From owner-freebsd-current@FreeBSD.ORG Wed Jul 31 10:16:35 2013 Return-Path: Delivered-To: freebsd-current@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115]) (using TLSv1 with cipher ADH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTP id CAABC37A for ; Wed, 31 Jul 2013 10:16:35 +0000 (UTC) (envelope-from ohartman@zedat.fu-berlin.de) Received: from outpost1.zedat.fu-berlin.de (outpost1.zedat.fu-berlin.de [130.133.4.66]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.freebsd.org (Postfix) with ESMTPS id 894212939 for ; Wed, 31 Jul 2013 10:16:35 +0000 (UTC) Received: from inpost2.zedat.fu-berlin.de ([130.133.4.69]) by outpost1.zedat.fu-berlin.de (Exim 4.80.1) for freebsd-current@freebsd.org with esmtp (envelope-from ) id <1V4TSL-0049Kc-Oq>; Wed, 31 Jul 2013 12:16:33 +0200 Received: from f052017189.adsl.alicedsl.de ([78.52.17.189] helo=thor.walstatt.dyndns.org) by inpost2.zedat.fu-berlin.de (Exim 4.80.1) for freebsd-current@freebsd.org with esmtpsa (envelope-from ) id <1V4TSL-003arc-Lh>; Wed, 31 Jul 2013 12:16:33 +0200 Date: Wed, 31 Jul 2013 12:16:29 +0200 From: "O. Hartmann" To: FreeBSD CURRENT Subject: CURRENT > r253690: fetch(1) fails with: Certificate verification failed for ... Message-ID: <20130731121629.4c2b7a92@thor.walstatt.dyndns.org> Organization: FU Berlin X-Mailer: Claws Mail 3.9.2 (GTK+ 2.24.19; amd64-portbld-freebsd10.0) Mime-Version: 1.0 Content-Type: multipart/signed; micalg=PGP-SHA1; boundary="Sig_/uYRecLqS+qADPblrwDaebi1"; protocol="application/pgp-signature" X-Originating-IP: 78.52.17.189 X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.14 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 31 Jul 2013 10:16:35 -0000 --Sig_/uYRecLqS+qADPblrwDaebi1 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: quoted-printable Updating several ports on CURRENT fails with a fetch error, which expresses itself via [math/eigen3] Certificate verification failed for /C=3DUS/O=3DDigiCert Inc/OU=3Dwww.digicert.com/CN=3DDigiCert High Assurance EV CA-1 34380876968:error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed:/usr/src/secure/lib/libssl/../../../crypto/openssl/ssl/s3_clnt.c:116= 8: fetch: https://bitbucket.org/eigen/eigen/get/3.2.0.tar.bz2: Authentication error Similar failing ports are (in my case): math/eigen3 math/openblas devel/bzr Others havn't been revealed as faulty. Today, I updated the ports on a CURRENT box which has CURRENT r253690/amd64. Everything went smooth, even the ports in question got fetched and updated properly. After the update of the main OS to CURRENT: FreeBSD 10.0-CURRENT #0 r253834: Wed Jul 31 10:32:01 CEST 2013 the system now rejects the fetch of the source file with the described error. I haven't found anything explaining this strange behaviour. Any suggestions? Oliver --Sig_/uYRecLqS+qADPblrwDaebi1 Content-Type: application/pgp-signature; name=signature.asc Content-Disposition: attachment; filename=signature.asc -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.20 (FreeBSD) iQEcBAEBAgAGBQJR+OQBAAoJEOgBcD7A/5N8P7UIANIJ//jxkrIvTarjc7O3Hrka gPlKYESXZvViM9Li+BKC5Bj8g9RmhbJOsCt0fppTRdlJXS4sO6EGwncc9KxaWkLg pKmB1b2TuMNZcsHqR9ENUSaE+AkvoGnv9qWmgmHUM1fT1vmipPOBVbVsJ3j1EfZ3 UgKpx92G8tChM6KzJBo5A4F7/vWrNxUEGjZc/oJHTH/LsmLPRdBFaiBF/5Q3vRMi 7bBt6e5Dmn42aC23RKXcXFdZgc9Vfq9HamZ95jPTiLzF1wF7ds9ktG7xn/C37L2k 4fbGKRprXUwpikw1vb0Ghuoy5CY7gFeR83x2S9Kgbv/tFjry48hOlof3iJSOnb4= =WUMz -----END PGP SIGNATURE----- --Sig_/uYRecLqS+qADPblrwDaebi1--