mirror of
https://github.com/Start9Labs/documentation.git
synced 2026-03-30 20:14:50 +00:00
* Revert Mint/PopOS instructions * Revert Mint/PopOS instructions * Tweak a couple android focused guides * Tweak to Android note
86 lines
3.6 KiB
ReStructuredText
86 lines
3.6 KiB
ReStructuredText
.. _lan-linux:
|
|
|
|
.. _lan-linux-system:
|
|
|
|
============================
|
|
Trusting Embassy CA on Linux
|
|
============================
|
|
|
|
Here we will insert your Embassy's CA certificate into Linux's trust store to ensure that applications will trust your Embassy's services.
|
|
|
|
.. tabs::
|
|
|
|
.. group-tab:: Debian/Ubuntu
|
|
|
|
These instructions should work for Debian, Ubuntu, or any Debian or Ubuntu-based Linux, such as Linux Mint, PopOS, etc.
|
|
|
|
Perform the following commands in the Terminal:
|
|
|
|
.. code-block:: bash
|
|
|
|
sudo apt install -y ca-certificates p11-kit
|
|
|
|
.. note:: For each Mozilla-based application you plan on using, in order for them to trust your Embassy's CA certificate directly from your Linux distribution's certificate trust store, execute the following command(s):
|
|
|
|
|
|
If you use Firefox:
|
|
|
|
.. code-block:: bash
|
|
|
|
libnssckbiso=/usr/lib/firefox/libnssckbi.so && sudo mv $libnssckbiso $libnssckbiso.bak && sudo ln -s /usr/lib/x86_64-linux-gnu/pkcs11/p11-kit-trust.so $libnssckbiso
|
|
|
|
If you use Firefox ESR:
|
|
|
|
.. code-block:: bash
|
|
|
|
libnssckbiso=/usr/lib/firefox-esr/libnssckbi.so && sudo mv $libnssckbiso $libnssckbiso.bak && sudo ln -s /usr/lib/x86_64-linux-gnu/pkcs11/p11-kit-trust.so $libnssckbiso
|
|
|
|
If you use Librewolf:
|
|
|
|
.. code-block:: bash
|
|
|
|
libnssckbiso=/usr/share/librewolf/libnssckbi.so && sudo mv $libnssckbiso $libnssckbiso.bak && sudo ln -s /usr/lib/x86_64-linux-gnu/pkcs11/p11-kit-trust.so $libnssckbiso
|
|
|
|
If you use Thunderbird (Useful for LAN access to NextCloud's calendar/contacts):
|
|
|
|
.. code-block:: bash
|
|
|
|
libnssckbiso=/usr/lib/thunderbird/libnssckbi.so && sudo mv $libnssckbiso $libnssckbiso.bak && sudo ln -s /usr/lib/x86_64-linux-gnu/pkcs11/p11-kit-trust.so $libnssckbiso
|
|
|
|
If you performed any of the commands above, now we need to move the the mozilla apps' old trust store out of the way so the next time it starts it will use the system trust store:
|
|
|
|
.. code-block:: bash
|
|
|
|
mv ~/.pki ~/.pki.mozilla-old
|
|
|
|
Finally, we will change directory to the folder where you downloaded your Embassy's Root CA (usually `~/Downloads`), and run the following commands to add your Embassy's CA certificate to the OS trust store:
|
|
|
|
.. code-block:: bash
|
|
|
|
cd ~/Downloads
|
|
sudo cp "Embassy Local CA.crt" /usr/local/share/ca-certificates/
|
|
sudo update-ca-certificates
|
|
|
|
In the output it should say ``1 added`` if it was successful.
|
|
|
|
.. group-tab:: Arch/Garuda
|
|
|
|
From the folder you have downloaded your Embassy's Root CA, run the following commands (if you have changed the certificate's filename, be sure to change it here):
|
|
|
|
.. code-block:: bash
|
|
|
|
sudo pacman -S ca-certificates
|
|
sudo cp "Embassy Local CA.crt" /etc/ca-certificates/trust-source/anchors/
|
|
sudo update-ca-trust
|
|
|
|
Despite no output from the last command, you can test your app right away.
|
|
|
|
.. group-tab:: CentOS/Fedora
|
|
|
|
From the folder you have downloaded your Embassy's Root CA, run the following commands (if you have changed the certificate's filename, be sure to change it here):
|
|
|
|
.. code-block:: bash
|
|
|
|
sudo yum install ca-certificates
|
|
sudo cp "Embassy Local CA.crt" /etc/pki/ca-trust/source/anchors/
|
|
sudo update-ca-trust |