Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 7 Dec 2023 11:35:52 +0100 (CET)
From:      Ronald Klop <ronald-lists@klop.ws>
To:        freebsd-stable@freebsd.org
Subject:   freebsd-update complains about changed files: /etc/ssl/certs/0179095f.0
Message-ID:  <464886240.91844.1701945352782@localhost>
References:  <65710262.29a57.67c10f38@rpi4>

next in thread | previous in thread | raw e-mail | index | archive | help
------=_Part_91843_619229736.1701945352671
Content-Type: text/plain; charset=us-ascii; format=flowed
Content-Transfer-Encoding: 7bit

Hi,

I have the problem from the forwarded mail below at several installs when I use freebsd-update.
The interesting part is that /etc/ssl/certs/ contains files.

Plain certctl rehash does not solve it.
But "rm /etc/ssl/certs/*; certctl rehash" ends up with all files in /etc/ssl/certs becoming symlinks and the problem is gone.
/etc/ssl/certs/002c0b4f.0 -> ../../../usr/share/certs/trusted/GlobalSign_Root_R46.pem

Maybe I installed my jails in a wrong way so I got files instead of symlinks in /etc/ssl/certs.

Anyway.
What is supposed to be in /etc/ssl/certs? Files or symlinks?

If somebody has a thought about this I'm interested.
Otherwise it is just a data point in the mailinglist for somebody else with this problem to find a solution.

NB: I also found older mention of this on the FreeBSD forums.
https://forums.freebsd.org/threads/getting-the-latest-files-that-were-not-downloaded-during-upgrade.78973/

Regards,
Ronald.

 
Van: zzzzz@xxxxx.yy
Datum: donderdag, 7 december 2023 00:23
Aan: root
Onderwerp: rpi4 security updates
> 
> Looking up update.FreeBSD.org mirrors... 3 mirrors found.
> Fetching metadata signature for 13.2-RELEASE from update2.freebsd.org... done.
> Fetching metadata index... done.
> Inspecting system... done.
> Preparing to download files... done.
> The following files are affected by updates. No changes have
> been downloaded, however, because the files have been modified
> locally:
> /etc/ssl/certs/0179095f.0
> /etc/ssl/certs/08063a00.0
> /etc/ssl/certs/0b9bc432.0
> /etc/ssl/certs/3e359ba6.0
> /etc/ssl/certs/5860aaa6.0
> /etc/ssl/certs/5931b5bc.0
> /etc/ssl/certs/5a7722fb.0
> /etc/ssl/certs/66445960.0
> /etc/ssl/certs/7a3adc42.0
> /etc/ssl/certs/7a780d93.0
> /etc/ssl/certs/8508e720.0
> /etc/ssl/certs/8f103249.0
> /etc/ssl/certs/90c5a3c8.0
> /etc/ssl/certs/9846683b.0
> /etc/ssl/certs/9ef4a08a.0
> /etc/ssl/certs/9f727ac7.0
> /etc/ssl/certs/d52c538d.0
> /etc/ssl/certs/ecccd8db.0
> /etc/ssl/certs/ed858448.0
> /etc/ssl/certs/fd64f3fc.0
> The following files will be updated as part of updating to
> 13.2-RELEASE-p7:
> /usr/share/certs/trusted/BJCA_Global_Root_CA1.pem
> /usr/share/certs/trusted/BJCA_Global_Root_CA2.pem
> /usr/share/certs/trusted/Certainly_Root_E1.pem
> /usr/share/certs/trusted/Certainly_Root_R1.pem
> /usr/share/certs/trusted/D-TRUST_BR_Root_CA_1_2020.pem
> /usr/share/certs/trusted/D-TRUST_EV_Root_CA_1_2020.pem
> /usr/share/certs/trusted/DigiCert_TLS_ECC_P384_Root_G5.pem
> /usr/share/certs/trusted/DigiCert_TLS_RSA4096_Root_G5.pem
> /usr/share/certs/trusted/E-Tugra_Global_Root_CA_ECC_v3.pem
> /usr/share/certs/trusted/E-Tugra_Global_Root_CA_RSA_v3.pem
> /usr/share/certs/trusted/HARICA_TLS_ECC_Root_CA_2021.pem
> /usr/share/certs/trusted/HARICA_TLS_RSA_Root_CA_2021.pem
> /usr/share/certs/trusted/HiPKI_Root_CA_-_G1.pem
> /usr/share/certs/trusted/ISRG_Root_X2.pem
> /usr/share/certs/trusted/Security_Communication_ECC_RootCA1.pem
> /usr/share/certs/trusted/Security_Communication_RootCA3.pem
> /usr/share/certs/trusted/Telia_Root_CA_v2.pem
> /usr/share/certs/trusted/TunTrust_Root_CA.pem
> /usr/share/certs/trusted/vTrus_ECC_Root_CA.pem
> /usr/share/certs/trusted/vTrus_Root_CA.pem
> 
> 
> 

 
------=_Part_91843_619229736.1701945352671
Content-Type: text/html; charset=us-ascii
Content-Transfer-Encoding: 7bit

