Changelog for
ca-certificates-mozilla-2.22-106.1.noarch.rpm :
Tue Mar 20 13:00:00 2018 kukukAATTsuse.de
- Use %license instead of %doc [bsc#1082318]
Thu Jan 25 13:00:00 2018 meissnerAATTsuse.com
- Updated to 2.22 state of the Mozilla NSS Certificate store.
- Removed CAs:
* ACEDICOM Root
* AddTrust Public CA Root
* AddTrust Qualified CA Root
* ApplicationCA - Japanese Government
* CA Disig Root R1
* CA WoSign ECC Root
* Certification Authority of WoSign G2
* Certinomis - Autorité Racine
* China Internet Network Information Center EV Certificates Root
* CNNIC ROOT
* Comodo Secure Certificate Services
* Comodo Trusted Certificate Services
* ComSign Secured CA
* DST ACES CA X6
* GeoTrust Global CA 2
* StartCom Certification Authority
* StartCom Certification Authority
* StartCom Certification Authority G2
* Swisscom Root CA 1
* TÜBİTAK UEKAE Kök Sertifika Hizmet Sağlayıcısı - Sürüm 3
* TÜRKTRUST Elektronik Sertifika Hizmet Sağlayıcısı
* TÜRKTRUST Elektronik Sertifika Hizmet Sağlayıcısı H6
* UTN USERFirst Hardware Root CA
* UTN USERFirst Object Root CA
* VeriSign Class 3 Secure Server CA - G2
* WellsSecure Public Root Certificate Authority
* Certification Authority of WoSign
* WoSign China
- Added CAs:
* D-TRUST Root CA 3 2013
* GDCA TrustAUTH R5 ROOT
* SSL.com EV Root Certification Authority ECC
* SSL.com EV Root Certification Authority RSA R2
* SSL.com Root Certification Authority ECC
* SSL.com Root Certification Authority RSA
* TrustCor RootCert CA-1
* TrustCor RootCert CA-2
* TUBITAK Kamu SM SSL Kok Sertifikasi - Surum 1
Wed Oct 25 14:00:00 2017 jmatejekAATTsuse.com
- convert processing script to Python 3
- ensure a stable conversion of UTF8 hex-encoded certificate names
- ensure a stable ordering of trust/distrust bits in headers
Tue Jan 24 13:00:00 2017 meissnerAATTsuse.com
- updated to 2.11 state of the Mozilla NSS Certificate store.
- removed CAs:
- Buypass_Class_2_CA_1:2.1.1.crt
serverAuth
- EBG_Elektronik_Sertifika_Hizmet_Sağlayıcısı:2.8.76.175.115.66.28.142.116.2.crt
codeSigning emailProtection serverAuth
- Equifax_Secure_CA:2.4.53.222.244.207.crt
emailProtection
- Equifax_Secure_eBusiness_CA_1:2.1.4.crt
emailProtection
- Equifax_Secure_Global_eBusiness_CA:2.1.1.crt
emailProtection
- IGC_A:2.5.57.17.69.16.148.crt
codeSigning emailProtection serverAuth
- Juur-SK:2.4.59.142.75.252.crt
codeSigning serverAuth
- Root_CA_Generalitat_Valenciana:2.4.59.69.229.104.crt
codeSigning emailProtection serverAuth
- RSA_Security_2048_v3:2.16.10.1.1.1.0.0.2.124.0.0.0.10.0.0.0.2.crt
codeSigning emailProtection serverAuth
- Sonera_Class_1_Root_CA:2.1.36.crt
emailProtection
- S-TRUST_Authentication_and_Encryption_Root_CA_2005_PN:2.16.55.25.24.230.83.84.124.26.181.184.203.89.90.219.53.183.crt
emailProtection
- Verisign_Class_1_Public_Primary_Certification_Authority:2.16.63.105.30.129.156.240.154.74.243.115.255.185.72.162.228.221.crt
emailProtection
