Arjan,
This is an upstream bug. Please leave a comment here[1]. There has been
no progress (nor ack's) from the php team regarding this bug.
Scott
--
[1] http://bugs.php.net/bug.php?id=52106
--
fopen fails on some SSL urls
https://bugs.launchpad.net/bugs/592442
You received this bug
Arjan,
This is an upstream bug. Please leave a comment here[1]. There has been
no progress (nor ack's) from the php team regarding this bug.
Scott
--
[1] http://bugs.php.net/bug.php?id=52106
--
fopen fails on some SSL urls
https://bugs.launchpad.net/bugs/592442
You received this bug
An update... I've discovered that the cas.ucdavis.edu machine does not
correctly deal with fragmented IP packets. I thought this might be the
problem but then I went looking for those types of packets and found
none (I'll still try to get that fixed though).
Then I discovered that on the client
An update... I've discovered that the cas.ucdavis.edu machine does not
correctly deal with fragmented IP packets. I thought this might be the
problem but then I went looking for those types of packets and found
none (I'll still try to get that fixed though).
Then I discovered that on the client
I've filed a bug report at bugs.php.net[1] and linked to this bug
report.
I'll ask for more details about this specific server. I tried a bunch of
other sites with a similar setup but can't reproduce it elsewhere yet.
Maybe there is a firewall rule that is blocking packets? Seems strange
that it
I've filed a bug report at bugs.php.net[1] and linked to this bug
report.
I'll ask for more details about this specific server. I tried a bunch of
other sites with a similar setup but can't reproduce it elsewhere yet.
Maybe there is a firewall rule that is blocking packets? Seems strange
that it
This is strange... on lucid it doesn't even attempt to check for the CA
file. Using the script you provided on a Karmic machine I get the
following:
now cas.ucdavis.edu...
open(/etc/host.conf, O_RDONLY)= 3
open(/etc/resolv.conf, O_RDONLY) = 3
open(/etc/hosts, O_RDONLY|O_CLOEXEC) = 3
This is strange... on lucid it doesn't even attempt to check for the CA
file. Using the script you provided on a Karmic machine I get the
following:
now cas.ucdavis.edu...
open(/etc/host.conf, O_RDONLY)= 3
open(/etc/resolv.conf, O_RDONLY) = 3
open(/etc/hosts, O_RDONLY|O_CLOEXEC) = 3
I noticed that too. The necessary CAs are actually installed on Lucid by
default though (you just have to tell openssl where to look).
Incidentally, wget works fine (without --no-check-certificate):
$ openssl s_client -CApath /etc/ssl/certs -connect cas.ucdavis.edu:443
CONNECTED(0003)
depth=1
** Attachment added: tcpdump of a php run with two fopen() calls to remote
https servers
http://launchpadlibrarian.net/50098267/out.dump
--
fopen fails on some SSL urls
https://bugs.launchpad.net/bugs/592442
You received this bug notification because you are a member of Ubuntu
Server Team,
Public bug reported:
Binary package hint: php5
Description:Ubuntu 10.04 LTS
Release:10.04
php5:
Installed: 5.3.2-1ubuntu4.2
Candidate: 5.3.2-1ubuntu4.2
Version table:
*** 5.3.2-1ubuntu4.2 0
500 http://archive.ubuntu.com/ubuntu/ lucid-updates/main Packages
100
I noticed that too. The necessary CAs are actually installed on Lucid by
default though (you just have to tell openssl where to look).
Incidentally, wget works fine (without --no-check-certificate):
$ openssl s_client -CApath /etc/ssl/certs -connect cas.ucdavis.edu:443
CONNECTED(0003)
depth=1
** Attachment added: tcpdump of a php run with two fopen() calls to remote
https servers
http://launchpadlibrarian.net/50098267/out.dump
--
fopen fails on some SSL urls
https://bugs.launchpad.net/bugs/592442
You received this bug notification because you are a member of Ubuntu
Bugs, which
Public bug reported:
Binary package hint: php5
Description:Ubuntu 10.04 LTS
Release:10.04
php5:
Installed: 5.3.2-1ubuntu4.2
Candidate: 5.3.2-1ubuntu4.2
Version table:
*** 5.3.2-1ubuntu4.2 0
500 http://archive.ubuntu.com/ubuntu/ lucid-updates/main Packages
100
Oops I noticed an error in an openssl command above. It should read as
follows:
$ openssl verify -CAfile /etc/pki/CA/cacert.pem /etc/pki/libvirt/clientcert.pem
/etc/pki/libvirt/clientcert.pem: OK
$
Sorry, I was playing with the client cert location. As you can see the
clientcert.pem is valid.
Public bug reported:
Binary package hint: libvirt-bin
I'm having a problem with remote TLS libvirt connections from a jaunty
client. I just upgraded my client to jaunty from Intrepid and I can no
longer connect to hardy or intrepid libvirt servers that have TLS
enabled. I get the following
Public bug reported:
Binary package hint: virt-viewer
I'm on an up-to-date Intrepid x86_64 and have version 0.0.3-2ubuntu1 of
virt-viewer installed.
I've set up a remote server (QEMU) with the following options:
vnc_listen = 0.0.0.0
vnc_tls = 1
vnc_tls_x509_verify = 1
When I start a VM and
17 matches
Mail list logo