![]() I also tried to use the -ca-certificate but got the same error. To connect to graphite.local insecurely, use `-no-check-certificate'. connected.ĮRROR: cannot verify graphite.local's certificate, issued by `xxx': Resolving graphite.local (graphite.local). ![]() Strict-Transport-Security: max-age=15768000 Lrwxrwxrwx 1 root root 50 Mar 11 05:27 our_own_ca.pem -> /usr/local/share/ca-certificates/our_own_ca.crt Lrwxrwxrwx 1 root root 17 Mar 11 05:27 dc79b3f0.0 -> our_own_ca.pem Message:Īfter that, we have something like belows in /etc/ssl/certs: lrwxrwxrwx 1 root root 17 Mar 11 05:27 99ff557c.0 -> our_own_ca.pem Warning: there was a problem reading the certificate file /etc/ssl/certs/our_own_ca.pem. Running hooks in /etc/ca-certificates/update.d. Here's the output: Updating certificates in /etc/ssl/certs. However, I'd like to avoid that because it is (1) insecure, and (2) a hassle. As the error message suggests, I can work around the problem by including the -no-check-certificate parameter with my command. Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells With over 10 pre-installed distros to choose from, the worry-free installation life is here Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use. To install this CA into the trusted store, according to /usr/share/doc/ca-certificates/README.Debian, I just need to copy it to the /usr/local/share/ca-certificates/, then run update-ca-certificates. To connect to insecurely, use -no-check-certificate'. Looking at the certificate shows me: openssl sclient -connect :443 openssl. To avoid any possible recursion, replace wget in the function body by (which wget) when you declare the function definition. To connect to insecurely, use -no-check-certificate. With: our_own_ca_chained.crt = + own_own_ca.crt You have got the right basic idea, but there are some changes to be made:- Put the options first, including -no-check-certificate, before any URLs. Ssl_client_certificate /etc/ssl/certs/our_own_ca_chained.crt Nginx configuration: ssl_certificate /etc/ssl/certs/ Concatenate that cert and the CA cert into a bundle file.generate a certificate which is signed with the above CA ( ). ![]() This entry was posted in Android, Computers, Linux, software, Windows XP by Joe Wein.
0 Comments
Leave a Reply. |