

The answer is that you would have no way of knowing that I had not tampered with the root certificates and inserted one of my own, allowing me to impersonate any website by making a fake certificate signed with my own root certificate.


After all, that would allow you to skip steps 1-3, and simply download rootcerts.pem. You might wonder why I didn't simply put a link to a more modern bundle of certificates somewhere on the web. Note this copies over the first group of certificates ( "Trusted Certificates" in the question), but not the second nor the third. In case you were wondering, you cannot add them to the System Roots keychain as that can only be updated by the operating system. pem file into a number of certificates in the temporary directory concerned, then adds them as trustRoot certificates to the System key chain they will then operate as trusted roots in addition to the certificates in the original "System Roots" keychain. Security -v add-trusted-cert -d -r trustRoot -k "/Library/Keychains/System.keychain" "$c" by copying it into a file, then using chmod 755 trustrootĬat "$1" | (cd $DIR & split -p '-BEGIN CERTIFICATE-' - cert- ) Make the trustroot shell script below, e.g.Copy the rootcerts.pem file to your antique mac.This file will contain all the certificates concatenated. On that Mac, launch Keychain Access, select "System Roots", select all the certificates, select File->Export, and export them as rootcerts.pem file.that can access the problematic web sites) First find the more modern Mac with a working set of System Root certificates (i.e.(Why not just download them? See note that the end of this answer.) The easiest way to do this is to transfer your System Root certificates from another Mac to which you have access that runs a more modern version of macOS. How do I update my root certificates on an older version of OS X 10.11 There is a list of fingerprints of the current certificates there, but no downloadable bundles of certificates. Blocked certificates are believed to be compromised and will never be trusted.When one of these certificates is used, you'll be prompted to choose whether or not to trust it. Always Ask certificates are untrusted but not blocked.

When IT administrators create Configuration Profiles, these trusted root certificates don't need to be included.
