Package: pianobar
Version: 2014.09.28-1
Severity: grave
Justification: renders package unusable

The SSL certificate for the pandora server that pianobar talks to has been
rotated, the previous one having (presumably) expired.  The new certificate
has a start date of 30 Nov 2015.

SSL certificate details as shown by gnutls-cli: 

$ gnutls-cli tuner.pandora.com -p 443
Processed 187 CA certificate(s).
Resolving 'tuner.pandora.com'...
Connecting to '208.85.40.35:443'...
- Certificate type: X.509
- Got a certificate list of 3 certificates.
- Certificate[0] info:
 - subject `C=US,ST=California,L=Oakland,O=Pandora Media\, 
Inc.,OU=operations,CN=tuner.pandora.com', issuer `C=US,O=VeriSign\, 
Inc.,OU=VeriSign Trust Network,OU=Terms of use at https://www.verisign.com/rpa 
(c)10,CN=VeriSign Class 3 Secure Server CA - G3', RSA key 2048 bits, signed 
using RSA-SHA1, activated `2015-12-01 00:00:00 UTC', expires `2016-12-24 
23:59:59 UTC', SHA-1 fingerprint `13cc51ac0c31cd96c55015c76914360f7ac41a00'
        Public Key ID:
                7dc38c5f8029887cd68cc803d106058ca889ee39
        Public key's random art:
                +--[ RSA 2048]----+
                |.o=*.            |
                |o .+oo =   o     |
                |o. .* = + o .    |
                |+    +   o + .   |
                |.       S o = .  |
                | .         o o   |
                |. .         .    |
                | E               |
                |  .              |
                +-----------------+

- Certificate[1] info:
 - subject `C=US,O=VeriSign\, Inc.,OU=VeriSign Trust Network,OU=Terms of use at 
https://www.verisign.com/rpa (c)10,CN=VeriSign Class 3 Secure Server CA - G3', 
issuer `C=US,O=VeriSign\, Inc.,OU=VeriSign Trust Network,OU=(c) 2006 VeriSign\, 
Inc. - For authorized use only,CN=VeriSign Class 3 Public Primary Certification 
Authority - G5', RSA key 2048 bits, signed using RSA-SHA1, activated 
`2010-02-08 00:00:00 UTC', expires `2020-02-07 23:59:59 UTC', SHA-1 fingerprint 
`5deb8f339e264c19f6686f5f8f32b54a4c46b476'
- Certificate[2] info:
 - subject `C=US,O=VeriSign\, Inc.,OU=VeriSign Trust Network,OU=(c) 2006 
VeriSign\, Inc. - For authorized use only,CN=VeriSign Class 3 Public Primary 
Certification Authority - G5', issuer `C=US,O=VeriSign\, Inc.,OU=Class 3 Public 
Primary Certification Authority', RSA key 2048 bits, signed using RSA-SHA1, 
activated `2006-11-08 00:00:00 UTC', expires `2021-11-07 23:59:59 UTC', SHA-1 
fingerprint `32f30882622b87cf8856c63db873df0853b4dd27'
- Status: The certificate is trusted. 
- Description: (TLS1.2)-(RSA)-(AES-256-GCM)
- Session ID:
- 
32:58:B0:65:4D:20:24:22:42:53:83:52:ED:88:94:DB:7C:FB:7F:25:1C:F1:27:7E:66:57:0A:0E:D9:ED:B8:A8
- Version: TLS1.2
- Key Exchange: RSA
- Cipher: AES-256-GCM
- MAC: AEAD
- Compression: NULL
- Options: safe renegotiation,
- Handshake was completed

firefox reports the same SHA1 fingerprint, and likewise successfully
negotiates an SSL connection to this server with no security warnings.

Updating ~/.config/pianobar/config to list this fingerprint is sufficient to
work around the problem:

  tls_fingerprint = 13cc51ac0c31cd96c55015c76914360f7ac41a00


-- 
Steve Langasek                   Give me a lever long enough and a Free OS
Debian Developer                   to set it on, and I can move the world.
Ubuntu Developer                                    http://www.debian.org/
slanga...@ubuntu.com                                     vor...@debian.org

Attachment: signature.asc
Description: Digital signature

Reply via email to