[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[gnurl] 322/411: FAQ: refresh "Why do I get "certificate verify failed"
From: |
gnunet |
Subject: |
[gnurl] 322/411: FAQ: refresh "Why do I get "certificate verify failed" |
Date: |
Wed, 13 Jan 2021 01:22:17 +0100 |
This is an automated email from the git hooks/post-receive script.
nikita pushed a commit to branch master
in repository gnurl.
commit 3864ad37e183b0b4a3ca345a220e54c88a71dd80
Author: Daniel Stenberg <daniel@haxx.se>
AuthorDate: Fri Nov 6 09:16:06 2020 +0100
FAQ: refresh "Why do I get "certificate verify failed"
Add more details, remove references to ancient curl version.
---
docs/FAQ | 47 ++++++++++++++++++++++++++---------------------
1 file changed, 26 insertions(+), 21 deletions(-)
diff --git a/docs/FAQ b/docs/FAQ
index e1b4b777c..d2da12e64 100644
--- a/docs/FAQ
+++ b/docs/FAQ
@@ -913,27 +913,32 @@ FAQ
4.12 Why do I get "certificate verify failed" ?
- You invoke curl 7.10 or later to communicate on a https:// URL and get an
- error back looking something similar to this:
-
- curl: (35) SSL: error:14090086:SSL routines:
- SSL3_GET_SERVER_CERTIFICATE:certificate verify failed
-
- Then it means that curl couldn't verify that the server's certificate was
- good. curl verifies the certificate using the CA cert bundle that comes with
- the curl installation.
-
- To disable the verification (which makes it act like curl did before 7.10),
- use -k. This does however enable man-in-the-middle attacks.
-
- If you get this failure but are having a CA cert bundle installed and used,
- the server's certificate is not signed by one of the CA's in the bundle. It
- might for example be self-signed. You then correct this problem by obtaining
- a valid CA cert for the server. Or again, decrease the security by disabling
- this check.
-
- Details are also in the SSLCERTS file in the release archives, found online
- here: https://curl.se/docs/sslcerts.html
+ When you invoke curl and get an error 60 error back it means that curl
+ couldn't verify that the server's certificate was good. curl verifies the
+ certificate using the CA cert bundle and verifying for which names the
+ certficiate has been granted.
+
+ To completely disable the certficiate verification, use -k. This does
+ however enable man-in-the-middle attacks and makes the transfer INSECURE.
+ We strongly advice against doing this for more than experiments.
+
+ If you get this failure with a CA cert bundle installed and used, the
+ server's certificate might not be signed by one of the CA's in yout CA
+ store. It might for example be self-signed. You then correct this problem by
+ obtaining a valid CA cert for the server. Or again, decrease the security by
+ disabling this check.
+
+ At times, you find that the verification works in your favorite browser but
+ fails in curl. When this happens, the reason is usually that the server
+ sends an incomplete cert chain. The server is mandated to send all
+ "intermediate certificates" but doesn't. This typically works with browsers
+ anyway since they A) cache such certs and B) supports AIA which downloads
+ such missing certificates on demand. This is a server misconfiguration. A
+ good way to figure out if this is the case it to use the SSL Labs server
+ test and check the certificate chain: https://www.ssllabs.com/ssltest/
+
+ Details are also in the SSLCERTS.md document, found online here:
+ https://curl.se/docs/sslcerts.html
4.13 Why is curl -R on Windows one hour off?
--
To stop receiving notification emails like this one, please contact
gnunet@gnunet.org.
- [gnurl] 238/411: THANKS: from 7.73.0 and .mailmap fixes, (continued)
- [gnurl] 238/411: THANKS: from 7.73.0 and .mailmap fixes, gnunet, 2021/01/12
- [gnurl] 340/411: release-notes.pl: detect #[number] better for Ref: etc, gnunet, 2021/01/12
- [gnurl] 352/411: KNOWN_BUGS: cmake: libspsl is not supported, gnunet, 2021/01/12
- [gnurl] 284/411: tool_operate: bail out proper on errors for parallel setup, gnunet, 2021/01/12
- [gnurl] 288/411: acinclude: detect manually set minimum macos/ipod version, gnunet, 2021/01/12
- [gnurl] 375/411: test506: make it not run in c-ares builds, gnunet, 2021/01/12
- [gnurl] 306/411: rtsp: error out on empty Session ID, unified the code, gnunet, 2021/01/12
- [gnurl] 266/411: KNOWN_BUGS: mention the individual cmake issues, gnunet, 2021/01/12
- [gnurl] 362/411: KNOWN_BUGS: wakeup socket disconnect causes havoc, gnunet, 2021/01/12
- [gnurl] 317/411: FAQ: refreshed, gnunet, 2021/01/12
- [gnurl] 322/411: FAQ: refresh "Why do I get "certificate verify failed",
gnunet <=
- [gnurl] 302/411: RELEASE-NOTES: synced, gnunet, 2021/01/12
- [gnurl] 267/411: libssh2: require version 1.0 or later, gnunet, 2021/01/12
- [gnurl] 286/411: RELEASE-NOTES: synced, gnunet, 2021/01/12
- [gnurl] 308/411: KNOWN_BUGS: LDAPS with NSS is slow, gnunet, 2021/01/12
- [gnurl] 299/411: hsts: add support for Strict-Transport-Security, gnunet, 2021/01/12
- [gnurl] 300/411: hsts: add read/write callbacks, gnunet, 2021/01/12
- [gnurl] 320/411: url: make sure an HSTS upgrade updates URL and scheme correctly, gnunet, 2021/01/12
- [gnurl] 369/411: examples: update .gitignore, gnunet, 2021/01/12
- [gnurl] 328/411: examples/httpput: remove use of CURLOPT_PUT, gnunet, 2021/01/12
- [gnurl] 325/411: configure: pass -pthread to Libs.private for pkg-config, gnunet, 2021/01/12