<html><head></head><body>Hi,<br>
<br>
I have the problem from the forwarded mail below at several installs when I use freebsd-update.<br>
The interesting part is that /etc/ssl/certs/ contains files.<br>
<br>
Plain certctl rehash does not solve it.<br>
But "rm /etc/ssl/certs/*; certctl rehash" ends up with all files in /etc/ssl/certs becoming symlinks and the problem is gone.<br>
/etc/ssl/certs/002c0b4f.0 -&gt; ../../../usr/share/certs/trusted/GlobalSign_Root_R46.pem<br>
<br>
Maybe I installed my jails in a wrong way so I got files instead of symlinks in /etc/ssl/certs.<br>
<br>
Anyway.<br>
What is supposed to be in /etc/ssl/certs? Files or symlinks?<br>
<br>
If somebody has a thought about this I'm interested.<br>
Otherwise it is just a data point in the mailinglist for somebody else with this problem to find a solution.<br>
<br>
NB: I also found older mention of this on the FreeBSD forums.<br>
https://forums.freebsd.org/threads/getting-the-latest-files-that-were-not-downloaded-during-upgrade.78973/<br>;
<br>
Regards,<br>
Ronald.<br>
<br>
&nbsp;
<p><strong>Van:</strong> zzzzz@xxxxx.yy<br>
<strong>Datum:</strong> donderdag, 7 december 2023 00:23<br>
<strong>Aan:</strong> root<br>
<strong>Onderwerp:</strong> rpi4 security updates</p>

<blockquote style="padding-right: 0px; padding-left: 5px; margin-left: 5px; border-left: #000000 2px solid; margin-right: 0px">
<div class="MessageRFC822Viewer" id="P">
<div class="TextPlainViewer" id="P.P">Looking up update.FreeBSD.org mirrors... 3 mirrors found.<br>
Fetching metadata signature for 13.2-RELEASE from update2.freebsd.org... done.<br>
Fetching metadata index... done.<br>
Inspecting system... done.<br>
Preparing to download files... done.<br>
The following files are affected by updates. No changes have<br>
been downloaded, however, because the files have been modified<br>
locally:<br>
/etc/ssl/certs/0179095f.0<br>
/etc/ssl/certs/08063a00.0<br>
/etc/ssl/certs/0b9bc432.0<br>
/etc/ssl/certs/3e359ba6.0<br>
/etc/ssl/certs/5860aaa6.0<br>
/etc/ssl/certs/5931b5bc.0<br>
/etc/ssl/certs/5a7722fb.0<br>
/etc/ssl/certs/66445960.0<br>
/etc/ssl/certs/7a3adc42.0<br>
/etc/ssl/certs/7a780d93.0<br>
/etc/ssl/certs/8508e720.0<br>
/etc/ssl/certs/8f103249.0<br>
/etc/ssl/certs/90c5a3c8.0<br>
/etc/ssl/certs/9846683b.0<br>
/etc/ssl/certs/9ef4a08a.0<br>
/etc/ssl/certs/9f727ac7.0<br>
/etc/ssl/certs/d52c538d.0<br>
/etc/ssl/certs/ecccd8db.0<br>
/etc/ssl/certs/ed858448.0<br>
/etc/ssl/certs/fd64f3fc.0<br>
The following files will be updated as part of updating to<br>
13.2-RELEASE-p7:<br>
/usr/share/certs/trusted/BJCA_Global_Root_CA1.pem<br>
/usr/share/certs/trusted/BJCA_Global_Root_CA2.pem<br>
/usr/share/certs/trusted/Certainly_Root_E1.pem<br>
/usr/share/certs/trusted/Certainly_Root_R1.pem<br>
/usr/share/certs/trusted/D-TRUST_BR_Root_CA_1_2020.pem<br>
/usr/share/certs/trusted/D-TRUST_EV_Root_CA_1_2020.pem<br>
/usr/share/certs/trusted/DigiCert_TLS_ECC_P384_Root_G5.pem<br>
/usr/share/certs/trusted/DigiCert_TLS_RSA4096_Root_G5.pem<br>
/usr/share/certs/trusted/E-Tugra_Global_Root_CA_ECC_v3.pem<br>
/usr/share/certs/trusted/E-Tugra_Global_Root_CA_RSA_v3.pem<br>
/usr/share/certs/trusted/HARICA_TLS_ECC_Root_CA_2021.pem<br>
/usr/share/certs/trusted/HARICA_TLS_RSA_Root_CA_2021.pem<br>
/usr/share/certs/trusted/HiPKI_Root_CA_-_G1.pem<br>
/usr/share/certs/trusted/ISRG_Root_X2.pem<br>
/usr/share/certs/trusted/Security_Communication_ECC_RootCA1.pem<br>
/usr/share/certs/trusted/Security_Communication_RootCA3.pem<br>
/usr/share/certs/trusted/Telia_Root_CA_v2.pem<br>
/usr/share/certs/trusted/TunTrust_Root_CA.pem<br>
/usr/share/certs/trusted/vTrus_ECC_Root_CA.pem<br>
/usr/share/certs/trusted/vTrus_Root_CA.pem</div>

<hr></div>
</blockquote>
<br>
&nbsp;</body></html>
------=_Part_91843_619229736.1701945352671--



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?464886240.91844.1701945352782>