Your message dated Sat, 09 Sep 2023 14:42:56 +0200
with message-id <[email protected]>
and subject line Re: Bug#995570: wget: Bogus certificate errors, certificate is 
valid
has caused the Debian Bug report #995570,
regarding wget: Bogus certificate errors, certificate is valid
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
995570: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=995570
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: wget
Version: 1.20.1-1.1
Severity: normal

Dear Maintainer,

*** Reporter, please consider answering these questions, where appropriate ***

   * What led up to the situation?
   * What exactly did you do (or not do) that was effective (or
     ineffective)?
wget https://matteosistisette.com/generatore-strofe-bolero-baglioni/

   * What was the outcome of this action?

ERROR: certificate is not trusted
ERROR: certificate is expired

(I'm writing by memory, so the wording might not be 100% exact)

   * What outcome did you expect instead?

Should have downloaded the page with no error. The certificate is
trusted and not expired.
curl downloads the exact same url without error, and so does my browser.

Note that the server serving the url is the very same machine I'm using
wget from. I'm not sure whether the issue happens at the client or the
server level, but it's the same machine.

I suspect this is due to a CA certificate having recently expired and
being wrongly used due to a misconfiguration in the distribution.
Given that I did not install or choose the root certificates but used
the package manager, this is a bug in the distribution or the
distributed packages. Perhaps not in wget, please reassign to whatever
the culprit is.


*** End of the template - remove these template lines ***


-- System Information:
Debian Release: 10.2
  APT prefers stable-updates
  APT policy: (500, 'stable-updates'), (500, 'stable')
Architecture: amd64 (x86_64)

Kernel: Linux 4.19.0-6-cloud-amd64 (SMP w/4 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), 
LANGUAGE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages wget depends on:
ii  libc6         2.28-10
ii  libgnutls30   3.6.7-4
ii  libidn2-0     2.0.5-1
ii  libnettle6    3.4.1-1
ii  libpcre2-8-0  10.32-5
ii  libpsl5       0.20.2-2
ii  libuuid1      2.33.1-0.1
ii  zlib1g        1:1.2.11.dfsg-1

Versions of packages wget recommends:
ii  ca-certificates  20190110

wget suggests no packages.

-- no debconf information

--- End Message ---
--- Begin Message ---
fixed 995570 1.21.3-1
thx

Hello,

Am Samstag, dem 02.10.2021 um 12:06 +0000 schrieb [email protected]:

> wget https://matteosistisette.com/generatore-strofe-bolero-baglioni/
> 
>    * What was the outcome of this action?
> 
> ERROR: certificate is not trusted
> ERROR: certificate is expired
...
> I suspect this is due to a CA certificate having recently expired and
> being wrongly used due to a misconfiguration in the distribution.
> Given that I did not install or choose the root certificates but used
> the package manager, this is a bug in the distribution or the
> distributed packages. Perhaps not in wget, please reassign to
> whatever
> the culprit is.

Thank you for your report. wget itself does not carry certificates with
it. It uses the certificates from the distribution.
I cannot reproduce the problem with 1.21.3-1 anymore; so I'm closing
this bug.

If you still have errors please tell us.

Thank you.

-- 
Noël Köthe <noel debian.org>
Debian GNU/Linux, www.debian.org

Attachment: signature.asc
Description: This is a digitally signed message part


--- End Message ---

Reply via email to