- Verisign_Class_2_Public_Primary_Certification_Authority_-_G2:2.17.0.185.47.96.204.136.159.161.122.70.9.184.91.112.108.138.175.crt
emailProtection
- Verisign_Class_3_Public_Primary_Certification_Authority:2.16.112.186.228.29.16.217.41.52.182.56.202.123.3.204.186.191.crt
emailProtection
- added CAs:
+ AC_RAIZ_FNMT-RCM:2.15.93.147.141.48.103.54.200.6.29.26.199.84.132.105.7.crt
serverAuth
+ Amazon_Root_CA_1:2.19.6.108.159.207.153.191.140.10.57.226.240.120.138.67.230.150.54.91.202.crt
emailProtection serverAuth
+ Amazon_Root_CA_2:2.19.6.108.159.210.150.53.134.159.10.15.229.134.120.248.91.38.187.138.55.crt
emailProtection serverAuth
+ Amazon_Root_CA_3:2.19.6.108.159.213.116.151.54.102.63.59.11.154.217.232.158.118.3.242.74.crt
emailProtection serverAuth
+ Amazon_Root_CA_4:2.19.6.108.159.215.193.187.16.76.41.67.229.113.123.123.44.200.26.193.14.crt
emailProtection serverAuth
+ Certplus_Root_CA_G1:2.18.17.32.85.131.228.45.62.84.86.133.45.131.55.183.44.220.70.17.crt
emailProtection serverAuth
+ Certplus_Root_CA_G2:2.18.17.32.217.145.206.174.163.232.197.231.255.233.2.175.207.115.188.85.crt
emailProtection serverAuth
+ Hellenic_Academic_and_Research_Institutions_ECC_RootCA_2015:2.1.0.crt
emailProtection serverAuth
+ Hellenic_Academic_and_Research_Institutions_RootCA_2015:2.1.0.crt
emailProtection serverAuth
+ ISRG_Root_X1:2.17.0.130.16.207.176.210.64.227.89.68.99.224.187.99.130.139.0.crt (bsc#1010996)
serverAuth
+ LuxTrust_Global_Root_2:2.20.10.126.166.223.75.68.158.218.106.36.133.158.230.184.21.211.22.127.187.177.crt
serverAuth
+ OpenTrust_Root_CA_G1:2.18.17.32.179.144.85.57.125.127.54.109.100.194.167.159.107.99.142.103.crt
emailProtection serverAuth
+ OpenTrust_Root_CA_G2:2.18.17.32.161.105.27.191.189.185.189.82.150.143.35.232.72.191.38.17.crt
emailProtection serverAuth
+ OpenTrust_Root_CA_G3:2.18.17.32.230.248.76.252.36.176.190.5.64.172.218.131.27.52.96.63.crt
emailProtection serverAuth
+ Symantec_Class_1_Public_Primary_Certification_Authority_-_G4:2.16.33.110.51.165.203.211.136.164.111.41.7.180.39.60.196.216.crt
emailProtection
+ Symantec_Class_1_Public_Primary_Certification_Authority_-_G6:2.16.36.50.117.242.29.47.210.9.51.247.180.106.202.208.243.152.crt
emailProtection
+ Symantec_Class_2_Public_Primary_Certification_Authority_-_G4:2.16.52.23.101.18.64.59.183.86.128.45.128.203.121.85.166.30.crt
emailProtection
+ Symantec_Class_2_Public_Primary_Certification_Authority_-_G6:2.16.100.130.158.252.55.30.116.93.252.151.255.151.200.177.255.65.crt
emailProtection
- diff-from-upstream-2.7.patch: removed as we should be able to do
intermediate root chains now with openssl 1.0.2 and also gnutls 3.5
is able to do so.
Wed Apr 6 14:00:00 2016 meissnerAATTsuse.com
- diff-from-upstream-2.7.patch: restore some important legacy
CAs, otherwise Pidgin fails to talk to Google Talk for instance.
Thu Mar 31 14:00:00 2016 meissnerAATTsuse.com
- Updated to 2.7.
- diff-from-upstream-2.2.patch: removed as openssl 1.0.2 can do
immediate root CAs.
