https://casecurity.ssllabs.com/analyze.html?d=api-v1.weather.gov
That's a good link to send them to show the "Chain issues - Incomplete"
and "Extra download" on the intermediate. Also
https://www.godaddy.com/help/install-ssl-certificates-16623
--
You received this bug notification because you
s: = subject
i: = issuer
The server certificate "CN=nws.noaa.gov" was issued by (signed by)
"CN=Go Daddy Secure Certificate Authority - G2"
This issuer is an intermediate. There is nothing provided by the server
to chain this intermediate to a root certificate. I'm pretty sure the
root that
The site is probably not configured correctly. See a similar example:
https://bugzilla.mozilla.org/show_bug.cgi?id=926163
FYI, a better test than curl is:
echo "HEAD /" | openssl s_client -CApath /etc/ssl/certs -connect
api-v1.weather.gov:443
** Bug watch added: Mozilla Bugzilla #926163
** Package changed: ca-certificates (Ubuntu) => python-certbot (Ubuntu)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1638268
Title:
certbot-auto claims parse error in apache config, but doesn't
Online Root Certification Authority 2
- E-Guven Kok Elektronik Sertifika Hizmet Saglayicisi
- GTE CyberTrust Global Root
- Thawte Premium Server CA
- Thawte Server CA
-- Michael Shuler mich...@pbandjelly.org Sun, 26 Apr 2015 10:37:48
-0500
** Changed in: ca-certificates (Ubuntu
What does this have to do with ca-certificates? Marked incomplete.
** Changed in: ca-certificates (Ubuntu)
Status: New = Incomplete
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1425710
I looked at the logs and see no issue with the ca-certificates package
install. Please, post the specific ca-certificates install error, if I
missed it. (I do not speak German, but did find what looks like all the
normal package install states in the logs)
** Changed in: ca-certificates (Ubuntu)
** Package changed: ca-certificates (Ubuntu) = ca-certificates-java
(Ubuntu)
** Tags removed: ca-certificates
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1365913
Title:
ca-certificates
Have Microsoft go through the Mozilla CA Inclusion process :)
All the CA certificates in the ca-certificates package come from Mozilla, and
one CA certificate from SPI, which is a Debian Trusted Organization.
** Changed in: ca-certificates (Ubuntu)
Status: Confirmed = Invalid
--
You
I'm marking this as Invalid, since we've established that with a current
version of ca-certificates, the connection is fine. I don't know how
backports are done in Ubuntu, since I work primarily in Debian and just
look at bug reports in launchpad from time to time. I imagine that if
you install
¯\_(ツ)_/¯
Works for me.
mshuler@hana:~/tmp/git$ git clone
https://hephaistos.lpp.polytechnique.fr/rhodecode/GIT_REPOSITORIES/LPP/PythonQt
Cloning into 'PythonQt'...
remote: Counting objects: 6205, done.
remote: Compressing objects: 100% (1207/1207), done.
remote: Total 6205 (delta 4988), reused
On Fri, Jun 6, 2014 at 12:57 PM, Alexis jeandet
alexis.jean...@member.fsf.org wrote:
Ok, good to know, which version of Ubuntu did you use?14.10?
Debian Jessie
--
Michael
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
What version of ca-certificates?
(v. 20140325)
$ openssl s_client -CApath /etc/ssl/certs -connect
hephaistos.lpp.polytechnique.fr:443
CONNECTED(0003)
depth=3 C = SE, O = AddTrust AB, OU = AddTrust External TTP Network, CN =
AddTrust External CA Root
verify return:1
depth=2 C = US, ST = UT,
** Package changed: ca-certificates (Ubuntu) = ca-certificates-java
(Ubuntu)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1299526
Title:
Errors installing certificates with filenames having
164 added, 0 removed; done.
Running hooks in /etc/ca-certificates/update.d
At this point, ca-certificates package is finished and this is where the
ca-certificates-java hook runs:
updating keystore /etc/ssl/certs/java/cacerts...
