-
-
Notifications
You must be signed in to change notification settings - Fork 129
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Valid certificates not accepted on Rocky Linux 9 #143
Comments
I have the same problem on Fedora 39. |
Did you install the |
There are no package called Did you see my bug report? The OS has CA certificates. It can check that the Google certificate is OK. EDIT: Removed last part which was confusing/misleading - sry about that. |
Maybe this is related: alexcrichton/openssl-probe#24 ... ? How to set CA path if openssl-probe does not work? |
It is not possible to configure it. Could you try on a Debian system and see how it behaves? Or maybe just symlink the bundle path to another one it’d accept. |
There are no issues when using Debian, however Debian is not always an option which is the case here. Which path should i symlink? Where does it look for for the CA trust chain? |
I have no knowledge of your distribution, but in Debian it's all stored in |
I think you misunderstood me. I do know where the CA certificates are in Rocky Linux/Fedora/Red Hat are, I am not asking for your help to find them in "my distro". What I do NOT know is where vigil is looking for them. I have the certificates and I have vigil, what can I do to make vigil know where to look for those certificates? You suggested a symbolic link. As I understood it I could make a symbolic link from wherever vigil is looking to the path in "my distro". Do I have to use |
I don't know either. This is done by It does look at: https://github.com/alexcrichton/openssl-probe/blob/master/src/lib.rs#L24 |
Hmm. The correct path with the certificate is included in that list. Why does it not work then? I guess I'll have to investigate here... |
Minor update: I am fairly certain that
|
Update: I found https://docs.rs/reqwest/0.11.24/reqwest/#optional-features If I change from Still investigating... |
The issue is the If I remove vendored from
@valeriansaliou Why do you use vendored? As far as I can tell using vendored also locks the OpenSSL version so it does not get any patches the OS might get. |
I'm using Also, I cannot depend on the system-installed OpenSSL for the same reason. I'd therefore recommend that in your case, you produce a build of Vigil that's not using the Thanks for investigating this! |
I think I'll go with a slightly customized build for my needs then. I hope I can get I found an issue where they had issues when they did not use cargo to run their program because cargo apparently uses Compiling with MUSL was something I had not considered, but also not relevant for the way I want to use vigil (at least not right now). I think this is resolved enough to close this issue. If I figure out I need some way to pass options along to the |
@valeriansaliou I noticed that |
|
Ok, fair point. The reason I'm just wondering why your |
Hi,
This issue is in part related to #104
Vigil is not able to validate certificate for valid websites. The issue must be that it is not looking for the CA trust chain in the right place. I have not found a way to configure where Vigil is looking for the CA store, and that should not really be needed anyway.
OS is Rocky Linux 9 on a Hetzner VM
Vigil is installed with cargo and running via systemd.
My samle config is:
This is my debug log:
The error message
unable to get local issuer certificate
properly originate from openssl, but when I run google.com manually the OS is accepting the certificate.I get the same certificate error on more than one Rocky Linux installation. I've never had any issues with certificate validation when running vigil on Debian.
Thanks in advance!
Best regards,
Emil Kristensen
The text was updated successfully, but these errors were encountered: