Hello

On 21/07/15 17:54, Michael Shuler wrote:
> On 07/21/2015 09:05 AM, Cédric Dufour - Idiap Research Institute wrote:
>> Would you plan to push an updated/"backported" ca-certificates in 
>> wheezy-updates ?
>> Would security updates - e.g. removal of a compromised CA - make it to it ?
>
> I'm thinking that an upload of the jessie version, ca-certificates_20141019, 
> may be appropriate for wheezy-updates, or just a rebuild with the Mozilla CA 
> bundle from that version, excluding the additional changes. I'm not sure, 
> yet. There is a bit of hand waving at the removal of 1024-bit CAs by Mozilla 
> in the latest CA bundle currently in Stretch, and I don't want to be that 
> disruptive in wheezy-updates (or jessie-updates, for that matter..)

I'm afraid I can't be of much help as to this decision and I would not presume 
to dictate Debian policy on this matter.

My 1-penny for the (old)stable branch:
 - missing "trustworthy" root CAs ought to be added (that the reason I reported 
this "bug"), especially if backed by the optional so-called "volatile" repo 
(which sysadmins may choose to use or not)
 - actually compromised or untrustworthy root CAs ought to be removed (iow. 
those that corresponds to CVE advisories); shouldn't such updates actually come 
from security.debian.org ?
 - in-between should be left "as is"
But I am aware that cherry-picking those changes is a tedious job (and a great 
responsibility).

Doesn't/shouldn't Debian Security Team have a say in this ?

Best regards,

Cédric

>
> You can dig around git and look through debian/changelog in the stable 
> release branches, as well as master (sid/testing), for the CAs that Mozilla 
> has added/removed.
>
> http://anonscm.debian.org/cgit/collab-maint/ca-certificates.git
> Jessie changelog:
> http://anonscm.debian.org/cgit/collab-maint/ca-certificates.git/tree/debian/changelog?h=debian-jessie
>


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to