Package: testssl.sh
Version: 3.2~rc3+dfsg-1
Severity: wishlist
X-Debbugs-Cc: landry.min...@celeste.fr

Dear Maintainer,


Having some "enterprise" private CA configured with ca-certificates it takes me
some research to understand that by default testssl.sh do not look at system
certificates.

To be able to validate internal chains, I created the following symlink:
/etc/testssl/System.pem ⇒ /etc/ssl/certs/ca-certificates.crt

Testing an internal server, I can now see this output for chain validation:
 Trust (hostname)             Ok via SAN and CN (same w/o SNI)
 Chain of trust               NOT ok: Apple (chain incomplete) Java (chain
incomplete) Linux (chain incomplete) Microsoft (chain incomplete) Mozilla
(chain incomplete)
                              OK: System

Also, the other anchors are managed upstream and can be outdated or out of sync
if updated, especialy on stable so it can be kind to view if a cURL command
will be able to correctly validate the certificate chain or not on this system.

So it should be interresting if a similar link was done directly by the package
(maybe with a debconf question if someone want to keep upstream default).

Regards,


-- System Information:
Debian Release: trixie/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: amd64 (x86_64)

Kernel: Linux 6.5.0-4-amd64 (SMP w/8 CPU threads; PREEMPT)
Locale: LANG=fr_FR.UTF-8, LC_CTYPE=fr_FR.UTF-8 (charmap=UTF-8), LANGUAGE not set
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages testssl.sh depends on:
ii  bind9-dnsutils [dnsutils]  1:9.19.17-1
ii  bsdextrautils              2.39.2-6
ii  openssl                    3.0.12-2
ii  procps                     2:4.0.4-2

Versions of packages testssl.sh recommends:
ii  libengine-gost-openssl  3.0.2-1

testssl.sh suggests no packages.

-- debconf-show failed

Reply via email to