- Removed server trust from:
AC Raíz Certicámara S.A.
ComSign Secured CA
NetLock Uzleti (Class B) Tanusitvanykiado
NetLock Business (Class B) Root
NetLock Expressz (Class C) Tanusitvanykiado
TC TrustCenter Class 3 CA II
TURKTRUST Certificate Services Provider Root 1
TURKTRUST Certificate Services Provider Root 2
Equifax Secure Global eBusiness CA-1
Verisign Class 4 Public Primary Certification Authority G3
- enable server trust
Actalis Authentication Root CA
- Deleted CAs:
A Trust nQual 03
Buypass Class 3 CA 1
CA Disig
Digital Signature Trust Co Global CA 1
Digital Signature Trust Co Global CA 3
E Guven Kok Elektronik Sertifika Hizmet Saglayicisi
NetLock Expressz (Class C) Tanusitvanykiado
NetLock Kozjegyzoi (Class A) Tanusitvanykiado
NetLock Minositett Kozjegyzoi (Class QA) Tanusitvanykiado
NetLock Uzleti (Class B) Tanusitvanykiado
SG TRUST SERVICES RACINE
Staat der Nederlanden Root CA
TC TrustCenter Class 2 CA II
TC TrustCenter Universal CA I
TDC Internet Root CA
UTN DATACorp SGC Root CA
Verisign Class 1 Public Primary Certification Authority - G2
Verisign Class 3 Public Primary Certification Authority
Verisign Class 3 Public Primary Certification Authority - G2
- New added CAs:
CA WoSign ECC Root
Certification Authority of WoSign
Certification Authority of WoSign G2
Certinomis - Root CA
Certum Trusted Network CA 2
CFCA EV ROOT
COMODO RSA Certification Authority
DigiCert Assured ID Root G2
DigiCert Assured ID Root G3
DigiCert Global Root G2
DigiCert Global Root G3
DigiCert Trusted Root G4
Entrust Root Certification Authority - EC1
Entrust Root Certification Authority - G2
GlobalSign
GlobalSign
IdenTrust Commercial Root CA 1
IdenTrust Public Sector Root CA 1
OISTE WISeKey Global Root GB CA
QuoVadis Root CA 1 G3
QuoVadis Root CA 2 G3
QuoVadis Root CA 3 G3
Staat der Nederlanden EV Root CA
Staat der Nederlanden Root CA - G3
S-TRUST Universal Root CA
SZAFIR ROOT CA2
TÜRKTRUST Elektronik Sertifika Hizmet Sağlayıcısı H5
TÜRKTRUST Elektronik Sertifika Hizmet Sağlayıcısı H6
USERTrust ECC Certification Authority
USERTrust RSA Certification Authority
沃通根证书
Wed Jan 14 13:00:00 2015 meissnerAATTsuse.com
- diff-from-upstream-2.2.patch:
Temporary reenable some root ca trusts, as openssl/gnutls
have trouble using intermediates as root CA.
