On 10/7/23 23:33, Tony Cook wrote:
> On Sat, Oct 07, 2023 at 10:37:36PM -0400, James E Keenan wrote:
>> The only thing which I think is different from my last CPAN upload is that >> about a month ago I upgraded my server from http:// to https://. I have not >> encountered any problems with the server since then. The file permissions
>> on the tarballs I was trying to upload are 0644 -- same as all the other
>> dozens of tarballs I've uploaded from that server.
>>
>> Any ideas as to why I could not upload from my server (for the first time in
>> 18 years!)?
>
> For some reason it can't verify the certificate:
>
> 2023-10-08 02:47:59 $$1354 v1049: Alert: nosuccesscount[10] error[Can't connect to thenceforward.net:443 (certificate verify failed)] (paused:708)
>
> You might try testing your site with:
>
> https://www.ssllabs.com/ssltest/
>
> which will detect problems that might not show in a browser.

When I switched from http:// to https:// in late September, I performed that ssltest on each of the three hosts I run off this machine/IP address. Two of the three hosts were graded 'A'; one (which is not as important) was graded 'A' but only for IPv4.

####
https://www.ssllabs.com/ssltest/analyze.html?d=thenceforward.net  A
https://www.ssllabs.com/ssltest/analyze.html?d=jamesekeenan.com   A
https://www.ssllabs.com/ssltest/analyze.html?d=lerner-minsky.org A only on ipv4
####

I re-performed these tests this morning. In my first pass for thenceforward.net (which is the hostname PAUSE would have been looking for), the test hung indefinitely showing an ever spinning spike-wheel and "Please wait...Testing NPN"

My first pass for jamesekeenan.com got farther in the process. After about 10 minutes it was still at: "Please wait... 95% complete Simulating handshakes". The process then appeared to hang indefinitely.

I hit the Clear Cache process and started anew testing thenceforward.net. This time the process gave me an Overall Rating of 'A' (better than google.com!) along with a wealth of other data, most of which did not seem anomalous. In what follows I'm only pointing out those anomalies:

#####
Certificate #1: EC 256 bits (SHA256withRSA): Only thing which looks anomalous is: "DNS CAA No (more info)"

Subject         thenceforward.net
Fingerprint SHA256: d71a64c0cb54787620cf4341ae28041b7e1b1d173785443337bbb2eb4d2923cb
Pin SHA256: P5vJZqpxQIYZPF3D8iMCtr5q/3eE6XlQyzK/IWnm60U=
Common names    thenceforward.net
Alternative names       thenceforward.net www.thenceforward.net
Serial Number   041ea3bd1884e0f09546ccd19e8b061c6588

Additional certificates (if supplied): R3 no anomalies. ISRG Root X1 no anomalies.

Certification Paths:

Mozilla / Apple / Java

Path #1: Trusted: no anomalies

Path #2: Not trusted (path does not chain to a trusted anchor): DST Root CA X3 Self-signed * This is described as Extra download; Not in trust store. RSA 2048 bits (e 65537) / SHA1withRSA
Valid until: Thu, 30 Sep 2021 14:01:15 UTC
EXPIRED
Weak or insecure signature, but no impact on root certificate

Android / Windows

RSA 2048 bits is in trust store but has expired

Certificate #2: EC 256 bits (SHA256withRSA) No SNI

Subject         jamesekeenan.com
Fingerprint SHA256: e64efa87924731fb4e7e1e893e61b46e1745299f249d5186c6dfe638f6d75df3
Pin SHA256: OonVyaTHdqBFC4MU4xN3fEko/1BdMoqGNswfbXx8DGI=
Common names    jamesekeenan.com
Alternative names       jamesekeenan.com www.jamesekeenan.com   MISMATCH
#####   

>
> It might be the host performing the fetch is missing the root
> certificate needed for your LetsEncrypt certificate, but ssltest is
> the place to start.
>

Is there any indication in the data above to support that hypothesis? If not, where do we go from here?

> Tony

Thank you very much for taking the time to review this problem.

Jim Keenan

Reply via email to