maemo.org Bugzilla – Bug 9355
OpenSSL certificate store not integrated with maemosec's
Last modified: 2014-03-08 10:28:13 UTC
You need to log in before you can comment on or make changes to this bug.
(Forking from bug 9262). SOFTWARE VERSION: 3.2010.02-8 EXACT STEPS LEADING TO PROBLEM: Example 1: 1. Configure a Jabber IM account to a server that requires SSL or TLS and has a certificate signed by one of the pre-installed authorities, or a user-installed one. 2. Make sure the Advanced -> Ignore SSL certificate errors option it disabled. 3. Try to connect. Example 2: 1. Install wget. 2. Start terminal or ssh session. 3. Run "wget https://mail.google.com". EXPECTED OUTCOME: Successful certificate verification and connection. ACTUAL OUTCOME: Connection fails with a certificate verification error. REPRODUCIBILITY: Always. OTHER COMMENTS: Fixed (thanks to Juhani) by setting SSL_CERT_DIR=/etc/certs/common-ca:/home/user/.maemosec-certs/ssl-ca in the environment somewhere early in the startup process. I put it in a new file (/etc/osso-af-init/ssl.defs) and "source_if_is" it in /etc/osso-af-init/af-defines.sh so it's also set for stuff that runs outside the X session like ssh logins.
There is one complication: /home/user/.maemosec-certs/ssl-ca and its parent directory are owned by user:users and mode 0700, so non-user processes (including root) can't read user-installed certificates. Since only public server/authority certificates will ever go there (I don't have any personal certificates, but I assume these would go in ssl-user, right?), could the permissions be relaxed to 0755?
(In reply to comment #1) > There is one complication: /home/user/.maemosec-certs/ssl-ca and its parent > directory are owned by user:users and mode 0700, so non-user processes > (including root) can't read user-installed certificates. > Since only public server/authority certificates will ever go there (I don't > have any personal certificates, but I assume these would go in ssl-user, > right?), could the permissions be relaxed to 0755? Sounds reasonable, although surely root can read these directories regardless of their permission.
You are right about root of course, my confusion (I was experimenting with a daemon that tries to verify certificates after dropping privileges).
I have the same symptoms. You can see that the certificate for my jabber server is valid by using a web client such as Firefox: https://benoy.name:5223/ However, I get a 'Certificate error' when I try to establish an SSL connection to that jabber server with my N900. I'm using an x509v3 certificate though, so the common name doesn't match 'benoy.name', and matches an entry in 'x509v3 Subject Alternative Name' instead. So I was thinking it might be that. How can I determine whether I have the same bug described here, or if I should file a separate bug report?
(In reply to comment #4) > How can I determine whether I have the same bug described here, or if I should > file a separate bug report? Have you tried doing what Lucas did: export SSL_CERT_DIR=/etc/certs/common-ca:/home/user/.maemosec-certs/ssl-ca in a new file (/etc/osso-af-init/ssl.defs) and "source_if_is" it in /etc/osso-af-init/af-defines.sh, then reboot. If you still get the same error it's probable that the IM client doesn't search from alternative names. Then I would suggest filing a new bug.
(In reply to comment #5) > (In reply to comment #4) > > How can I determine whether I have the same bug described here, or if I should > > file a separate bug report? Thanks Juhani. I used Lucas's workaround, and I was able to verify that it was working by using the 'wget' command example he gave. However, it's still not recognizing my XMPP certificate. Bug #10362 opened.
*** Bug 11035 has been marked as a duplicate of this bug. ***