--- Begin Message ---
Package: ca-certificates
Version: 20090814
Severity: normal
I can open https://twitter.com/ with iceweasel without any problem,
but both curl and wget fail:
$ curl https://twitter.com/
curl: (60) SSL certificate problem, verify that the CA cert is OK. Details:
error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify
failed
More details here: http://curl.haxx.se/docs/sslcerts.html
curl performs SSL certificate verification by default, using a "bundle"
of Certificate Authority (CA) public keys (CA certs). If the default
bundle file isn't adequate, you can specify an alternate file
using the --cacert option.
If this HTTPS server uses a certificate signed by a CA represented in
the bundle, the certificate verification probably failed due to a
problem with the certificate (it might be expired, or the name might
not match the domain name in the URL).
If you'd like to turn off curl's verification of the certificate, use
the -k (or --insecure) option.
$ wget https://twitter.com/
--2009-12-31 03:05:59-- https://twitter.com/
Resolving twitter.com... 168.143.162.52
Connecting to twitter.com|168.143.162.52|:443... connected.
ERROR: cannot verify twitter.com's certificate, issued by `/C=US/O=Equifax
Secure Inc./CN=Equifax Secure Global eBusiness CA-1':
Unable to locally verify the issuer's authority.
To connect to twitter.com insecurely, use `--no-check-certificate'.
A strace shows that curl tries to access /etc/ssl/certs/74c26bd0.0
and that wget tries to access /usr/lib/ssl/certs/74c26bd0.0, but
this file doesn't exist. It seems to correspond to the has for
Equifax_Secure_Global_eBusiness_CA-1.pem, which is not installed:
$ locate Equifax_Secure
/etc/ssl/certs/Equifax_Secure_CA.pem
/etc/ssl/certs/Equifax_Secure_eBusiness_CA_1.pem
/etc/ssl/certs/Equifax_Secure_eBusiness_CA_2.pem
/usr/share/ca-certificates/mozilla/Equifax_Secure_CA.crt
/usr/share/ca-certificates/mozilla/Equifax_Secure_Global_eBusiness_CA.crt
/usr/share/ca-certificates/mozilla/Equifax_Secure_eBusiness_CA_1.crt
/usr/share/ca-certificates/mozilla/Equifax_Secure_eBusiness_CA_2.crt
This is strange, because according to
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=534674
this certificate should be there (the bug is marked as fixed).
-- System Information:
Debian Release: squeeze/sid
APT prefers unstable
APT policy: (500, 'unstable'), (500, 'stable'), (1, 'experimental')
Architecture: amd64 (x86_64)
Kernel: Linux 2.6.31-1-amd64 (SMP w/2 CPU cores)
Locale: LANG=POSIX, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Versions of packages ca-certificates depends on:
ii debconf [debconf-2.0] 1.5.28 Debian configuration management sy
ii openssl 0.9.8k-7 Secure Socket Layer (SSL) binary a
ca-certificates recommends no packages.
ca-certificates suggests no packages.
