EGI IGTF Release
To ensure interoperability within and outside of EGI, the Policy on Approved Certification Authorities defined a common set of trust anchors ("Certification Authorities" or "CAs") that all sites in EGI should install. In short, all CAs accredited to the Interoperable Global Trust Federation under the classic, MICS or SLCS Authentication Profiles are approved for use in EGI. Of course, sites may add additional CAs as long as the integrity of the infrastructure as a whole is not compromised. Also, if there are site or national policies/regulations that prevent you from installing a CA, these regulations take precedence -- but you then must inform the EGI Security Officer (see EGI CSIRT:Main Page) about this exception.
Version 1.85 - change log and information
The change log contains important notices about the release, as well as a list of changes to the trust fabric.
- Review the release notes at http://repository.egi.eu/sw/production/cas/1/current/README.txt
- 1.85 was released on 2017-07-31 as a regular update
- 1.85 combined-assurance support is available as a preview
To install the EGI trust anchors on a system that uses the RedHat Package Manager (RPM) based package management system, we provide a convenience package to manage the installation. To install the currently valid distribution, all RPM packages are provided at
The current version is based on the IGTF release with the same version number. Install the meta-package ca-policy-egi-core and its dependencies to implement the core EGI policy on trusted CAs.
Using YUM package management
Add the following repo-file to the /etc/yum.repos.d/ directory:
[EGI-trustanchors] name=EGI-trustanchors baseurl=http://repository.egi.eu/sw/production/cas/1/current/ gpgkey=http://repository.egi.eu/sw/production/cas/1/GPG-KEY-EUGridPMA-RPM-3 gpgcheck=1 enabled=1
and then update your installation. How to update depends on your previous activity:
- if you have previously ever installed the lcg-CA package, remove any references to http://linuxsoft.cern.ch/LCG-CAs/current from your YUM setup, and run
yum clean cache metadata yum update lcg-CA
- and you are done. This will update the packages installed to the latest version, and also install the new ca-policy-egi-core package as well as a ca-policy-lcg package. All packages encode the same set of dependencies
- if you are upgrading from a previous EGI version only, just run
yum update ca-policy-egi-core
- although at times you may need to clean the yum cache using yum clean cache metadata
- if you are installing the EGI trust anchors for the first time, run
yum install ca-policy-egi-core
Using the distribution on a Debian or Debian-derived platform
The 1.39+ releases experimentally add the option to install the trust anchors from Debian packages using the APT dependency management system. Although care has been taken to ensure that this distribution is installable and complete, no guarantees are given, but you are invited to report your issues through GGUS. You may have to wait for a subsequent release of the Trust Anchor release to solve your issue, or may be asked to use a temporary repository. To use it:
- Install the EUGridPMA PGP key for apt:
wget -q -O - \ https://dist.eugridpma.info/distribution/igtf/current/GPG-KEY-EUGridPMA-RPM-3 \ | apt-key add -
- Add the following line to your sources.list file for APT:
#### EGI Trust Anchor Distribution #### deb http://repository.egi.eu/sw/production/cas/1/current egi-igtf core
- Populate the cache and install the meta-package
apt-get update apt-get install ca-policy-egi-core
Using the distribution on other (non-RPM) platforms
The trust anchors are provided also as simple 'tar-balls' for installation on other platforms. Since there is no dependency management in this case, please review the release notes carefully for any security issues or withdrawn CAs. The tar files can be found in the EGI repository at
Once you have downloaded the directory, you can unpack all the CA tar,gz as follows to your certificate directory:
for tgz in `ls <ca download dir>`; do tar xzf <ca download dir>/$tgz --strip-components=1 -C /etc/grid-security/certificates; done
Installing the distribution using Quattor
Quattor templates are povided as drop-in replacements for both QWG and CDB installations. Update your software repository (re-generating the repository templates as needed) and obtain the new CA templates from:
- http://repository.egi.eu/sw/production/cas/1/current/meta/ca-policy-egi-core.tpl for QWG
- http://repository.egi.eu/sw/production/cas/1/current/meta/pro_software_meta_ca_policy_egi_core.tpl for CDB
Make sure to mirror (or refer to) the new repository at http://repository.egi.eu/sw/production/cas/1/current/ and create the appropriate repository definition file.
