Your message dated Sun, 23 Oct 2011 18:42:31 -0500
with message-id <4ea4a667.40...@pbandjelly.org>
and subject line Closing 563128
has caused the Debian Bug report #563128,
regarding ca-certificates: curl and wget fail on https://twitter.com/ (but not 
iceweasel)
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
563128: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=563128
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: ca-certificates
Version: 20090814
Severity: normal

I can open https://twitter.com/ with iceweasel without any problem,
but both curl and wget fail:

$ curl https://twitter.com/
curl: (60) SSL certificate problem, verify that the CA cert is OK. Details:
error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify 
failed
More details here: http://curl.haxx.se/docs/sslcerts.html

curl performs SSL certificate verification by default, using a "bundle"
 of Certificate Authority (CA) public keys (CA certs). If the default
 bundle file isn't adequate, you can specify an alternate file
 using the --cacert option.
If this HTTPS server uses a certificate signed by a CA represented in
 the bundle, the certificate verification probably failed due to a
 problem with the certificate (it might be expired, or the name might
 not match the domain name in the URL).
If you'd like to turn off curl's verification of the certificate, use
 the -k (or --insecure) option.

$ wget https://twitter.com/
--2009-12-31 03:05:59--  https://twitter.com/
Resolving twitter.com... 168.143.162.52
Connecting to twitter.com|168.143.162.52|:443... connected.
ERROR: cannot verify twitter.com's certificate, issued by `/C=US/O=Equifax 
Secure Inc./CN=Equifax Secure Global eBusiness CA-1':
  Unable to locally verify the issuer's authority.
To connect to twitter.com insecurely, use `--no-check-certificate'.

A strace shows that curl tries to access /etc/ssl/certs/74c26bd0.0
and that wget tries to access /usr/lib/ssl/certs/74c26bd0.0, but
this file doesn't exist. It seems to correspond to the has for
Equifax_Secure_Global_eBusiness_CA-1.pem, which is not installed:

$ locate Equifax_Secure
/etc/ssl/certs/Equifax_Secure_CA.pem
/etc/ssl/certs/Equifax_Secure_eBusiness_CA_1.pem
/etc/ssl/certs/Equifax_Secure_eBusiness_CA_2.pem
/usr/share/ca-certificates/mozilla/Equifax_Secure_CA.crt
/usr/share/ca-certificates/mozilla/Equifax_Secure_Global_eBusiness_CA.crt
/usr/share/ca-certificates/mozilla/Equifax_Secure_eBusiness_CA_1.crt
/usr/share/ca-certificates/mozilla/Equifax_Secure_eBusiness_CA_2.crt

This is strange, because according to

  http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=534674

this certificate should be there (the bug is marked as fixed).

-- System Information:
Debian Release: squeeze/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (500, 'stable'), (1, 'experimental')
Architecture: amd64 (x86_64)

Kernel: Linux 2.6.31-1-amd64 (SMP w/2 CPU cores)
Locale: LANG=POSIX, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

Versions of packages ca-certificates depends on:
ii  debconf [debconf-2.0]         1.5.28     Debian configuration management sy
ii  openssl                       0.9.8k-7   Secure Socket Layer (SSL) binary a

ca-certificates recommends no packages.

ca-certificates suggests no packages.

