pe, 2005-09-30 kello 12:47 +0200, Fabio Tranchitella kirjoitti:
> Il giorno gio, 29/09/2005 alle 23.25 +0300, Lars Wirzenius ha scritto:
> > Yeah, it's a difficult situation, I guess. In my opinion, if the
> > certificates are important, the sysadmin shouldn't purge the package
> > (just remove it), and, anyway, they should back up the certificates
> > somewhere safe.
> 
> I disagree, and I think the best way to deal with this type of problems
> is to leave the files on the filesystem. All in all, this is the same
> approach used for the users created by maintainers script, isn't it?

I think we're both right: I'm right in that if I install dovecot-common
and then immediately remove it, I should not have certificate files
lying around afterwards. You're right in that if the sysadmin modified
the certificates (for whatever reason), purging the package should not
remove them. Further, I think this problem appears in many (all?)
packages that create SSL/TLS certificates upon installation.

It would thus make sense to me to creates some helper commands to take
care of this properly. Something like:

        openssl-autocreate-certificate $PACKAGENAME
        openssl-autoremove-certificate $PACKAGENAME

plus other options, if necessary. Gnutls may want its own versions, I
don't know.

The first command would create a self-signed certificate with sensible
parameters and place it in the correct locations, named after the
package. It also stores the MD5 checksum (or full copy) of the key
in /var/lib/something. If such a certificate already exists, the command
obviously does nothing.

The second command would check that the certificate to be removed
matches the checksum (or full key) in /var/lib/something, and if so,
removes it, and if not, does nothing.

Does this sound sensible to you?



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to