For wLCG sites that are migrating from the lcg-CA package: the wLCG policy companion of the EGI templates can be found at http://cern.ch/lcg-ca/distribution/current/meta/ca-policy-lcg.tpl (QWG) and http://cern.ch/lcg-ca/distribution/current/meta/pro_software_meta_ca_policy_lcg.tpl (CDB) and can be included in the profile in parallel with the EGI core template. All packages needed are also included in the EGI repository, so only a single repository reference is necessary.
New distribution format (OpenSSL1 dual-hash mode)
The EGI release uses a new format in which to distribute the trust anchors. In OpenSSL version 1.0, as released for example in RedHat Enterprise Linux 6, Fedora Core 12+, or Debian5, the characteristic hash format ("HHHHHHHH.0") has changed. Although it superficially looks the same, each CAs gets a different hash in OpenSSL1 as compared to OpenSSL 0.x, or as compared to BouncyCastle or gLite TrustManager. Please review the EUGridPMA news letter of February 15 for full technical details.
To accommodate this changed hash format, the new distribution uses symbolic links for both hashes, that jointly refer to the same physical file with the CA certificate, called alias.pem. This ensures that the new trust anchor distribution works with both format simultaneously. You can install this distribution on all platforms (both OpenSSL1 as well as OpenSSL0.x) and both are supposed to work.
However, old version of fetch-crl (the 2.x) series will retrieve CRLs for one version of OpenSSL only, namely the version which is used by fetch-crl itself when it is run. To get CRLs downloaded for both versions of OpenSSL
- run fetch-crl 2.x twice, using a different version of OpenSSL each time. Use the FETCH_CRL_OPENSSL environment variable to specify an explicit OpenSSL version for use by fetch-crl. This is only needed if you actually use both versions of OpenSSL at the same time.
- upgrade to fetch-crl 3, which has proper dual-hash support as well as many other features. Please refer to http://www.nikhef.nl/grid/fetchcrl3/ for more information on fetch-crl3, or download it from dist.eugridpma.info. Fetch-crl 3 can also be obtained from your standard OS distribution repository (EPEL, Fedora, Debian).
Trust Anchor structure for differentiated (collaborative) assurance
EGI is moving towards support for 'differentiated' or collaborative assurance, where different elements of trust are provided by several collaborating parties: the identity providers, user home organisations, and research communities. This means that trust anchors with varying trust assurance profiles will be distributed for use in distinct EGI usage scenarios. Starting mid-2017 (release 1.82 or above) initially two profiles will be supported. For a discussion on the impact, see EGI document 2745.
Notice for sites in EGI that support WLCG
The WLCG collaboration - having so requested EGI and in line with long-term EGI developments in AAI - has included a specific CA to its own trust anchor distribution. Sites that are also part of WLCG should install BOTH the "egi-core" AND "lcg" meta-packages, according to your policies. Note that your organisation or NGI may also have a specific policy and may have added or removed CAs compared to the EGI core policy. Sites that need compliance with the WLCG policy should install BOTH packages, or you will miss out the CERN WLCG IOTA CA specific exception see EGI document https://documents.egi.eu/document/2745 for details and the WLCG statement http://lcg-ca.web.cern.ch/lcg-ca/doc/WLCG-CERN-IOTA-statement-MB.pdf for the WLCG specific decision.
The EGI production repository contains all relevant packages for both policies (and the WLCG repository contains also all EGI packages). There is no reason to reconfigure repository locations. Specifically installing (adding) also the ca-policy-lcg package may be necessary for system configurations built after May 2009.
Combined Assurance/Adequacy Model
In the first quarter of 2017, full support for differentiated assurance profiles (combined assurance/adequacy model, also called "cam") will be introduced in the EGI trust fabric infrastructure. This will take the form of an additional trust anchor meta-package, and replaces the specific policy mechanism described above. Such full support also required new software and configuration at each resource centre. You must deploy the additional trust anchor meta-packages and the new local policies in unison, and never install the cam package without such software support.