-- debconf information:
ca-certificates/enable_crts: brasil.gov.br/brasil.gov.br.crt,
cacert.org/cacert.org.crt, debconf.org/ca.crt, gouv.fr/cert_igca_dsa.crt,
gouv.fr/cert_igca_rsa.crt,
mozilla/ABAecom_=sub.__Am._Bankers_Assn.=_Root_CA.crt,
mozilla/AOL_Time_Warner_Root_Certification_Authority_1.crt,
mozilla/AOL_Time_Warner_Root_Certification_Authority_2.crt,
mozilla/AddTrust_External_Root.crt,
mozilla/AddTrust_Low-Value_Services_Root.crt,
mozilla/AddTrust_Public_Services_Root.crt,
mozilla/AddTrust_Qualified_Certificates_Root.crt,
mozilla/America_Online_Root_Certification_Authority_1.crt,
mozilla/America_Online_Root_Certification_Authority_2.crt,
mozilla/Baltimore_CyberTrust_Root.crt,
mozilla/COMODO_Certification_Authority.crt,
mozilla/COMODO_ECC_Certification_Authority.crt,
mozilla/Camerfirma_Chambers_of_Commerce_Root.crt,
mozilla/Camerfirma_Global_Chambersign_Root.crt,
mozilla/Certplus_Class_2_Primary_CA.crt, mozilla/Certum_Root_CA.crt,
mozilla/Comodo_AAA_Services_root.crt, mozilla/Comodo_Secure_Services_root.crt,
mozilla/Comodo_Trusted_Services_root.crt, mozilla/DST_ACES_CA_X6.crt,
mozilla/DST_Root_CA_X3.crt, mozilla/DigiCert_Assured_ID_Root_CA.crt,
mozilla/DigiCert_Global_Root_CA.crt,
mozilla/DigiCert_High_Assurance_EV_Root_CA.crt, mozilla/DigiNotar_Root_CA.crt,
mozilla/Digital_Signature_Trust_Co._Global_CA_1.crt,
mozilla/Digital_Signature_Trust_Co._Global_CA_2.crt,
mozilla/Digital_Signature_Trust_Co._Global_CA_3.crt,
mozilla/Digital_Signature_Trust_Co._Global_CA_4.crt,
mozilla/Entrust.net_Global_Secure_Personal_CA.crt,
mozilla/Entrust.net_Global_Secure_Server_CA.crt,
mozilla/Entrust.net_Premium_2048_Secure_Server_CA.crt,
mozilla/Entrust.net_Secure_Personal_CA.crt,
mozilla/Entrust.net_Secure_Server_CA.crt,
mozilla/Entrust_Root_Certification_Authority.crt,
mozilla/Equifax_Secure_CA.crt, mozilla/Equifax_Secure_eBusiness_CA_1.crt,
mozilla/Equifax_Secure_eBusiness_CA_2.crt,
mozilla/Firmaprofesional_Root_CA.crt, mozilla/GTE_CyberTrust_Global_Root.crt,
mozilla/GTE_CyberTrust_Root_CA.crt, mozilla/GeoTrust_Global_CA.crt,
mozilla/GeoTrust_Global_CA_2.crt,
mozilla/GeoTrust_Primary_Certification_Authority.crt,
mozilla/GeoTrust_Universal_CA.crt, mozilla/GeoTrust_Universal_CA_2.crt,
mozilla/GlobalSign_Root_CA.crt, mozilla/GlobalSign_Root_CA_-_R2.crt,
mozilla/Go_Daddy_Class_2_CA.crt, mozilla/IPS_CLASE1_root.crt,
mozilla/IPS_CLASE3_root.crt, mozilla/IPS_CLASEA1_root.crt,
mozilla/IPS_CLASEA3_root.crt, mozilla/IPS_Chained_CAs_root.crt,
mozilla/IPS_Servidores_root.crt, mozilla/IPS_Timestamping_root.crt,
mozilla/NetLock_Business_=Class_B=_Root.crt,
mozilla/NetLock_Express_=Class_C=_Root.crt,
mozilla/NetLock_Notary_=Class_A=_Root.crt,
mozilla/NetLock_Qualified_=Class_QA=_Root.crt,
mozilla/Network_Solutions_Certificate_Authority.crt,
mozilla/QuoVadis_Root_CA.crt, mozilla/QuoVadis_Root_CA_2.crt,
mozilla/QuoVadis_Root_CA_3.crt, mozilla/RSA_Root_Certificate_1.crt,
mozilla/RSA_Security_1024_v3.crt, mozilla/RSA_Security_2048_v3.crt,
mozilla/SecureTrust_CA.crt, mozilla/Secure_Global_CA.crt,
