معرفی شرکت ها


ca-certificates-2021.2.50-72.el7_9.noarch.rpm


Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر
Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر
Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر
Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر
Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر

توضیحات

The Mozilla CA root certificate bundle
ویژگی مقدار
سیستم عامل Linux
توزیع CentOS 7
مخزن Centos updates noarch
نام بسته ca-certificates
نام فایل بسته ca-certificates-2021.2.50-72.el7_9.noarch.rpm
نسخه بسته 2021.2.50
انتشار بسته 72.el7_9
معماری بسته noarch
نگهدارنده -
تاریخ ساخت Thu Sep 23 11
هاست سازنده x86-01.bsys.centos.org
نوع بسته .rpm
آدرس صفحه اصلی http://www.mozilla.org/
مجوز Public Domain
حجم دانلود 380K
حجم نصب 900.922K
This package contains the set of CA certificates chosen by the Mozilla Foundation for use with the Internet PKI.


جایگزین ها

بسته نسخه معماری مخزن
ca-certificates-2020.2.41-70.0.el7_8.noarch.rpm 2020.2.41 noarch CentOS os
ca-certificates-2022.2.54-74.el7_9.noarch.rpm 2022.2.54 noarch CentOS updates
ca-certificates-2023.2.60_v7.0.306-72.el7_9.noarch.rpm 2023.2.60_v7.0.306 noarch CentOS updates


نیازمندی

مقدار نام
- /bin/sh
- /bin/sh
- /bin/sh
= 2021.2.50-72.el7_9 config(ca-certificates)
>= 0.23.5 p11-kit
>= 0.23.5 p11-kit-trust


ارائه دهنده

مقدار نام
= 2021.2.50-72.el7_9 ca-certificates
= 2021.2.50-72.el7_9 config(ca-certificates)


نحوه نصب


نصب پکیج rpm ca-certificates:

    sudo yum localinstall ca-certificates-2021.2.50-72.el7_9.noarch.rpm


فایل ها

مسیرها
/etc/pki/ca-trust
/etc/pki/ca-trust/README
/etc/pki/ca-trust/ca-legacy.conf
/etc/pki/ca-trust/extracted
/etc/pki/ca-trust/extracted/README
/etc/pki/ca-trust/extracted/java
/etc/pki/ca-trust/extracted/java/README
/etc/pki/ca-trust/extracted/java/cacerts
/etc/pki/ca-trust/extracted/openssl
/etc/pki/ca-trust/extracted/openssl/README
/etc/pki/ca-trust/extracted/openssl/ca-bundle.trust.crt
/etc/pki/ca-trust/extracted/pem
/etc/pki/ca-trust/extracted/pem/README
/etc/pki/ca-trust/extracted/pem/email-ca-bundle.pem
/etc/pki/ca-trust/extracted/pem/objsign-ca-bundle.pem
/etc/pki/ca-trust/extracted/pem/tls-ca-bundle.pem
/etc/pki/ca-trust/source
/etc/pki/ca-trust/source/README
/etc/pki/ca-trust/source/anchors
/etc/pki/ca-trust/source/blacklist
/etc/pki/ca-trust/source/ca-bundle.legacy.crt
/etc/pki/java
/etc/pki/java/cacerts
/etc/pki/tls
/etc/pki/tls/cert.pem
/etc/pki/tls/certs
/etc/pki/tls/certs/ca-bundle.crt
/etc/pki/tls/certs/ca-bundle.trust.crt
/etc/ssl
/etc/ssl/certs
/usr/bin/ca-legacy
/usr/bin/update-ca-trust
/usr/share/doc/ca-certificates-2021.2.50/README
/usr/share/man/man8/ca-legacy.8.gz
/usr/share/man/man8/update-ca-trust.8.gz
/usr/share/pki
/usr/share/pki/ca-trust-legacy
/usr/share/pki/ca-trust-legacy/ca-bundle.legacy.default.crt
/usr/share/pki/ca-trust-legacy/ca-bundle.legacy.disable.crt
/usr/share/pki/ca-trust-source
/usr/share/pki/ca-trust-source/README
/usr/share/pki/ca-trust-source/anchors
/usr/share/pki/ca-trust-source/blacklist


گزارش تغییرات

تاریخ آخرین تغییر جزئیات
2021-09-14

Fix expired certificate.
Removing:
# Certificate "DST Root CA X3"