I'm not sure if this is an issue with openjdk6 utf8 handling,
http://packages.qa.debian.org/c/ca-
certificates/news/20140326T133329Z.html
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1297986
Title:
lynx https requests reports self-signed ssl certificate in
https://bugzilla.mozilla.org/show_bug.cgi?id=694536
https://bugzilla.mozilla.org/show_bug.cgi?id=856678
Those were the relevant cert replacement bugs - they extended the expiry
by 10 years.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to
Sorry, I saw Entrust and didn't follow the cert chain.
** Bug watch added: Mozilla Bugzilla #694536
https://bugzilla.mozilla.org/show_bug.cgi?id=694536
** Bug watch added: Mozilla Bugzilla #856678
https://bugzilla.mozilla.org/show_bug.cgi?id=856678
--
You received this bug notification
You're doing it wrong.
$ gnutls-cli -p 443 github.com --x509cafile /etc/ssl/certs/ca-certificates.crt
Processed 159 CA certificate(s).
Resolving 'github.com'...
Connecting to '192.30.252.129:443'...
- Certificate type: X.509
- Got a certificate list of 2 certificates.
- Certificate[0] info:
Was CAcert dropped from NSS in Ubuntu?
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to nss in Ubuntu.
https://bugs.launchpad.net/bugs/1258286
Title:
CAcert should not be trusted by default
To manage notifications about this bug go
Was CAcert dropped from NSS in Ubuntu?
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1258286
Title:
CAcert should not be trusted by default
To manage notifications about this bug go to:
I got a muffler for a Ford and it doesn't fit my car..
(year, make, and model would be kind of helpful..)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1261855
Title:
EssentialSSL (Comodo)
On 12/17/2013 01:54 PM, Sorin Sbârnea wrote:
MIchael, the https://comodosslstore.com/checksslcertificate.aspx does
not report any issues with the certificate, nor the browsers.
hrm.. Firefox 26 (plain-jane tar install) does not validate your SSL
chain, complaining about the missing issuer
https://comodosslstore.com/checksslcertificate.aspx looks like a good
place to test that your certificate is properly installed, along with
your intermediate, as per the install instructions.
My suggestion would be that once the above test passes, *then* test your
custom software/scripts.
--
On 12/17/2013 12:42 PM, Sorin Sbârnea wrote:
As a note EseensialSSL is an intermediate certificate and I also tried
to add the certificate manually into /etc/ssl/certs/ and run `update-ca-
certificates` but this had not effect on any of the tests.
You're doing it wrong..
Intermediate
Closing. Downloaded upstream cert matches extracted cert, with the
exception of carriage returns and no newline.
mshuler@mana:~/tmp$ wget -q
http://www.geotrust.com/resources/root_certificates/certificates/Equifax_Secure_Global_eBusiness_CA-1.pem
mshuler@mana:~/tmp$ openssl x509 -text -noout
** Changed in: ifmetric (Ubuntu)
Status: Confirmed = Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/896584
Title:
using ifmetric reports NETLINK: Packet too small or truncated!
** Changed in: ca-certificates (Debian)
Status: New = Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/305062
Title:
Upgrade of package ca-certificates has many issues:
This certificate was added in ca-certificates_20121105
-- Kind regards,
Michael Shuler
** Changed in: ca-certificates (Ubuntu)
Status: New = Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https
,
Michael Shuler
** Changed in: ca-certificates (Ubuntu)
Status: Triaged = Fix Released
** Changed in: ca-certificates-java (Ubuntu)
Status: Triaged = Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https
This sounds like an issue with pidgin, openjdk, or ca-certificates-java
- why is this assigned to ca-certificates?
