I think this issue also affects communicating with netfilter.org:
$ gnutls-cli netfilter.org
Processed 127 CA certificate(s).
Resolving 'netfilter.org:443'...
Connecting to '92.243.18.11:443'...
- Certificate type: X.509
- Got a certificate list of 4 certificates.
- Certificate[0] info:
-
Control: severity -1 serious
On 2022-07-17 Paul Wise wrote:
[...]
> So I think
> that this issue needs to be fixed in GnuTLS and that this bug should be
> fixed before the release of Debian bookworm, because it makes programs
> using GnuTLS somewhat unusable now. Please bump severity if you
Control: retitle -1 libgnutls30: fails to validate when there is junk in the
cert chain, including duplicated server certs
On Sun, 17 Jul 2022 09:40:09 +0800 Paul Wise wrote:
> I have seen this issue (duplicate server cert) on several other
> sites.
Seems this issue is broader than just
Control: severity -1 important
Control: retitle -1 libgnutls30: fails to validate when the server cert is
duplicated in the cert chain
On Sat, 12 Mar 2022 07:43:28 +0100 Andreas Metzler wrote:
> ci.debian.net seems to be configured less than optimal, its cert-chain
> contains junk (0=server
Control: tags -1 confirmed
On 2022-03-11 Paul Gevers wrote:
> Package: libgnutls30
> Version: 3.7.3-4+b1
> Severity: normal
> Dear maintainers,
> Recently ca-certificates 20211016 migrated to testing which included
> the following change:
> * Blacklist expired root certificate "DST Root CA
Package: libgnutls30
Version: 3.7.3-4+b1
Severity: normal
Dear maintainers,
Recently ca-certificates 20211016 migrated to testing which included
the following change:
* Blacklist expired root certificate "DST Root CA X3" (closes: #995432)
As can be read here [1] Let's Encrypt certificates are
6 matches
Mail list logo