Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 5 Aug 2015 22:21:24 +0200
From:      Dimitry Andric <dim@FreeBSD.org>
To:        Kevin Oberman <rkoberman@gmail.com>
Cc:        Peter Wemm <peter@wemm.org>, FreeBSD Ports ML <freebsd-ports@freebsd.org>
Subject:   Re: Unable to relocate to new svn URL
Message-ID:  <C5D69B70-A95D-4371-A8F8-5C8ED5E1CCA3@FreeBSD.org>
In-Reply-To: <CAN6yY1tez0Zhwt1mo4XdrinZ2OkyFH1U-Ew2VAv%2BWH=4YVv9=g@mail.gmail.com>
References:  <CAN6yY1tez0Zhwt1mo4XdrinZ2OkyFH1U-Ew2VAv%2BWH=4YVv9=g@mail.gmail.com>

next in thread | previous in thread | raw e-mail | index | archive | help

--Apple-Mail=_E69E711E-CBDC-4C4A-B910-064AD851081F
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=us-ascii

On 05 Aug 2015, at 22:05, Kevin Oberman <rkoberman@gmail.com> wrote:
>=20
> Today I decided to relocate my ports source from the old specific =
mirror to
> the new svn.freebsd.org. Seemed like just one easy command, but not =
quite.
>=20
> First, if subversion is built with the default options, it will refuse =
to
> do https:// with the confusing message that the URL format was not
> recognized. I checked and my svn was notbuilt with SASL. SASL is not =
on by
> default. So I rebuilt subversion and now it likes the command, but =
won't
> accept the certificate:
> Error validating server certificate for 'https://svn.freebsd.org:443':
> - The certificate is not issued by a trusted authority. Use the
>   fingerprint to validate the certificate manually!
> Certificate information:
> - Hostname: svn.freebsd.org
> - Valid: from Jun 22 00:00:00 2015 GMT until Jun 22 23:59:59 2016 GMT
> - Issuer: Gandi, Paris, Paris, FR
> - Fingerprint: =
E9:37:73:80:B5:32:1B:93:92:94:98:17:59:F0:FA:A2:5F:1E:DE:B9
> (R)eject, accept (t)emporarily or accept (p)ermanently?
>=20
> Indeed, it does not appear that Gandi is on the certificate.txt. file
> installed by ca_root_nss.

Not directly, the Gandi Standard SSL CA 2 certificate is issued by the
following root CA:

Serial Number: 01:fd:6d:30:fc:a3:ca:51:a8:1b:bc:64:0e:35:03:2d
Subject: C=3DUS, ST=3DNew Jersey, L=3DJersey City, O=3DThe USERTRUST =
Network, CN=3DUSERTrust RSA Certification Authority


> Is this a problem with the ca_root_nss port, the certificate, of is
> something hacked? Clearly, I am not about to trust the certificate as =
it
> now stands.

Which version of ca_root_nss do you have?  Mine is 3.19.1_1, and it
definitely has the above root CA in /etc/ssl/cert.pem.

-Dimitry


--Apple-Mail=_E69E711E-CBDC-4C4A-B910-064AD851081F
Content-Transfer-Encoding: 7bit
Content-Disposition: attachment;
	filename=signature.asc
Content-Type: application/pgp-signature;
	name=signature.asc
Content-Description: Message signed with OpenPGP using GPGMail

-----BEGIN PGP SIGNATURE-----
Version: GnuPG/MacGPG2 v2.0.27

iEYEARECAAYFAlXCcE8ACgkQsF6jCi4glqPXrwCfRnLQSacOqx1vtb4d3HJb+dq2
ZyYAn0CCIyYAs2UbDawVv9S2gbRPe0gy
=c4Nk
-----END PGP SIGNATURE-----

--Apple-Mail=_E69E711E-CBDC-4C4A-B910-064AD851081F--



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?C5D69B70-A95D-4371-A8F8-5C8ED5E1CCA3>