mozilla/Security_Communication_Root_CA.crt, mozilla/Sonera_Class_1_Root_CA.crt,
mozilla/Sonera_Class_2_Root_CA.crt, mozilla/Staat_der_Nederlanden_Root_CA.crt,
mozilla/Starfield_Class_2_CA.crt, mozilla/StartCom_Certification_Authority.crt,
mozilla/StartCom_Ltd..crt, mozilla/SwissSign_Gold_CA_-_G2.crt,
mozilla/SwissSign_Platinum_CA_-_G2.crt, mozilla/SwissSign_Silver_CA_-_G2.crt,
mozilla/Swisscom_Root_CA_1.crt,
mozilla/TC_TrustCenter__Germany__Class_2_CA.crt,
mozilla/TC_TrustCenter__Germany__Class_3_CA.crt,
mozilla/TDC_Internet_Root_CA.crt, mozilla/TDC_OCES_Root_CA.crt,
mozilla/TURKTRUST_Certificate_Services_Provider_Root_1.crt,
mozilla/TURKTRUST_Certificate_Services_Provider_Root_2.crt,
mozilla/Taiwan_GRCA.crt, mozilla/Thawte_Personal_Basic_CA.crt,
mozilla/Thawte_Personal_Freemail_CA.crt,
mozilla/Thawte_Personal_Premium_CA.crt, mozilla/Thawte_Premium_Server_CA.crt,
mozilla/Thawte_Server_CA.crt, mozilla/Thawte_Time_Stamping_CA.crt,
mozilla/UTN-USER_First-Network_Applications.crt,
mozilla/UTN_DATACorp_SGC_Root_CA.crt, mozilla/UTN_USERFirst_Email_Root_CA.crt,
mozilla/UTN_USERFirst_Hardware_Root_CA.crt, mozilla/ValiCert_Class_1_VA.crt,
mozilla/ValiCert_Class_2_VA.crt,
mozilla/VeriSign_Class_3_Public_Primary_Certification_Authority_-_G5.crt,
mozilla/Verisign_Class_1_Public_Primary_Certification_Authority.crt,
mozilla/Verisign_Class_1_Public_Primary_Certification_Authority_-_G2.crt,
mozilla/Verisign_Class_1_Public_Primary_Certification_Authority_-_G3.crt,
mozilla/Verisign_Class_2_Public_Primary_Certification_Authority.crt,
mozilla/Verisign_Class_2_Public_Primary_Certification_Authority_-_G2.crt,
mozilla/Verisign_Class_2_Public_Primary_Certification_Authority_-_G3.crt,
mozilla/Verisign_Class_3_Public_Primary_Certification_Authority.crt,
mozilla/Verisign_Class_3_Public_Primary_Certification_Authority_-_G2.crt,
mozilla/Verisign_Class_3_Public_Primary_Certification_Authority_-_G3.crt,
mozilla/Verisign_Class_4_Public_Primary_Certification_Authority_-_G2.crt,
mozilla/Verisign_Class_4_Public_Primary_Certification_Authority_-_G3.crt,
mozilla/Verisign_RSA_Secure_Server_CA.crt,
mozilla/Verisign_Time_Stamping_Authority_CA.crt,
mozilla/Visa_International_Global_Root_2.crt, mozilla/Visa_eCommerce_Root.crt,
mozilla/WellsSecure_Public_Root_Certificate_Authority.crt,
mozilla/Wells_Fargo_Root_CA.crt, mozilla/XRamp_Global_CA_Root.crt,
mozilla/beTRUSTed_Root_CA-Baltimore_Implementation.crt,
mozilla/beTRUSTed_Root_CA.crt,
mozilla/beTRUSTed_Root_CA_-_Entrust_Implementation.crt,
mozilla/beTRUSTed_Root_CA_-_RSA_Implementation.crt,
mozilla/thawte_Primary_Root_CA.crt, signet.pl/signet_ca1_pem.crt,
signet.pl/signet_ca2_pem.crt, signet.pl/signet_ca3_pem.crt,
signet.pl/signet_ocspklasa2_pem.crt, signet.pl/signet_ocspklasa3_pem.crt,
signet.pl/signet_pca2_pem.crt, signet.pl/signet_pca3_pem.crt,
signet.pl/signet_rootca_pem.crt, signet.pl/signet_tsa1_pem.crt,
spi-inc.org/spi-ca-2003.crt, spi-inc.org/spi-cacert-2008.crt,
telesec.de/deutsche-telekom-root-ca-2.crt
ca-certificates/new_crts:
ca-certificates/trust_new_crts: yes
--- End Message ---