On Sat, Apr 02, 2011 at 12:42:04AM +0200, Roberto Nunnari wrote:
> Istv??n wrote:
> >work:
> >
> > without the following error => "verify error:num=20:unable to get local
> >issuer certificate"
> 
> Hi.
> It works for me if you correct the sed command and suppress sdterr..

Well, I cleaned that up, too.

That you got this same command to work implies you have a different
set of CAs than I.

His point (someone please correct me, if neccessary) is that without
what he considers a reasonable set of trusted CAs in place, SSL under
FreeBSD is 'broken'.

I interpret this thread now to be a debate of terms 'reasonable'
and 'trusted', and further, who's responsibility is it to populate
that list of CAs on his machine.

> $ uname -rms
> FreeBSD 6.4-RELEASE-p8 i386
> $ openssl s_client -connect 72.21.203.148:443 2>/dev/null < /dev/null | 
> sed -ne /-BEGIN\ CERTIFICATE-/,/-END\ CERTIFICATE-/p |openssl x509 
> -noout -subject -dates
> subject= /C=US/ST=Washington/L=Seattle/O=Amazon.com Inc./CN=s3.amazonaws.com
> notBefore=Oct  8 00:00:00 2010 GMT
> notAfter=Oct  7 23:59:59 2013 GMT
> 
> So, it seems to be just a RexExp error..
> 
> Best regards.
> Robi

-- 
Brian Reichert                          <reich...@numachi.com>
BSD admin/developer at large    
_______________________________________________
freebsd-security@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-security
To unsubscribe, send any mail to "freebsd-security-unsubscr...@freebsd.org"

Reply via email to