The python-certifi maintainers seem to have requested and received a CVE for removing #TrustCor roots from their ca-bundle.
Noticed our package does not rely on our system-wide CA bundle and as such does not respect reconfiguration done through `security.pki`, which is probably not what users would expect.
That will be resolved through https://github.com/NixOS/nixpkgs/pull/205127, and we'll also add support for NIX_SSL_CERT_FILE, which will likely work throughout most python packages now.
#nixos CVE-2022-23491
We update the system ca-bundle more reliably, and it allows ties in with module based configuration applied through security.pki. Fixes: CVE-2022-23491 Description of changes Things done Built o...
We are removing the three #TrustCor root certificates from our ca-bundle in #nixpkgs.
This change will need to go through staging for every release, so probably 10-14 days until it will reach endusers.
Mozilla set "Distrust After" for the three TrustCor Root CAs¹, so new certificates issued would not be trusted after 2022/11/30, while older enduser certificates would continue working until they e...
#Mozilla and #Microsoft distrust #TrustCor certificates due to suspicions over covert spyware operation
I went ahead and de-registered the TrustCor certificates on all my personal machines. If you're running a Debian system you can do this by running, as root:
dpkg-reconfigure ca-certificates
You'll then be given an option to deselect certain certificates as "trusted".
#privacy #security #cybersecurity @hen @techlore @sr @thenewoil
Mozilla, Microsoft, and likely other browser makers have started to take action against TrustCor, a Certificate Authority (CA) issuing root certificates for billions of internet-connected devices. According...