- GTE CyberTrust Global Root
- Thawte Server CA
- Thawte Premium Server CA
- ValiCert Class 1 VA
- ValiCert Class 2 VA
- RSA Root Certificate 1
- Entrust.net Secure Server CA
- America Online Root Certification Authority 1
- America Online Root Certification Authority 2
Mon Jan 12 13:00:00 2015 meissnerAATTsuse.com
- Updated to 2.2 (bnc#888534)
- The following CAs were removed:
+ America_Online_Root_Certification_Authority_1
+ America_Online_Root_Certification_Authority_2
+ GTE_CyberTrust_Global_Root
+ Thawte_Premium_Server_CA
+ Thawte_Server_CA
- The following CAs were added:
+ COMODO_RSA_Certification_Authority
codeSigning emailProtection serverAuth
+ GlobalSign_ECC_Root_CA_-_R4
codeSigning emailProtection serverAuth
+ GlobalSign_ECC_Root_CA_-_R5
codeSigning emailProtection serverAuth
+ USERTrust_ECC_Certification_Authority
codeSigning emailProtection serverAuth
+ USERTrust_RSA_Certification_Authority
codeSigning emailProtection serverAuth
+ VeriSign-C3SSA-G2-temporary-intermediate-after-1024bit-removal
- The following CAs were changed:
+ Equifax_Secure_eBusiness_CA_1
remote code signing and https trust, leave email trust
+ Verisign_Class_3_Public_Primary_Certification_Authority_-_G2
only trust emailProtection
Tue Aug 26 14:00:00 2014 meissnerAATTsuse.com
- Updated to 2.1 (bnc#888534)
- The following 1024-bit CA certificates were removed
- Entrust.net Secure Server Certification Authority
- ValiCert Class 1 Policy Validation Authority
- ValiCert Class 2 Policy Validation Authority
- ValiCert Class 3 Policy Validation Authority
- TDC Internet Root CA
- The following CA certificates were added:
- Certification Authority of WoSign
- CA 沃通根证书
- DigiCert Assured ID Root G2
- DigiCert Assured ID Root G3
- DigiCert Global Root G2
- DigiCert Global Root G3
- DigiCert Trusted Root G4
- QuoVadis Root CA 1 G3
- QuoVadis Root CA 2 G3
- QuoVadis Root CA 3 G3
- The Trust Bits were changed for the following CA certificates
- Class 3 Public Primary Certification Authority
- Class 3 Public Primary Certification Authority
- Class 2 Public Primary Certification Authority - G2
- VeriSign Class 2 Public Primary Certification Authority - G3
- AC Raíz Certicámara S.A.
- NetLock Uzleti (Class B) Tanusitvanykiado
- NetLock Expressz (Class C) Tanusitvanykiado
- certdata-temporary-1024.patch: restore some certificates removed
from NSS as these are still used for some major sites.
openssl is not as clever as NSS in selecting the new ones in the
chain correctly.
Wed Jun 18 14:00:00 2014 meissnerAATTsuse.com
- do not provide openssl-certs, just obsolete it.
Tue Jun 10 14:00:00 2014 meissnerAATTsuse.com
- in sle11 we bumped openssl-certs version to match the NSS version,
so provide/obsolete the current version.
Wed Jun 4 14:00:00 2014 lnusselAATTsuse.de
- updated certificates to revision 1.97 (bnc#881241)
new: \"Atos TrustedRoot 2011\" (codeSigning emailProtection serverAuth)
new: \"Tugra Certification Authority\" (codeSigning serverAuth)
removed: \"Firmaprofesional Root CA\"
removed: \"TDC OCES Root CA\"
new: \"TeliaSonera Root CA v1\" (emailProtection serverAuth)
new: \"T-TeleSec GlobalRoot Class 2\" (emailProtection serverAuth)
Fri Feb 21 13:00:00 2014 meissnerAATTsuse.com
- updated certificates to revision 1.96 (bnc#865080)
new: ACCVRAIZ1.pem (Spain) (all trusts)
new: SG_TRUST_SERVICES_RACINE.pem (Singapore) (email signing only)
new: TWCA_Global_Root_CA.pem (Taiwanese) (all trusts)
removed: Wells_Fargo_Root_CA.pem
Mon Dec 9 13:00:00 2013 meissnerAATTsuse.com
- Updated to 1.95
Distrust a sub-ca that issued google.com certificates.
\"Distrusted AC DG Tresor SSL\" (bnc#854367)
Mon Dec 9 13:00:00 2013 lnusselAATTsuse.de
- fix handling of certificates with same name (bnc#854163)
Tue Oct 29 13:00:00 2013 meissnerAATTsuse.com
- Updated to 1.94
* new: CA_Disig_Root_R1:2.9.0.195.3.154.238.80.144.110.40.crt
server auth, code signing, email signing
* new: CA_Disig_Root_R2:2.9.0.146.184.136.219.176.138.193.99.crt
server auth, code signing, email signing
* new: China_Internet_Network_Information_Center_EV_Certificates_Root:2.4.72.159.0.1.crt
server auth
* changed: Digital_Signature_Trust_Co._Global_CA_1:2.4.54.112.21.150.crt
removed code signing and server auth abilities
* changed: Digital_Signature_Trust_Co._Global_CA_3:2.4.54.110.211.206.crt
removed code signing and server auth abilities
* new: D-TRUST_Root_Class_3_CA_2_2009:2.3.9.131.243.crt
server auth
* new: D-TRUST_Root_Class_3_CA_2_EV_2009:2.3.9.131.244.crt
server auth
* removed: Entrust.net_Premium_2048_Secure_Server_CA:2.4.56.99.185.102.crt
* new: Entrust.net_Premium_2048_Secure_Server_CA:2.4.56.99.222.248.crt
I think the missing flags were adjusted.
* removed: Equifax_Secure_eBusiness_CA_2:2.4.55.112.207.181.crt
* new: PSCProcert:2.1.11.crt
server auth, code signing, email signing
* new: Swisscom_Root_CA_2:2.16.30.158.40.232.72.242.229.239.195.124.74.30.90.24.103.182.crt
server auth, code signing, email signing
* new: Swisscom_Root_EV_CA_2:2.17.0.242.250.100.226.116.99.211.141.253.16.29.4.31.118.202.88.crt
server auth, code signing
* changed: TC_TrustCenter_Universal_CA_III:2.14.99.37.0.1.0.2.20.141.51.21.2.228.108.244.crt
removed all abilities
* new: TURKTRUST_Certificate_Services_Provider_Root_2007:2.1.1.crt
server auth, code signing
* changed: TWCA_Root_Certification_Authority:2.1.1.crt
added code signing ability
- removed temporary Entrust.net_Premium_2048_Secure_Server_CA.p11-kit override.
Mon Aug 19 14:00:00 2013 lnusselAATTsuse.de
- update Entrust root attributes to new format used by p11-kit
Wed Jul 24 14:00:00 2013 lnusselAATTsuse.de
- remove superfluous double quotes from certificate names
Wed Jul 24 14:00:00 2013 lnusselAATTsuse.de
- add fake basic contraints to Entrust root so p11-kit export the cert
(bnc#829471)
- add nssckbi.h that matches certdata.txt; make sure package has the
correct version number which is currently 1.93. No actual content
change in certdata.txt compared to 1.85, it\'s just that the
versioning scheme changed.
Thu Jun 27 14:00:00 2013 lnusselAATTsuse.de
- use certdata2pem.py from Fedora to extract all certs
Fri Jun 21 14:00:00 2013 lnusselAATTsuse.de
- use correct \'anchors\' subdirectory
Wed Jun 19 14:00:00 2013 lnusselAATTsuse.de
- new location of CA certificate anchors is
/usr/share/ca-certificates/anchors
Thu Jan 3 13:00:00 2013 idonmezAATTsuse.com
- update certificates to revision 1.87 (bnc#796628)
* new \"EE Certification Centre Root CA\"
* new \"T-TeleSec GlobalRoot Class 3\"
* revoke mis-issued intermediate CAs from TURKTRUST
Wed Oct 10 14:00:00 2012 meissnerAATTsuse.com
- updated certificates to revision 1.85 (bnc#783509)
* new \"Actalis Authentication Root CA\"
* new \"Trustis FPS Root CA\"
* new \"StartCom Certification Authority\"
* new \"StartCom Certification Authority G2\"
* new \"Buypass Class 2 Root CA\"
* new \"Buypass Class 3 Root CA\"
* updated: \"Sonera Class2 CA\": remove code-signing
* updated: \"thawte Primary Root CA\": added code-signing
