Re: [Fed-Talk] Apple's Rogue DigiNotar CA mitigation?
Re: [Fed-Talk] Apple's Rogue DigiNotar CA mitigation?
- Subject: Re: [Fed-Talk] Apple's Rogue DigiNotar CA mitigation?
- From: Paul Suh <email@hidden>
- Date: Fri, 02 Sep 2011 17:55:21 -0400
Folks,
I've updated the tools mpkg on my web page so that it will:
1) Delete the "DigiNotar Root CA" and "DigiNotar Root CA G2" certificates.
2) Import the "DigiNotar Services 1024 CA" and "DigiNotar Root CA" intermediate certificates signed by Entrust and mark them as not trusted.
3) Import the "DigiNotar PKIoverheid CA Overheid en Bedrijven" and "DigiNotar PKIoverheid CA Organisatie G2" signed by the Dutch national government CA and mark them as not trusted.
This is ready for deployment on Snow Leopard systems. It will work but does not apply all trust settings on Lion. I will be working on updating the text on the page to give more details.
Spread the word.
--Paul
Paul Suh
email@hidden
(240) 672-4212
http://ps-enable.com/
Attachment:
smime.p7s
Description: S/MIME cryptographic signature
_______________________________________________
Do not post admin requests to the list. They will be ignored.
Fed-talk mailing list (email@hidden)
Help/Unsubscribe/Update your Subscription:
This email sent to email@hidden