-
Notifications
You must be signed in to change notification settings - Fork 66
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
x509: certificate signed by unknown authority #88
Comments
@rsouthgate, |
@eyalbe4 I think that is talking about client creds. I'm talking about the SSL cert used for our domain... https://www.ourdomain.com/arifactory. In this instance the SSL cert has a root cert authority that is also 'us'. For a bunch of other system that ultimately rely on this root cert I have had to add it to trusted profiles - like in java I add it to the keystore so javacan do the SSL handshake with hosts that use it. |
Deprecated task |
@dfal and @rsouthgate, |
@eyalbe4 , yes I can constantly reproduce it starting with oldest available for download version 1.13.0 up to the latest one. |
@dfal, curl --cacert cacert.pem .... does it works for you? |
@eyalbe4 This might be two distinct issues. From my perspective I did some more digging around our cert chain via openssl and discovered the cert was only providing the end part of the chain with a feature call Authority Information Access which allows browsers to discover the rest of the cert (and was the reason why I assumed our cert was valid. More info in the accepted answer here https://stackoverflow.com/questions/7587851/openssl-unable-to-verify-the-first-certificate-for-experian-url But the short answer is once we switched to a full chain cert the issue was resolved. The longer answer might be that the CLI could benefit from the same discovery features as implemented by browsers but I assume that is actually a language feature and not something you can build on top. |
Great finding @rsouthgate and thanks so much for sharing this information! Following your finding, I came across golang/go#31773 which proposes adding Authority Information Access to Go. If added, we'd sure like to add it to JFrog CLI. @dfal - could this be the cause of your issue as well? |
@eyalbe4 , probably yes. But which version of jfrog CLI is used by deprecated |
@dfal - it used version 1.4.1 released in July 2016. |
@dfal, |
This seems similar to already closed issue #44 But specifically I cannot get the agent to respect our company root cert (not self-signed).
I have added the root cert to ~/.jfrog/security for the user under which the agent is running and also to /path_to_agent/_work/_jfrog/.jfrog/security
I am not sure of the correct format for the root cert so I've added the .cer, .pem and .der.
As far as I can tell the CLI is Go and Go should respect the keychain anyway (the root cert is added to the keychain and always trusted).
Regardless of what I do I get the error: x509: certificate signed by unknown authority.
Version 1.6.2
jfrog CLI version: 1.26.2
Full log with some info redacted:
The text was updated successfully, but these errors were encountered: