https://casecurity.ssllabs.com/analyze.html?d=api-v1.weather.gov
That's a good link to send them to show the "Chain issues - Incomplete"
and "Extra download" on the intermediate. Also
https://www.godaddy.com/help/install-ssl-certificates-16623
--
You received this bug notification because you ar
s: = subject
i: = issuer
The server certificate "CN=nws.noaa.gov" was issued by (signed by)
"CN=Go Daddy Secure Certificate Authority - G2"
This issuer is an intermediate. There is nothing provided by the server
to chain this intermediate to a root certificate. I'm pretty sure the
root that signe
The site is probably not configured correctly. See a similar example:
https://bugzilla.mozilla.org/show_bug.cgi?id=926163
FYI, a better test than curl is:
echo "HEAD /" | openssl s_client -CApath /etc/ssl/certs -connect
api-v1.weather.gov:443
** Bug watch added: Mozilla Bugzilla #926163
htt
** Package changed: ca-certificates (Ubuntu) => python-certbot (Ubuntu)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1638268
Title:
certbot-auto claims parse error in apache config, but doesn't tel
hority" Closes: #762709
The following certificate authorities were removed (-):
- "America Online Root Certification Authority 1"
- "America Online Root Certification Authority 2"
- "E-Guven Kok Elektronik Sertifika Hizmet Saglayicisi"
-
What does this have to do with ca-certificates? Marked incomplete.
** Changed in: ca-certificates (Ubuntu)
Status: New => Incomplete
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1425710
Titl
I looked at the logs and see no issue with the ca-certificates package
install. Please, post the specific ca-certificates install error, if I
missed it. (I do not speak German, but did find what looks like all the
normal package install states in the logs)
** Changed in: ca-certificates (Ubuntu)
I'm marking this as Invalid, since we've established that with a current
version of ca-certificates, the connection is fine. I don't know how
backports are done in Ubuntu, since I work primarily in Debian and just
look at bug reports in launchpad from time to time. I imagine that if
you install the
Have Microsoft go through the Mozilla CA Inclusion process :)
All the CA certificates in the ca-certificates package come from Mozilla, and
one CA certificate from SPI, which is a Debian Trusted Organization.
** Changed in: ca-certificates (Ubuntu)
Status: Confirmed => Invalid
--
You rec
** Package changed: ca-certificates (Ubuntu) => ca-certificates-java
(Ubuntu)
** Tags removed: ca-certificates
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1365913
Title:
ca-certificates installin
On Fri, Jun 6, 2014 at 12:57 PM, Alexis jeandet
wrote:
> Ok, good to know, which version of Ubuntu did you use?14.10?
Debian Jessie
--
Michael
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1283997
¯\_(ツ)_/¯
Works for me.
mshuler@hana:~/tmp/git$ git clone
https://hephaistos.lpp.polytechnique.fr/rhodecode/GIT_REPOSITORIES/LPP/PythonQt
Cloning into 'PythonQt'...
remote: Counting objects: 6205, done.
remote: Compressing objects: 100% (1207/1207), done.
remote: Total 6205 (delta 4988), reused
What version of ca-certificates?
(v. 20140325)
$ openssl s_client -CApath /etc/ssl/certs -connect
hephaistos.lpp.polytechnique.fr:443
CONNECTED(0003)
depth=3 C = SE, O = AddTrust AB, OU = AddTrust External TTP Network, CN =
AddTrust External CA Root
verify return:1
depth=2 C = US, ST = UT,
164 added, 0 removed; done.
Running hooks in /etc/ca-certificates/update.d
At this point, ca-certificates package is finished and this is where the
ca-certificates-java hook runs:
updating keystore /etc/ssl/certs/java/cacerts...
I'm not sure if this is an issue with openjdk6 utf8 handling, b
** Package changed: ca-certificates (Ubuntu) => ca-certificates-java
(Ubuntu)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1299526
Title:
Errors installing certificates with filenames having accent
Sorry, I saw Entrust and didn't follow the cert chain.
** Bug watch added: Mozilla Bugzilla #694536
https://bugzilla.mozilla.org/show_bug.cgi?id=694536
** Bug watch added: Mozilla Bugzilla #856678
https://bugzilla.mozilla.org/show_bug.cgi?id=856678
--
You received this bug notification be
https://bugzilla.mozilla.org/show_bug.cgi?id=694536
https://bugzilla.mozilla.org/show_bug.cgi?id=856678
Those were the relevant cert replacement bugs - they extended the expiry
by 10 years.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubun
http://packages.qa.debian.org/c/ca-
certificates/news/20140326T133329Z.html
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1297986
Title:
lynx https requests reports self-signed ssl certificate in er
You're doing it wrong.
$ gnutls-cli -p 443 github.com --x509cafile /etc/ssl/certs/ca-certificates.crt
Processed 159 CA certificate(s).
Resolving 'github.com'...
Connecting to '192.30.252.129:443'...
- Certificate type: X.509
- Got a certificate list of 2 certificates.
- Certificate[0] info:
-
Was CAcert dropped from NSS in Ubuntu?
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1258286
Title:
CAcert should not be trusted by default
To manage notifications about this bug go to:
https://bug
On 12/17/2013 12:42 PM, Sorin Sbârnea wrote:
> As a note EseensialSSL is an intermediate certificate and I also tried
> to add the certificate manually into /etc/ssl/certs/ and run `update-ca-
> certificates` but this had not effect on any of the tests.
You're doing it wrong..
Intermediate certif
https://comodosslstore.com/checksslcertificate.aspx looks like a good
place to test that your certificate is properly installed, along with
your intermediate, as per the install instructions.
My suggestion would be that once the above test passes, *then* test your
custom software/scripts.