-- debconf information:
  ca-certificates/enable_crts: brasil.gov.br/brasil.gov.br.crt, 
cacert.org/cacert.org.crt, debconf.org/ca.crt, gouv.fr/cert_igca_dsa.crt, 
gouv.fr/cert_igca_rsa.crt, 
mozilla/ABAecom_=sub.__Am._Bankers_Assn.=_Root_CA.crt, 
mozilla/AOL_Time_Warner_Root_Certification_Authority_1.crt, 
mozilla/AOL_Time_Warner_Root_Certification_Authority_2.crt, 
mozilla/AddTrust_External_Root.crt, 
mozilla/AddTrust_Low-Value_Services_Root.crt, 
mozilla/AddTrust_Public_Services_Root.crt, 
mozilla/AddTrust_Qualified_Certificates_Root.crt, 
mozilla/America_Online_Root_Certification_Authority_1.crt, 
mozilla/America_Online_Root_Certification_Authority_2.crt, 
mozilla/Baltimore_CyberTrust_Root.crt, 
mozilla/COMODO_Certification_Authority.crt, 
mozilla/COMODO_ECC_Certification_Authority.crt, 
mozilla/Camerfirma_Chambers_of_Commerce_Root.crt, 
mozilla/Camerfirma_Global_Chambersign_Root.crt, 
mozilla/Certplus_Class_2_Primary_CA.crt, mozilla/Certum_Root_CA.crt, 
mozilla/Comodo_AAA_Services_root.crt, mozilla/Comodo_Secure_Services_root.crt, 
mozilla/Comodo_Trusted_Services_root.crt, mozilla/DST_ACES_CA_X6.crt, 
mozilla/DST_Root_CA_X3.crt, mozilla/DigiCert_Assured_ID_Root_CA.crt, 
mozilla/DigiCert_Global_Root_CA.crt, 
mozilla/DigiCert_High_Assurance_EV_Root_CA.crt, mozilla/DigiNotar_Root_CA.crt, 
mozilla/Digital_Signature_Trust_Co._Global_CA_1.crt, 
mozilla/Digital_Signature_Trust_Co._Global_CA_2.crt, 
mozilla/Digital_Signature_Trust_Co._Global_CA_3.crt, 
mozilla/Digital_Signature_Trust_Co._Global_CA_4.crt, 
mozilla/Entrust.net_Global_Secure_Personal_CA.crt, 
mozilla/Entrust.net_Global_Secure_Server_CA.crt, 
mozilla/Entrust.net_Premium_2048_Secure_Server_CA.crt, 
mozilla/Entrust.net_Secure_Personal_CA.crt, 
mozilla/Entrust.net_Secure_Server_CA.crt, 
mozilla/Entrust_Root_Certification_Authority.crt, 
mozilla/Equifax_Secure_CA.crt, mozilla/Equifax_Secure_eBusiness_CA_1.crt, 
mozilla/Equifax_Secure_eBusiness_CA_2.crt, 
mozilla/Firmaprofesional_Root_CA.crt, mozilla/GTE_CyberTrust_Global_Root.crt, 
mozilla/GTE_CyberTrust_Root_CA.crt, mozilla/GeoTrust_Global_CA.crt, 
mozilla/GeoTrust_Global_CA_2.crt, 
mozilla/GeoTrust_Primary_Certification_Authority.crt, 
mozilla/GeoTrust_Universal_CA.crt, mozilla/GeoTrust_Universal_CA_2.crt, 
mozilla/GlobalSign_Root_CA.crt, mozilla/GlobalSign_Root_CA_-_R2.crt, 
mozilla/Go_Daddy_Class_2_CA.crt, mozilla/IPS_CLASE1_root.crt, 
mozilla/IPS_CLASE3_root.crt, mozilla/IPS_CLASEA1_root.crt, 
mozilla/IPS_CLASEA3_root.crt, mozilla/IPS_Chained_CAs_root.crt, 
mozilla/IPS_Servidores_root.crt, mozilla/IPS_Timestamping_root.crt, 
mozilla/NetLock_Business_=Class_B=_Root.crt, 
mozilla/NetLock_Express_=Class_C=_Root.crt, 
mozilla/NetLock_Notary_=Class_A=_Root.crt, 
mozilla/NetLock_Qualified_=Class_QA=_Root.crt, 
mozilla/Network_Solutions_Certificate_Authority.crt, 
mozilla/QuoVadis_Root_CA.crt, mozilla/QuoVadis_Root_CA_2.crt, 
mozilla/QuoVadis_Root_CA_3.crt, mozilla/RSA_Root_Certificate_1.crt, 
mozilla/RSA_Security_1024_v3.crt, mozilla/RSA_Security_2048_v3.crt, 
mozilla/SecureTrust_CA.crt, mozilla/Secure_Global_CA.crt, 
mozilla/Security_Communication_Root_CA.crt, mozilla/Sonera_Class_1_Root_CA.crt, 
mozilla/Sonera_Class_2_Root_CA.crt, mozilla/Staat_der_Nederlanden_Root_CA.crt, 
mozilla/Starfield_Class_2_CA.crt, mozilla/StartCom_Certification_Authority.crt, 
mozilla/StartCom_Ltd..crt, mozilla/SwissSign_Gold_CA_-_G2.crt, 
mozilla/SwissSign_Platinum_CA_-_G2.crt, mozilla/SwissSign_Silver_CA_-_G2.crt, 
mozilla/Swisscom_Root_CA_1.crt, 
mozilla/TC_TrustCenter__Germany__Class_2_CA.crt, 
mozilla/TC_TrustCenter__Germany__Class_3_CA.crt, 
mozilla/TDC_Internet_Root_CA.crt, mozilla/TDC_OCES_Root_CA.crt, 
mozilla/TURKTRUST_Certificate_Services_Provider_Root_1.crt, 
mozilla/TURKTRUST_Certificate_Services_Provider_Root_2.crt, 
mozilla/Taiwan_GRCA.crt, mozilla/Thawte_Personal_Basic_CA.crt, 
mozilla/Thawte_Personal_Freemail_CA.crt, 
mozilla/Thawte_Personal_Premium_CA.crt, mozilla/Thawte_Premium_Server_CA.crt, 
mozilla/Thawte_Server_CA.crt, mozilla/Thawte_Time_Stamping_CA.crt, 
mozilla/UTN-USER_First-Network_Applications.crt, 
mozilla/UTN_DATACorp_SGC_Root_CA.crt, mozilla/UTN_USERFirst_Email_Root_CA.crt, 
mozilla/UTN_USERFirst_Hardware_Root_CA.crt, mozilla/ValiCert_Class_1_VA.crt, 
mozilla/ValiCert_Class_2_VA.crt, 
mozilla/VeriSign_Class_3_Public_Primary_Certification_Authority_-_G5.crt, 
mozilla/Verisign_Class_1_Public_Primary_Certification_Authority.crt, 
mozilla/Verisign_Class_1_Public_Primary_Certification_Authority_-_G2.crt, 
mozilla/Verisign_Class_1_Public_Primary_Certification_Authority_-_G3.crt, 
mozilla/Verisign_Class_2_Public_Primary_Certification_Authority.crt, 
mozilla/Verisign_Class_2_Public_Primary_Certification_Authority_-_G2.crt, 
mozilla/Verisign_Class_2_Public_Primary_Certification_Authority_-_G3.crt, 
mozilla/Verisign_Class_3_Public_Primary_Certification_Authority.crt, 
mozilla/Verisign_Class_3_Public_Primary_Certification_Authority_-_G2.crt, 
mozilla/Verisign_Class_3_Public_Primary_Certification_Authority_-_G3.crt, 
mozilla/Verisign_Class_4_Public_Primary_Certification_Authority_-_G2.crt, 
mozilla/Verisign_Class_4_Public_Primary_Certification_Authority_-_G3.crt, 
mozilla/Verisign_RSA_Secure_Server_CA.crt, 
mozilla/Verisign_Time_Stamping_Authority_CA.crt, 
mozilla/Visa_International_Global_Root_2.crt, mozilla/Visa_eCommerce_Root.crt, 
mozilla/WellsSecure_Public_Root_Certificate_Authority.crt, 
mozilla/Wells_Fargo_Root_CA.crt, mozilla/XRamp_Global_CA_Root.crt, 
mozilla/beTRUSTed_Root_CA-Baltimore_Implementation.crt, 
mozilla/beTRUSTed_Root_CA.crt, 
mozilla/beTRUSTed_Root_CA_-_Entrust_Implementation.crt, 
mozilla/beTRUSTed_Root_CA_-_RSA_Implementation.crt, 
mozilla/thawte_Primary_Root_CA.crt, signet.pl/signet_ca1_pem.crt, 
signet.pl/signet_ca2_pem.crt, signet.pl/signet_ca3_pem.crt, 
signet.pl/signet_ocspklasa2_pem.crt, signet.pl/signet_ocspklasa3_pem.crt, 
signet.pl/signet_pca2_pem.crt, signet.pl/signet_pca3_pem.crt, 
signet.pl/signet_rootca_pem.crt, signet.pl/signet_tsa1_pem.crt, 
spi-inc.org/spi-ca-2003.crt, spi-inc.org/spi-cacert-2008.crt, 
telesec.de/deutsche-telekom-root-ca-2.crt
  ca-certificates/new_crts:
  ca-certificates/trust_new_crts: yes



--- End Message ---
--- Begin Message ---
I cannot reproduce this, so closing.  We can certainly continue on this,
if needed.

-- 
Kind regards,
Michael Shuler


--- End Message ---

Reply via email to