To enmable the combined assurance/adequacy model policy, use:
yum install ca-policy-egi-cam
or the equivalent for your distribution or operating system. A tar-ball installation is also available.
Implementation notes for trust anchor releases post 1.83
The following does not apply to current production releases - it is exclusive to the technology preview
Not installing the new package does not have any detrimental effect on current users - only a new class of users (that can only obtain an opaque identifiers and do not do full vetting at their electronic identity provider) could be affected, and then only those users that are member of one of the communities that has part of the combined-assurance programme: LCG-Atlas, LCG-Alice, LCG-LHCb, and LCG-CMS.
Also technically this means that you must only install the new ca-policy-egi-cam packages if you also at the same time implement VO-specific authorization controls in your software stack. This may require reconfiguration or a software update:
- for dCache
- full support is expected in release v3.1. Meanwhile, if you support enumerated communities for at the DOGWOOD assurance level, you can upgrade to at least release 2.16 and configure negative controls to limit the set of acceptable VOs for those prinicpals whose credential policy OID equals 1.2.840.113618.104.22.168.6. See dCache.org for details or ask your software provider. In future releases, differentiated access to storage based on the assurance level can be added - for now decisions are best implemented as binary choices (either 'in' or 'out')
- for gLExec/LCMAPS
- all necessary software is included in UMD-3 and UMD-4, for EL6, EL7, and Debian-based distributions. You can use the example configuation file included in the ca-policy-egi-cam package under /usr/share/doc and see for more details the VO-CA-AP Wiki. Authorization based on VO and CA combinations are binary (either 'in' or 'out')
- for Argus
- no vendor provided solution is available at this time. Contact your software vendor for support
When in doubt just only install the regular ca-policy-egi-core package. There are no changes in this case. The ca-policy-egi-core package is approved for all VOs membership and assurance models.
Patches and work-arounds
mod_ssl renegotiation timeouts
We provide here a workaround for the issue summarised in comment #57 of bug #48458. The following rpm has been added to the repository: dummy-ca-certs-20090630-1.noarch.rpm. Please note that:
- This rpm is not added to the ca-policy-egi-core, lcg-CA or ca-policy-lcg metapackage dependencies
- If you want to install it you should run: yum install dummy-ca-certs
- The RPM contains 60 expired CAs that cannot be used for validation, but will ensure the mod_ssl renegotiation buffer is large enough
For Quattor (QWG and CDB) setups, add
to your templates, preferably in a file different from the automatically-generated egi-ca-policy-core.tpl template.
Reminder notice for VOMS AA operators
Several updates to this trust anchor distribution incorporate changes to the name of the issuing authority, but the name of the end-entities and the users remains exactly the same. To make the change transparent, all operators of VOMS and VOMS-Admin services are requested to enable the subject-only name resolution mechanisms in VOMS and VOMS Admin
- on the VOMS core Attribute Authority service, configure the "-skipcacheck" flag on start-up. In YAIM this is done by setting "VOMS_SKIP_CA_CHECK" to true. See https://wiki.italiangrid.it/twiki/bin/view/VOMS/VOMSYAIMGuide
- update VOMS-Admin to version >= 3.3.2, and set "voms.skip_ca_check=True" in the service properties. For more info, read the release notes at http://italiangrid.github.io/voms/release-notes/voms-admin-server/3.3.2/
Concerns, issues and verification
If you experience problems with the installation or upgrade of your trust anchors, or with the repository, please report such an issue through the GGUS system. For issues with the contents of the distribution, concerns about the trust fabric, or with questions about the integrity of the distribution, please contact the EGI IGTF liaison at email@example.com.
You can verify the contents of the EGI Trust Anchor (CA) release with those of the International Grid Trust Federation at https://dist.eugridpma.info/distribution/igtf/current/, or its mirror at https://www.apgridpma.org/distribution/. See the IGTF and EUGridPMA web pages for additional information.