Transitioning to built-in root certificates (?)

With the coming of 7.19 we’ve now been exposed to “Built-in root certificate authorities” which sounds like a really good thing.

Long ago when I started messing with DoH and various other things I followed A Guide to import the CAs curl uses. Worked great then, works great now!

However, as my setup matures and my knowledge increases I’m revisiting everything to better understand what’s already in-built, maybe relieving some maintenance burden and improving functionality / security.

My questions:

What certs are trusted by default in ROS, that I can take advantage of simply by checking “Trust Built In Anchors” — and ideally, how can I find that out for myself? I don’t see anything new in System > Certificates

Same thing, but for CRL — and in particular, what messages might I see in the logs if a connection to a host is refused due to failure to verify the cert due to the CRL?

Overall here, my goal is to remove as much “custom” configuration support as possible. But in the end if I have to maintain my own cert list it’s not a big deal — I will just schedule a script once a month to replace / update the lists on my own and ignore the built-in trusts.

But this is such a cool feature to have in-built it seems a shame not to be able to utilize it more fully.

At least in Winbox 3.42, I can see built-in CAs in System->Certificates “Built In CA” tab. Anyway the command-line for it is:

/certificate builtin print

As for validation error, including CRL errors, you will get the usual messages in the logs.

Note that specifically for CRLs there are two global options: “Use CRL” and “CRL Download” that influence whether CRLs are consulted at all. They are off (i.e. CRLs are ignored) by default. This is not an unusual setting, especially for routers.

Fantastic — that is exactly what I needed to see.

Was following along with The Docs and only found limited success. Now that I know what I’m looking at more it’s crystal clear, and I’m seeing everything I need.

Gonna have to play around a little, and do some testing, but I think I’m about to zap all my self-installed certs and rely on the built-ins.