* updated: \"Trustis_FPS_Root_CA.pem\": added code-signing
* updated: VeriSign Class 3 Public Primary Certification Authority - G5\":
added code-signing, email-protection
Thu May 3 14:00:00 2012 lnusselAATTsuse.de
- update certificates to revision 1.83 (bnc#760503)
* new: EC_ACC.pem
* new: Hellenic_Academic_and_Research_Institutions_RootCA_2011.pem
* new: Security_Communication_RootCA2.pem
* removed: TC_TrustCenter_Germany_Class_2_CA.pem
* removed: TC_TrustCenter_Germany_Class_3_CA.pem
* removed: Verisign_Class_1_Public_Primary_Certification_Authority.1.pem
* removed: Verisign_Class_2_Public_Primary_Certification_Authority.pem
* removed: Verisign_Class_4_Public_Primary_Certification_Authority_G2.pem
- license change to MPL-2.0
Fri Jan 13 13:00:00 2012 cfarrellAATTsuse.com
- license update: MPL-1.1 or GPL-2.0+ or LGPL-2.1+
SPDX format and correct GPL and LGPL tags to include or later
Thu Jan 12 13:00:00 2012 cooloAATTsuse.com
- change license to be in spdx.org format
Sat Sep 17 14:00:00 2011 jengelhAATTmedozas.de
- Remove redundant tags/sections from specfile
Wed Aug 31 14:00:00 2011 lnusselAATTsuse.de
- update certificates to revision 1.76
* new: Go_Daddy_Root_Certificate_Authority_G2.pem
* new: Starfield_Root_Certificate_Authority_G2.pem
* new: Starfield_Services_Root_Certificate_Authority_G2.pem
* new: AffirmTrust_Commercial.pem
* new: AffirmTrust_Networking.pem
* new: AffirmTrust_Premium.pem
* new: AffirmTrust_Premium_ECC.pem
* new: Certum_Trusted_Network_CA.pem
* new: Certinomis_Autorit_Racine.pem
* new: Root_CA_Generalitat_Valenciana.pem
* new: A_Trust_nQual_03.pem
* new: TWCA_Root_Certification_Authority.pem
* removed: DigiNotar_Root_CA.pem (bnc#714931)
Mon Jan 31 13:00:00 2011 lnusselAATTsuse.de
- update certificates to revision 1.70
* new: AddTrust_Qualified_Certificates_Root.pem
* new: Autoridad_de_Certificacion_Firmaprofesional_CIF_A62634068.pem
* new: Chambers_of_Commerce_Root_2008.pem
* new: Global_Chambersign_Root_2008.pem
* new: Izenpe_com.pem
* new: TC_TrustCenter_Universal_CA_III.pem
Mon Sep 27 14:00:00 2010 lnusselAATTsuse.de
- update certificates to revision 1.65
* new: E_Guven_Kok_Elektronik_Sertifika_Hizmet_Saglayicisi.pem
* new: GlobalSign_Root_CA_R3.pem
* new: Microsec_e_Szigno_Root_CA_2009.pem
* new: Verisign_Class_1_Public_Primary_Certification_Authority.1.pem
* new: Verisign_Class_3_Public_Primary_Certification_Authority.1.pem
Fri May 21 14:00:00 2010 lnusselAATTsuse.de
- update certificates to revision 1.64
* removed \"RSA Security 1024 V3\" certificate
Thu Apr 8 14:00:00 2010 lnusselAATTsuse.de
- require ca-certificates also for postun
Thu Apr 1 14:00:00 2010 lnusselAATTsuse.de
- don\'t output trusted certs by default as it\'s not supported by
gnutls yet and pidgin scans /etc/ssl/certs
Thu Apr 1 14:00:00 2010 lnusselAATTsuse.de
- update certificates to revision 1.62
Fri Mar 26 13:00:00 2010 lnusselAATTsuse.de
- extract trustbits as comment as Fedora does
- convert to trusted certificates in spec file instead
Thu Mar 25 13:00:00 2010 lnusselAATTsuse.de
- rename to ca-certificates-mozilla
- output trusted certificates
- use utf8 in file names
Tue Feb 2 13:00:00 2010 lnusselAATTsuse.de
- update certificates to revision 1.57
- add script to compare with previous certificates
Wed Sep 30 14:00:00 2009 lnusselAATTsuse.de
- update certifiates to cvs revision 1.56
- exclude certficates that are not trusted for identifying web sites