-
-
Notifications
You must be signed in to change notification settings - Fork 10
Harden Rockxy root CA lifecycle for open-source release safety #27
Copy link
Copy link
Open
Labels
area/https-interceptionCertificate trust, root CA, and HTTPS interception flowsCertificate trust, root CA, and HTTPS interception flowsenhancementNew feature or requestNew feature or requestmacosApplies to macOS platform behaviorApplies to macOS platform behaviorpriority/p1High-priority work with clear user or project impactHigh-priority work with clear user or project impactstatus/needs-triageNew issue awaiting initial maintainer reviewNew issue awaiting initial maintainer reviewuser-feedbackRaised from observed or likely user-facing pain pointsRaised from observed or likely user-facing pain points
Metadata
Metadata
Assignees
Labels
area/https-interceptionCertificate trust, root CA, and HTTPS interception flowsCertificate trust, root CA, and HTTPS interception flowsenhancementNew feature or requestNew feature or requestmacosApplies to macOS platform behaviorApplies to macOS platform behaviorpriority/p1High-priority work with clear user or project impactHigh-priority work with clear user or project impactstatus/needs-triageNew issue awaiting initial maintainer reviewNew issue awaiting initial maintainer reviewuser-feedbackRaised from observed or likely user-facing pain pointsRaised from observed or likely user-facing pain points
Summary
Rockxy is already using the right local per-install root CA model for a debugging proxy, but the CA lifecycle should be hardened for open-source release quality and safer long-term maintenance.
This issue is about practical local hardening, not public CA trust or expensive company-scale PKI work.
Problem
Current concerns:
.bakrecovery files should not remain the long-term expected storage modelScope
.bakrecovery paths where safeNon-Goals
Acceptance Criteria
Related