2021-06-16

Update to CKBI 2.50 from NSS 3.67
version number update only

2021-06-11

Update to CKBI 2.48 from NSS 3.66
Removing:
# Certificate "Verisign Class 3 Public Primary Certification Authority - G3"
# Certificate "GeoTrust Global CA"
# Certificate "GeoTrust Universal CA"
# Certificate "GeoTrust Universal CA 2"
# Certificate "QuoVadis Root CA"
# Certificate "Sonera Class 2 Root CA"
# Certificate "Taiwan GRCA"
# Certificate "GeoTrust Primary Certification Authority"
# Certificate "thawte Primary Root CA"
# Certificate "VeriSign Class 3 Public Primary Certification Authority - G5"
# Certificate "GeoTrust Primary Certification Authority - G3"
# Certificate "thawte Primary Root CA - G2"
# Certificate "thawte Primary Root CA - G3"
# Certificate "GeoTrust Primary Certification Authority - G2"
# Certificate "VeriSign Universal Root Certification Authority"
# Certificate "VeriSign Class 3 Public Primary Certification Authority - G4"
# Certificate "Trustis FPS Root CA"
# Certificate "EE Certification Centre Root CA"
# Certificate "LuxTrust Global Root 2"
# Certificate "Symantec Class 1 Public Primary Certification Authority - G4"
# Certificate "Symantec Class 2 Public Primary Certification Authority - G4"
Adding:
# Certificate "Microsoft ECC Root Certificate Authority 2017"
# Certificate "Microsoft RSA Root Certificate Authority 2017"
# Certificate "e-Szigno Root CA 2017"
# Certificate "certSIGN Root CA G2"
# Certificate "Trustwave Global Certification Authority"
# Certificate "Trustwave Global ECC P256 Certification Authority"
# Certificate "Trustwave Global ECC P384 Certification Authority"
# Certificate "NAVER Global Root Certification Authority"
# Certificate "AC RAIZ FNMT-RCM SERVIDORES SEGUROS"
# Certificate "GlobalSign Secure Mail Root R45"
# Certificate "GlobalSign Secure Mail Root E45"
# Certificate "GlobalSign Root R46"
# Certificate "GlobalSign Root E46"
# Certificate "GLOBALTRUST 2020"
# Certificate "ANF Secure Server Root CA"
# Certificate "Certum EC-384 CA"
# Certificate "Certum Trusted Root CA"

2020-06-09

Update to CKBI 2.41 from NSS 3.53.0
Removing:
# Certificate "AddTrust Low-Value Services Root"
# Certificate "AddTrust External Root"
# Certificate "UTN USERFirst Email Root CA"
# Certificate "Certplus Class 2 Primary CA"
# Certificate "Deutsche Telekom Root CA 2"
# Certificate "Staat der Nederlanden Root CA - G2"
# Certificate "Swisscom Root CA 2"
# Certificate "Certinomis - Root CA"
Adding:
# Certificate "Entrust Root Certification Authority - G4"
fix permissions on ghosted files.

2019-06-21

Update to CKBI 2.32 from NSS 3.44
Removing:
# Certificate "Visa eCommerce Root"
# Certificate "AC Raiz Certicamara S.A."
# Certificate "TC TrustCenter Class 3 CA II"
# Certificate "ComSign CA"
# Certificate "S-TRUST Universal Root CA"
# Certificate "TÜRKTRUST Elektronik Sertifika Hizmet Sağlayıcısı H5"
# Certificate "Certplus Root CA G1"
# Certificate "Certplus Root CA G2"
# Certificate "OpenTrust Root CA G1"
# Certificate "OpenTrust Root CA G2"
# Certificate "OpenTrust Root CA G3"
Adding:
# Certificate "GlobalSign Root CA - R6"
# Certificate "OISTE WISeKey Global Root GC CA"
# Certificate "GTS Root R1"
# Certificate "GTS Root R2"
# Certificate "GTS Root R3"
# Certificate "GTS Root R4"
# Certificate "UCA Global G2 Root"
# Certificate "UCA Extended Validation Root"
# Certificate "Certigna Root CA"
# Certificate "emSign Root CA - G1"
# Certificate "emSign ECC Root CA - G3"
# Certificate "emSign Root CA - C1"
# Certificate "emSign ECC Root CA - C3"
# Certificate "Hongkong Post Root CA 3"

2018-03-14

Update to CKBI 2.22 from NSS 3.35

2017-11-29

Update to CKBI 2.20 from NSS 3.34.1

2017-10-26

Update to CKBI 2.18 (pre-release snapshot)

2017-09-26

Update to CKBI 2.16 from NSS 3.32. In addition to removals/additions,

2017-04-28

Update to CKBI 2.14 from NSS 3.30.2

2017-03-10

No longer trust legacy CAs

2017-03-10

Changed the packaged bundle to use the flexible p11-kit-object-v1 file format,
kit-trust and
For CAs trusted by Mozilla, set attribute nss-mozilla-ca-policy: true
Require p11-kit 0.23.5
Added an utility to help with comparing output of the trust dump command.

2017-01-17

Update to CKBI 2.11 from NSS 3.28.1 with legacy modifications.
Use comments in extracted bundle files.
Change packaging script to support empty legacy bundles.

2016-05-10

Use sln, not ln, to avoid the dependency on coreutils (rhbz#1328586)

2016-04-25

Fixed a typo in a manual page (rhbz#1303960)

2016-01-27

Update to CKBI 2.6 from NSS 3.21 with legacy modifications.