[horde] Free Busy URL and self signed SSL cert

Vilius Šumskas vilius at lnk.lt
Tue Mar 20 07:41:09 UTC 2012


Sveiki,

Tuesday, March 20, 2012, 12:59:43 AM, you wrote:

> ----- Message from Vilius Šumskas <vilius at lnk.lt> ---------
>     Date: Mon, 19 Mar 2012 23:29:04 +0200
>     From: Vilius Šumskas <vilius at lnk.lt>
> Subject: Re: [horde] Free Busy URL and self signed SSL cert
>       To: horde at lists.horde.org
>>
>> Probably others will fill in more, but I assume that the error message
>> you experience is returned by Kronolith, so the client in this case is
>> Kronolith,  or  better  to  say,  the  mechanism  underneath  it, e.i.
>> openssl? What and where do you get this error from?
>>

> The entire chain:

> I have a Global address list that contains Free Busy URLs as advised  
> in Kronolith for each user. Creating a new appointment in Kronolith, I
> add an attendee, and type my wife's name. This is then autocompleted  
> by Kronolith from the calendar, which seems to work fine. That, I  
> assume, then draws her Free Busy URL  
> (https://mail.simonandkate.net/kronolith/fb.php?u=katie) from the  
> contact details. At that point, Kronolith returns the error message in
> a Yellow notification box in the bottom right of the screen, saying:

> SSL certificate problem, verify that the CA cert is OK. Details:
> error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate
> verify failed[Mon Mar 19 2012 20:11:29 GMT+1000 (E. Australia Standard Time)]

At  least  for me the link above downloads without any problems except
that  browser  complains  certificate is not valid. If you had installed CA
into  the  browser  you  should  be  fine  here.  I don't believe that
Kronolith  uses  SSL  for  Free  Busy  generation at all, so the error
message must come from the browser.

Maybe  you  are  having  cache  issue?  Try  clearing temporary files on the
browser.

> Running Horde log in debug level appears to present no further useful
> information other than repeating that error.

> The setup:
> https://mail.simonandkate.net is reverse proxied to an internal web  
> server that runs Horde. On both servers (reverse proxy and host) the  
> required certificates are located in /etc/pki/tls/certs - both the  
> self-signed CA cert and the server cert that is generated by that CA.
> On both servers I have used OpenSSL to hash and 'ln' the CA  
> certificate. On both servers running "openssl verify ..." on the CA  
> cert and the server cert is successful. From both servers, running  
> openssl in s_client mode to mail.simonandkate.net:443 is successful,  
> with a verify return code of 0.

> So from where I sit, openssl is happy with, trusts, and can verify  
> both the CA cert and its child.

> On the test PC client - I have imported the CA cert as a "Trusted  
> Certificate Authority". IE and Chrome therefore present the  
> https://mail.simonandkate.net site as "green" and trusted.

> Yet still Kronolith will not verify the cert. I have had a quick  
> search for the kronolith code that is calling the verify but could not
> find it.

> Horde config $conf[openssl][cafile]  is set to /etc/pki/tls/certs. The
> explanatory text for that says: "The location of the root certificates
> bundle, e.g. /etc/ssl/certs." Does this mean that Horde only checks  
> the CA-bundle file located in that folder and installed by the openssl
> package, or does it parse that directory for all valid hashed certs?  
> If the latter, then this should verify without any problem...

AFAIK this should be set to the CA certificate file, not the directory.

> Open to suggestions as to what to try next...

> Simon.




-- 
Best regards,
 Vilius



More information about the horde mailing list