Machines administered by DSA have a custom setup for SSL verification that was announced in 2015.

By default, DSA-administered machines do not trust any CA certs and only contain SSL certs for debian.org services.

Some software is unable to verify debian.org service certs without the CA cert being present and trusted. For such software, DSA has provided /etc/ssl/ca-debian as a workaround. Please file bugs on any software that needs the workaround, using these usertags:

User: debian-admin@lists.debian.org
Usertags: needed-by-DSA-Team ssl

Some services need to verify the SSL certs of arbitrary services on the Internet that could change their SSL provider at any point in time. For such software, DSA has provided /etc/ssl/ca-global, which contains all the certs trusted by ca-certificates.

/etc/ssl/certs

wget in wheezy (but not jessie and later) is known to work with the debian.org service certs present in /etc/ssl/certs on debian.org machines.

/etc/ssl/ca-debian

The following software is unable to verify service certs without the CA cert being present and trusted. Known workarounds for these issues are available below, please add any more that are needed. If your service needs to add one of these workarounds, please mention it in the users section below.

apt

apt from Debian jessie requires the bundle rather than the directory:

Acquire::https::buildd.debian.org::CaInfo "/etc/ssl/ca-debian/ca-certificates.crt";

apt from Debian wheezy should be able to use the service cert directly:

Acquire::https::buildd.debian.org::CaInfo "/etc/ssl/servicecerts/buildd.debian.org.crt";

curl

dir=/etc/ssl/ca-debian
test -d $dir && capath="--capath $dir"
curl $capath

or

dir=/etc/ssl/ca-debian
test -d $dir && export CURL_CA_BUNDLE="$dir"
curl 

wget

dir=/etc/ssl/ca-debian
test -d $dir && capath="--ca-directory $dir"
wget $capath

git

git from Debian jessie requires the bundle rather than the dir:

dir=/etc/ssl/ca-debian
test -d $dir && git config --local --add http.sslCAInfo $dir/ca-certificates.crt

git from Debian wheezy should be able to use the service cert directly.

LWP

my $ca_dir = '/etc/ssl/ca-debian';
$ENV{HTTPS_CA_DIR} = $ca_dir if -d $ca_dir;

python-requests

bundle='/etc/ssl/ca-debian/ca-certificates.crt'
if os.path.exists(bundle):
  requests.get('https://www.debian.org/', verify=bundle)
else:
  requests.get('https://www.debian.org/')

Or in the shell wrapper for the Python script:

dir=/etc/ssl/ca-debian
test -d $dir && REQUESTS_CA_BUNDLE=$dir/ca-certificates.crt

python-urllib

urllib in jessie and later verifies SSL certificates.

ca_path = '/etc/ssl/ca-debian'
if os.path.isdir(ca_path):
  context = ssl.create_default_context(capath=ca_path)
  data_file = urllib.urlopen("https://www.debian.org/", context=context)
else:
  data_file = urllib.urlopen("https://www.debian.org/")
data = data_file.read()

rt-mailgate

rt-mailgate requires the bundle rather than the dir:

dir=/etc/ssl/ca-debian
test -d $dir && cafile="--ca-file $dir/ca-certificates.crt "
/usr/bin/rt-mailgate ... $cafile

python-ldap / libldap

Using service certificates no longer works in jessie. The workaround is to use the CA certificate bundle:

ca_cert_file = "/etc/ssl/ca-debian/ca-certificates.crt"
ldap.set_option(ldap.OPT_X_TLS_CACERTFILE, ca_cert_file) (global)
or
connection.set_option(ldap.OPT_X_TLS_CACERTFILE, ca_cert_file) (per connection)

users

/etc/ssl/ca-global

If your service needs this directory, you can adapt the ca-debian workarounds for this purpose and please mention your service in the users section below.

users