--
Kind regards,
Michael Shuler
** Changed in: ca-certificates (Ubuntu)
Status: New = Incomplete
--
You received this bug notification because you are a member of Ubuntu
*** This bug is a duplicate of bug 1031333 ***
https://bugs.launchpad.net/bugs/1031333
** This bug has been marked a duplicate of bug 1031333
Missing Verisign certs due to broken extract script
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is
This was a perl error, irrelevant to ca-certificates, other than timing.
--
Kind regards,
Michael Shuler
** Changed in: ca-certificates (Ubuntu)
Status: New = Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https
-java hook.
--
Kind regards,
Michael Shuler
** Changed in: ca-certificates (Ubuntu)
Status: New = Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1047946
Title:
package ca-certificates
mount
[ 3775.442576] UDF-fs: INFO Mounting volume
'Log\xffc3\xffad\xffadstica P\xffc3\xffba\xffbablica
V.1', timestamp 2011/11/29 16:40 (1f4c)
--
Kind regards,
Michael Shuler
** Changed in: ca-certificates (Ubuntu)
Status: New = Invalid
--
You received this bug
This is fixed in ca-certificates_20130610
--
Kind regards,
Michael Shuler
** Changed in: ca-certificates (Ubuntu)
Status: Fix Committed = Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https
ca-certificates stating this fact.
With the exception of SPI (http://www.spi-inc.org/) and CAcert
(http://www.cacert.org/), only those CAs included in the Mozilla trust
store will be included in the ca-certificates package in Debian.
--
Kind regards,
Michael Shuler
** Changed in: ca
Fixed in ca-certificates-java (20121112+nmu1) / ca-certificates
(20121114)
--
Kind regards,
Michael Shuler
** Changed in: ca-certificates (Ubuntu)
Status: Confirmed = Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed
** Changed in: ca-certificates (Ubuntu)
Status: Triaged = Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/487845
Title:
Support for /usr/local/share/ca-certificates/ is
Pending upload to Debian, these have been committed to the collab-maint
git repository:
* Add ca-certificates-local source package example to documentation
* Update local certificate handling in README.Debian.
In addition to adding a bit more documentation on local certificate
handling, I
Found that this was fixed:
ca-certificates-java (20121112+nmu2) unstable; urgency=medium
* Non-maintainer upload.
* postinst, jks-keystore.hook: Do not fail if nss.cfg does not (yet) exist,
i.e. if openjdk-?-jre-headless is unpacked but not yet configured.
(Closes: #694888)
* Set
These install errors were fixed in ca-certificates-java (20121112+nmu1)
/ ca-certificates (20121114)
--
Kind regards,
Michael Shuler
** Changed in: ca-certificates (Ubuntu)
Status: New = Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which
There were fixes released in ca-certificates-java (20121112+nmu1) / ca-
certificates (20121114) to use triggers that correct most all the issues
with the /etc/ca-certificates/update.d/jks-keystore hook and upgrading.
I'm going to mark this one as fixed.
--
Kind regards,
Michael Shuler
Public bug reported:
Binary package hint: partman-base
Preseed partition recipe:
#=
d-i partman-auto/method string regular
d-i partman-lvm/device_remove_lvm boolean true
d-i partman-md/device_remove_md boolean true
d-i partman-lvm/confirm boolean true
d-i partman-auto/expert_recipe string \
** Attachment added: syslog
http://launchpadlibrarian.net/41052776/syslog
--
partitioning failure from simple recipe
https://bugs.launchpad.net/bugs/539822
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
--
ubuntu-bugs mailing list
** Attachment added: partman
http://launchpadlibrarian.net/41052817/partman
--
partitioning failure from simple recipe
https://bugs.launchpad.net/bugs/539822
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
--
ubuntu-bugs mailing
Thanks for the event.d example, John. This is an issue on feisty, and
you can bet that it will not be fixed up upstream ;)
John, I believe the runlevel-x lines should not include a hyphen:
--- /etc/event.d/svscan ---
start on runlevel 1
start on runlevel 2
start on runlevel 3
start on runlevel
47 matches
Mail list logo