Files
documentation/site/source/user-manual/connecting/connecting-lan/lan-os/lan-linux.rst
gStart9 d2cf88f346 Docs updates lan-linux, lan-ff, lan-nextcloud (#277)
* Modify Linux LAN connection guide to support FF enterprise roots

* Touchup to lan linux instructions

* Touchup2 to lan linux instructions

* Touchup3 to lan linux instructions

* Touchup to linux lan instructions

* Touchup \#3ish to linux lan instructions

* Modifications to LAN Firefox and LAN Android instructions

* Add note about NextCloud on macOS, Android instructions

* Various touchups / visual cleanliness cleanups / etc

* ufw firewall allow Samba rules to punch holes in any local ufw/iptables firewall present

* Update lan-ff.rst

* Update lan-android.rst

* Update torff-android.rst

Co-authored-by: kn0wmad <39687477+kn0wmad@users.noreply.github.com>
2023-01-26 08:11:36 +00:00

85 lines
3.5 KiB
ReStructuredText

.. _lan-linux:
.. _lan-linux-system:
============================
Trusting Embassy CA on Linux
============================
Here we will insert your Embassy's CA certificate into Linux's trust store to ensure that applications will trust your Embassy's services.
.. tabs::
.. group-tab:: Debian/Ubuntu
These instructions should work for Debian, Ubuntu, or any Debian or Ubuntu-based Linux, such as Linux Mint, PopOS, etc.
Perform the following commands in the Terminal:
.. code-block:: bash
sudo apt install -y ca-certificates p11-kit
.. note:: For each Mozilla-based application you plan on using, in order for them to trust your Embassy's CA certificate directly from your Linux distribution's certificate trust store, execute the following command(s):
If you use Firefox:
.. code-block:: bash
libnssckbiso=/usr/lib/firefox/libnssckbi.so && sudo mv $libnssckbiso $libnssckbiso.bak && sudo ln -s /usr/lib/x86_64-linux-gnu/pkcs11/p11-kit-trust.so $libnssckbiso
If you use Firefox ESR:
.. code-block:: bash
libnssckbiso=/usr/lib/firefox-esr/libnssckbi.so && sudo mv $libnssckbiso $libnssckbiso.bak && sudo ln -s /usr/lib/x86_64-linux-gnu/pkcs11/p11-kit-trust.so $libnssckbiso
If you use Librewolf:
.. code-block:: bash
libnssckbiso=/usr/share/librewolf/libnssckbi.so && sudo mv $libnssckbiso $libnssckbiso.bak && sudo ln -s /usr/lib/x86_64-linux-gnu/pkcs11/p11-kit-trust.so $libnssckbiso
If you use Thunderbird (Useful for LAN access to NextCloud's calendar/contacts):
.. code-block:: bash
libnssckbiso=/usr/lib/thunderbird/libnssckbi.so && sudo mv $libnssckbiso $libnssckbiso.bak && sudo ln -s /usr/lib/x86_64-linux-gnu/pkcs11/p11-kit-trust.so $libnssckbiso
If you performed any of the commands above, now we need to move the the mozilla apps' old trust store out of the way so the next time it starts it will use the system trust store:
.. code-block:: bash
mv ~/.pki ~/.pki.mozilla-old
Finally, from the folder where you downloaded your Embassy's Root CA, run the following commands to add your Embassy's CA certificate to the OS trust store:
.. code-block:: bash
sudo cp "Embassy Local CA.crt" /usr/local/share/ca-certificates/
sudo update-ca-certificates
In the output it should say ``1 added`` if it was successful.
.. group-tab:: Arch/Garuda
From the folder you have downloaded your Embassy's Root CA, run the following commands (if you have changed the certificate's filename, be sure to change it here):
.. code-block:: bash
sudo pacman -S ca-certificates
sudo cp "Embassy Local CA.crt" /etc/ca-certificates/trust-source/anchors/
sudo update-ca-trust
Despite no output from the last command, you can test your app right away.
.. group-tab:: CentOS/Fedora
From the folder you have downloaded your Embassy's Root CA, run the following commands (if you have changed the certificate's filename, be sure to change it here):
.. code-block:: bash
sudo yum install ca-certificates
sudo cp "Embassy Local CA.crt" /etc/pki/ca-trust/source/anchors/
sudo update-ca-trust