--
On 12/17/2013 01:54 PM, Sorin Sbârnea wrote:
> MIchael, the https://comodosslstore.com/checksslcertificate.aspx does
> not report any issues with the certificate, nor the browsers.
hrm.. Firefox 26 (plain-jane tar install) does not validate your SSL
chain, complaining about the missing issuer c
I got a muffler for a Ford and it doesn't fit my car..
(year, make, and model would be kind of helpful..)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1261855
Title:
EssentialSSL (Comodo) certific
Closing. Downloaded upstream cert matches extracted cert, with the
exception of carriage returns and no newline.
mshuler@mana:~/tmp$ wget -q
http://www.geotrust.com/resources/root_certificates/certificates/Equifax_Secure_Global_eBusiness_CA-1.pem
mshuler@mana:~/tmp$ openssl x509 -text -noout -fi
** Changed in: ifmetric (Ubuntu)
Status: Confirmed => Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/896584
Title:
using ifmetric reports "NETLINK: Packet too small or truncated!
** Changed in: ca-certificates (Debian)
Status: New => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/305062
Title:
Upgrade of package ca-certificates has many issues: install/upg
There were fixes released in ca-certificates-java (20121112+nmu1) / ca-
certificates (20121114) to use triggers that correct most all the issues
with the /etc/ca-certificates/update.d/jks-keystore hook and upgrading.
I'm going to mark this one as fixed.
--
Kind regards,
Michael S
These install errors were fixed in ca-certificates-java (20121112+nmu1)
/ ca-certificates (20121114)
--
Kind regards,
Michael Shuler
** Changed in: ca-certificates (Ubuntu)
Status: New => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, wh
Found that this was fixed:
ca-certificates-java (20121112+nmu2) unstable; urgency=medium
* Non-maintainer upload.
* postinst, jks-keystore.hook: Do not fail if nss.cfg does not (yet) exist,
i.e. if openjdk-?-jre-headless is unpacked but not yet configured.
(Closes: #694888)
* Set ur
Pending upload to Debian, these have been committed to the collab-maint
git repository:
* Add ca-certificates-local source package example to documentation
* Update local certificate handling in README.Debian.
In addition to adding a bit more documentation on local certificate
handling, I hav
** Changed in: ca-certificates (Ubuntu)
Status: Triaged => Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/487845
Title:
Support for /usr/local/share/ca-certificates/ is incomplet
Fixed in ca-certificates-java (20121112+nmu1) / ca-certificates
(20121114)
--
Kind regards,
Michael Shuler
** Changed in: ca-certificates (Ubuntu)
Status: Confirmed => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed
ainst ca-certificates stating this fact.
With the exception of SPI (http://www.spi-inc.org/) and CAcert
(http://www.cacert.org/), only those CAs included in the Mozilla trust
store will be included in the ca-certificates package in Debian.
--
Kind regards,
Michael Shuler
** Changed i
This is fixed in ca-certificates_20130610
--
Kind regards,
Michael Shuler
** Changed in: ca-certificates (Ubuntu)
Status: Fix Committed => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
ht
g readonly mount
[ 3775.442576] UDF-fs: INFO Mounting volume
'Log\xffc3\xffad\xffadstica P\xffc3\xffba\xffbablica
V.1', timestamp 2011/11/29 16:40 (1f4c)
--
Kind regards,
Michael Shuler
** Changed in: ca-certificates (Ubuntu)
Status: New => Invalid
This was a perl error, irrelevant to ca-certificates, other than timing.
--
Kind regards,
Michael Shuler
** Changed in: ca-certificates (Ubuntu)
Status: New => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
ht
-java hook.
--
Kind regards,
Michael Shuler
** Changed in: ca-certificates (Ubuntu)
Status: New => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1047946
Title:
package
*** This bug is a duplicate of bug 1031333 ***
https://bugs.launchpad.net/bugs/1031333
** This bug has been marked a duplicate of bug 1031333
Missing Verisign certs due to broken extract script
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscri
This sounds like an issue with pidgin, openjdk, or ca-certificates-java
- why is this assigned to ca-certificates?
--
Kind regards,
Michael Shuler
** Changed in: ca-certificates (Ubuntu)
Status: New => Incomplete
--
You received this bug notification because you are a member of Ubu
,
Michael Shuler
** Changed in: ca-certificates (Ubuntu)
Status: Triaged => Fix Released
** Changed in: ca-certificates-java (Ubuntu)
Status: Triaged => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
This certificate was added in ca-certificates_20121105
-- Kind regards,
Michael Shuler
** Changed in: ca-certificates (Ubuntu)
Status: New => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
ht
** Attachment added: "partman"
http://launchpadlibrarian.net/41052817/partman
--
partitioning failure from simple recipe
https://bugs.launchpad.net/bugs/539822
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
--
ubuntu-bugs mailing l
** Attachment added: "syslog"
http://launchpadlibrarian.net/41052776/syslog
--
partitioning failure from simple recipe
https://bugs.launchpad.net/bugs/539822
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
--
ubuntu-bugs mailing lis
Public bug reported:
Binary package hint: partman-base
Preseed partition recipe:
#=
d-i partman-auto/method string regular
d-i partman-lvm/device_remove_lvm boolean true
d-i partman-md/device_remove_md boolean true
d-i partman-lvm/confirm boolean true
d-i partman-auto/expert_recipe string \
Thanks for the event.d example, John. This is an issue on feisty, and
you can bet that it will not be fixed up upstream ;)
John, I believe the runlevel-x lines should not include a hyphen:
--- /etc/event.d/svscan ---
start on runlevel 1
start on runlevel 2
start on runlevel 3
start on runlevel
46 matches
Mail list logo