated configuration files for consumption by applications, 
13173e
	which are created using the 'update-ca-trust extract' command. Don't edit files in this directory, because they will be overwritten.
13173e
	See section <<extractconf,EXTRACTED CONFIGURATION>> for additional details.
13173e
13173e
AUTHOR
13173e
------
13173e
Written by Kai Engert and Stef Walter.