On Mon, Dec 09, 2024 at 02:21:41PM +0000, Stuart Cassoff wrote:
> $ cd /usr/ports/x11/dbus-tcl && make fetch
> ===>  Checking files for dbus-tcl-3.1
> >> Fetch https://chiselapp.com/user/schelte/repository/dbus/uv/dbus-3.1.tar.gz
> TLS handshake failure: certificate verification failed: unable to get local 
> issuer certificate
> >> Fetch https://ftp.openbsd.org/pub/OpenBSD/distfiles/dbus-3.1.tar.gz
> dbus-3.1.tar.gz
> 100% | 
> ***********************************************************************************************|
>    158 KB    00:00
> 

As you can see from the output of openssl s_client -connect chiselapp.com:433,
it sends the wrong intermediate in its cert chain:

Certificate chain
 0 s:/CN=chiselapp.com
   i:/C=US/O=Let's Encrypt/CN=R10
 1 s:/C=US/O=Let's Encrypt/CN=R11
   i:/C=US/O=Internet Security Research Group/CN=ISRG Root X1
 2 s:/C=US/O=Internet Security Research Group/CN=ISRG Root X1
   i:/C=US/O=Internet Security Research Group/CN=ISRG Root X1

The issuer of cert 0 is R10, but it sends R11.

This should be fixed by the server operator.

> The site has a valid Letsencrypt cert, according to Firefox and Chrome.

The cert is indeed valid if you have R10 available.

I suspect chrome and firefox have the LE intermediates baked in (or go
fetch it from the Authority Info Access extension) so as to be able to
cope with such misconfigurations.

> I could add this to the port:
> FETCH_CMD = /usr/bin/ftp -V ${_PROGRESS} -C -S dont
> But I doubt that's recommended or desired.
> 
> Any help with this would be greatly appreciated.
> 
> 
> Stu
> 

Reply via email to