USING: kernel http.client urls.secure ;
IN: test-vocab

"https://ipv4.tunnelbroker.net"; http-get

throws a Common name verification failed exception with

   expected: "ipv4.tunnelbroker.net"
   got:      "tunnelbroker.net"

Firefox, openssl s_client, gnutls-cli all seem happy with this
situation.  I wonder if something about ssl CN validation has changed.

Is there any way to bypass this check (even possibly for this specific
case) short of just editing openssl.factor and changing the test?

If anyone has pointers on what the rules are supposed to be, I could
also take a shot at updating the code.

Below is the output of gnutls-cli, which also claims that this should
match:

Thanks,
David

Resolving 'ipv4.tunnelbroker.net'...
Connecting to '64.62.200.2:443'...
- Ephemeral Diffie-Hellman parameters
  - Using prime: 1024 bits
  - Secret key: 1021 bits
  - Peer's public key: 1024 bits
- Certificate type: X.509
  - Got a certificate list of 4 certificates.
  - Certificate[0] info:
   - subject `O=tunnelbroker.net,OU=Domain Control 
Validated,CN=tunnelbroker.net', issuer 
`C=US,ST=Arizona,L=Scottsdale,O=Starfield Technologies\, 
Inc.,OU=http://certificates.starfieldtech.com/repository,CN=Starfield Secure 
Certification Authority,serialNumber=10688435', RSA key 2048 bits, signed using 
RSA-SHA1, activated `2011-11-05 00:44:14 UTC', expires `2016-11-04 21:10:42 
UTC', SHA-1 fingerprint `996169ba982488f5212f03f3ae91f628ee21481a'
  - Certificate[1] info:
   - subject `C=US,ST=Arizona,L=Scottsdale,O=Starfield Technologies\, 
Inc.,OU=http://certificates.starfieldtech.com/repository,CN=Starfield Secure 
Certification Authority,serialNumber=10688435', issuer `C=US,O=Starfield 
Technologies\, Inc.,OU=Starfield Class 2 Certification Authority', RSA key 2048 
bits, signed using RSA-SHA1, activated `2006-11-16 01:15:40 UTC', expires 
`2026-11-16 01:15:40 UTC', SHA-1 fingerprint 
`7e1874a98faa5d6d2f506a8920ff22fbd16652d9'
  - Certificate[2] info:
   - subject `C=US,O=Starfield Technologies\, Inc.,OU=Starfield Class 2 
Certification Authority', issuer `L=ValiCert Validation Network,O=ValiCert\, 
Inc.,OU=ValiCert Class 2 Policy Validation 
Authority,CN=http://www.valicert.com/,[email protected]', RSA key 2048 
bits, signed using RSA-SHA1, activated `2004-06-29 17:39:16 UTC', expires 
`2024-06-29 17:39:16 UTC', SHA-1 fingerprint 
`363e4734f757bdeb89868efe94907774a327695e'
  - Certificate[3] info:
   - subject `L=ValiCert Validation Network,O=ValiCert\, Inc.,OU=ValiCert Class 
2 Policy Validation 
Authority,CN=http://www.valicert.com/,[email protected]', issuer 
`L=ValiCert Validation Network,O=ValiCert\, Inc.,OU=ValiCert Class 2 Policy 
Validation Authority,CN=http://www.valicert.com/,[email protected]', RSA 
key 1024 bits, signed using RSA-SHA1, activated `1999-06-26 00:19:54 UTC', 
expires `2019-06-26 00:19:54 UTC', SHA-1 fingerprint 
`317a2ad07f2b335ef5a1c34e4b57e8b7d8f1fca6'
- The hostname in the certificate matches 'ipv4.tunnelbroker.net'.
- Peer's certificate issuer is unknown
- Peer's certificate is NOT trusted
- Version: TLS1.0
- Key Exchange: DHE-RSA
- Cipher: AES-128-CBC
- MAC: SHA1
- Compression: NULL
- Handshake was completed

- Simple Client Mode:

------------------------------------------------------------------------------
Learn Windows Azure Live!  Tuesday, Dec 13, 2011
Microsoft is holding a special Learn Windows Azure training event for 
developers. It will provide a great way to learn Windows Azure and what it 
provides. You can attend the event by watching it streamed LIVE online.  
Learn more at http://p.sf.net/sfu/ms-windowsazure
_______________________________________________
Factor-talk mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/factor-talk

Reply via email to