On 22/04/2015 19:58, Robin Bankhead wrote: > Quoting Ryan Kelly <[email protected]>: >> On 22/04/2015 08:11, Robin Bankhead wrote: >>> >>> However, it now looks like syncserver is not happy: it's throwing a 503 >>> on the first post-verification connection attempt. This is true whether >>> behind Apache, or running directly (as in the below output). >>> >>> hazel syncserver # make serve >>> ./local/bin/pserve ./syncserver.ini >>> /usr/local/src/syncserver/local/lib/python2.7/site-packages/tokenserver/verifiers.py:47: >>> >>> FutureWarning: The BrowserID certificate format has not been finalized >>> and may change in backwards-incompatible ways. If you find that the >>> latest version of this module cannot verify a valid BrowserID assertion, >>> please contact the author. >>> super(LocalVerifier, self).__init__(**kwargs) >>> Starting server in PID 6098. >>> serving on 0.0.0.0:5000 view at http://127.0.0.1:5000 >>> INFO:requests.packages.urllib3.connectionpool:Starting new HTTPS >>> connection (1): fxa.example.com >>> INFO:mozsvc.metrics:{"code": 503, "request_time": 0.04334402084350586, >>> "remoteAddressChain": ["192.168.2.7"], "agent": "Mozilla/5.0 (X11; Linux >>> x86_64; rv:37.0) Gecko/20100101 Firefox/37.0", >>> "token.assertion.connection_error": 1, "token.assertion.verify_failure": >>> 1, "tokenserver.assertion.verify": 0.03910994529724121, "path": >>> "http://fxa.example.com:5000/token/1.0/sync/1.5", "method": "GET"} >> >> >> This is almost certainly an issue with the syncserver trying to talk to >> the fxa-auth-server, but failing. >> > And I bet I know what's wrong now: I've been using a self-signed cert > for all the servers (the same one, in fact). It's for example.com, no > wildcard to explicitly cover the subdomain fxa.example.com, so I'm > guessing that syncserver is not satisfied with that. > > I can make a wildcard cert (or one specific to fxa.example.com) but will > even that work if it's still self-signed? Can I import my own CA cert > into syncserver somehow?
It's possible but a bit fiddly. The simplest path may be to obtain a properly-signed certificate. If only https://letsencrypt.org/ were ready to go... In my build of the syncserver I have the following files: local/lib/python2.7/site-packages/requests/cacert.pem local/lib/python2.7/site-packages/requests/certs.py You may be able to patch one or both of these to include your own CA cert. Cheers, Ryan _______________________________________________ Sync-dev mailing list [email protected] https://mail.mozilla.org/listinfo/sync-dev

