Launchpad has imported 9 comments from the remote bug at https://bugzilla.redhat.com/show_bug.cgi?id=733032.
If you reply to an imported comment from within Launchpad, your comment will be sent to the remote bug automatically. Read more about Launchpad's inter-bugtracker facilities at https://help.launchpad.net/InterBugTracking. ------------------------------------------------------------------------ On 2011-08-24T14:30:42+00:00 Philip wrote: Description of problem: This certificate is missing. "/C=US/O=VeriSign, Inc./OU=VeriSign Trust Network/OU=Terms of use at https://www.verisign.com/rpa (c)06/CN=VeriSign Class 3 Extended Validation SSL SGC CA" Version-Release number of selected component (if applicable): ca-certificates-2011.70-2.fc15.noarch How reproducible: Always Steps to Reproduce: 1. wget https://secure.vonage.com/ Actual results: wget returns error because of missing certificate. Expected results: Additional info: Reply at: https://bugs.launchpad.net/ubuntu/+source/ca- certificates/+bug/1031333/comments/0 ------------------------------------------------------------------------ On 2011-11-04T23:20:31+00:00 Brad wrote: I believe The actual problem is *not* the lack of the intermediate certificate "CN=VeriSign Class 3 Extended Validation SSL SGC CA", it is in fact that a root certificate Subject: C=US, O=VeriSign, Inc., OU=Class 3 Public Primary Certification Authority Serial: 70:ba:e4:1d:10:d9:29:34:b6:38:ca:7b:03:cc:ba:bf was present in ca-certificates 2010.63-3, but missing in the recently released ca-certificates-2011.78-1.fc14.noarch. The missing CA certificate is still valid according to VeriSign and Mozilla. This is a bit confusing, although the root certificate is valid, VeriSign stopped using it for signing in 5/2009, replacing it with another certificate with the same subject and keyid, but a different serial number (3c:91:31:cb:1f:f6:d0:1b:0e:9a:b8:d0:44:bf:12:be), as part of their move away from MD2 signatures. My workaround: Add the dropped certificate manually back into /etc/pki/tls/certs/ca-bundle.crt I notice that big sites such as vonage, paypal, optionsxpress still deliver certificates whose trust is ultimately established by the now missing root certificate. Reply at: https://bugs.launchpad.net/ubuntu/+source/ca- certificates/+bug/1031333/comments/1 ------------------------------------------------------------------------ On 2011-11-04T23:26:04+00:00 Brad wrote: Created attachment 531861 The missing certificate Appending this root certificate to /etc/pki/tls/certs/ca-bundle.crt restores validation of the sites mentioned herein. But it's never a good idea to trust root CA's from strangers. So consider this as posted just for reference. :) Reply at: https://bugs.launchpad.net/ubuntu/+source/ca- certificates/+bug/1031333/comments/2 ------------------------------------------------------------------------ On 2011-11-07T13:49:13+00:00 Joe wrote: The list of trusted CAs is inherited from upstream (Mozilla) and we are not going to change it ourselves within Fedora - sorry. Reply at: https://bugs.launchpad.net/ubuntu/+source/ca- certificates/+bug/1031333/comments/3 ------------------------------------------------------------------------ On 2011-11-07T17:40:35+00:00 Brad wrote: (In reply to comment #3) > The list of trusted CAs is inherited from upstream (Mozilla) and we are not > going to change it ourselves within Fedora - sorry. Just a few more notes. Both the SH1 and MD2 certificates *do* appear to be included in Mozilla's certdata.txt r1.78 (at lines 1010 and 17805), yet the MD2 certficate is not in ca-bundle.crt in package ca-certificates. I believe the bug is in certdata2pem.py, which does not handle the case where two certificates have the same CKA_LABEL (as is the case in certdata.txt r1.78), since it tries to output both certificates to the same file (one overwrites the other). I'll add for the google that the Class 3 certificate is not the only one that gets dropped from ca-bundle.pem by the certdata2pem.py script. "Verisign Class 1 Public Primary Certification Authority" also appears as the label of two different certs (same underlying key, signed in two different ways). Regards, Brad Reply at: https://bugs.launchpad.net/ubuntu/+source/ca- certificates/+bug/1031333/comments/4 ------------------------------------------------------------------------ On 2011-11-09T22:39:36+00:00 Joe wrote: Ah, good catch Brad, thanks for checking! Reply at: https://bugs.launchpad.net/ubuntu/+source/ca- certificates/+bug/1031333/comments/5 ------------------------------------------------------------------------ On 2011-11-15T18:35:36+00:00 Brad wrote: Created attachment 533817 For your review, I'd propose this patch to fix this. Reply at: https://bugs.launchpad.net/ubuntu/+source/ca- certificates/+bug/1031333/comments/6 ------------------------------------------------------------------------ On 2011-11-15T18:43:09+00:00 Brad wrote: Created attachment 533818 For your review, I'd propose this patch to fix this. Oops, RHBZ didn't like my patch format. Try this. Reply at: https://bugs.launchpad.net/ubuntu/+source/ca- certificates/+bug/1031333/comments/7 ------------------------------------------------------------------------ On 2012-08-07T19:53:09+00:00 Fedora wrote: This message is a notice that Fedora 15 is now at end of life. Fedora has stopped maintaining and issuing updates for Fedora 15. It is Fedora's policy to close all bug reports from releases that are no longer maintained. At this time, all open bugs with a Fedora 'version' of '15' have been closed as WONTFIX. (Please note: Our normal process is to give advanced warning of this occurring, but we forgot to do that. A thousand apologies.) Package Maintainer: If you wish for this bug to remain open because you plan to fix it in a currently maintained version, feel free to reopen this bug and simply change the 'version' to a later Fedora version. Bug Reporter: Thank you for reporting this issue and we are sorry that we were unable to fix it before Fedora 15 reached end of life. If you would still like to see this bug fixed and are able to reproduce it against a later version of Fedora, you are encouraged to click on "Clone This Bug" (top right of this page) and open it against that version of Fedora. Although we aim to fix as many bugs as possible during every release's lifetime, sometimes those efforts are overtaken by events. Often a more recent Fedora release includes newer upstream software that fixes bugs or makes them obsolete. The process we are following is described here: http://fedoraproject.org/wiki/BugZappers/HouseKeeping Reply at: https://bugs.launchpad.net/ubuntu/+source/ca- certificates/+bug/1031333/comments/18 ** Changed in: ca-certificates (Fedora) Status: Unknown => Won't Fix ** Changed in: ca-certificates (Fedora) Importance: Unknown => High -- You received this bug notification because you are a member of Ubuntu Touch seeded packages, which is subscribed to ca-certificates in Ubuntu. https://bugs.launchpad.net/bugs/1031333 Title: Missing Verisign certs due to broken extract script Status in ca-certificates package in Ubuntu: Fix Released Status in ca-certificates package in Debian: Fix Released Status in ca-certificates package in Fedora: Won't Fix Bug description: Verisign shipped G1 PCA Roots with md2 signatures on them. At some point, they resigned those roots using SHA1, but requested that the original certs keep shipping in Mozilla's cert list as they had issued intermediates with AKIs that point to the MD2 versions. See discussion here: https://groups.google.com/forum/?fromgroups#!msg/mozilla.dev.security.policy/I6bUbW3WkBU/lRxqGv6vYHYJ Now, ca-certificates uses a script called "certdata2pem.py" to extract the certificates from the certdata.txt file provided by Mozilla into individual files. Unfortunately, the script names the certificate file using the CKA_LABEL. In two instances, the verisign md2 and sha1 certs have the same CKA_LABEL, so the script is overwriting the first one (md2) with the second one (sha1). This results in the Verisign md2 certs being missing from the system ca certs. This usually isn't a problem except in the case where a website is handing out a complete cert chain, including the md2 root cert. When that happens, webkit is unable to verify the md2 root cert, and the connection fails. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/ca-certificates/+bug/1031333/+subscriptions -- Mailing list: https://launchpad.net/~touch-packages Post to : touch-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~touch-packages More help : https://help.launchpad.net/ListHelp