Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 283243 - HTTPS certificate chain is incomplete (ie insecure)
Summary: HTTPS certificate chain is incomplete (ie insecure)
Status: RESOLVED INVALID
Alias: None
Product: Gentoo Infrastructure
Classification: Unclassified
Component: Other web server issues (show other bugs)
Hardware: All All
: High trivial (vote)
Assignee: Gentoo Infrastructure
URL: https://bugs.gentoo.org/
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2009-08-30 12:50 UTC by Christian Asseburg
Modified: 2009-09-01 19:28 UTC (History)
0 users

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Christian Asseburg 2009-08-30 12:50:23 UTC
Two error messages from my web browser (Opera) when trying to connect to https://bugs.gentoo.org/

(1) This site is using an outdated encryption method which is no longer classified as secure. It cannot sufficiently protect sensitive data. Do you wish to continue?
(2) The root certificate from "CA Cert Signing Authority" is not known to Opera. Opera cannot decide if this certificate can be trusted.

Reproducible: Always

Steps to Reproduce:
1. Connect to https://bugs.gentoo.org/
2.
3.

Actual Results:  
Should show a security padlock and no certificate warnings/errors.

Expected Results:  
Get the error message above.

You should configure the web server correctly. It has to present all intermediate certificates to the web browser. You can assume that only the Root certificate is already installed on my system.
The message about the outdated/weak encryption method is another issue.

I've classed this as a "major" problem because, if you think you need a https connection at all, then you must have a major reason for it, and then it should be implemented correctly.
Comment 1 Mike Doty (RETIRED) gentoo-dev 2009-08-30 16:00:35 UTC
This is not a major bug; Your logic for why people use https is flawed.

You can import CACerts root certs from here: http://www.cacert.org/index.php?id=3

The SSL chain which shows that the root cert is self signed by CACert:
mike@koala ~ $ openssl s_client -connect bugs.gentoo.org:443 -verify 10
verify depth is 10
CONNECTED(00000003)
depth=2 /O=Root CA/OU=http://www.cacert.org/CN=CA Cert Signing Authority/emailAddress=support@cacert.org
verify error:num=19:self signed certificate in certificate chain
verify return:1
depth=2 /O=Root CA/OU=http://www.cacert.org/CN=CA Cert Signing Authority/emailAddress=support@cacert.org
verify return:1
depth=1 /O=CAcert Inc./OU=http://www.CAcert.org/CN=CAcert Class 3 Root
verify return:1
depth=0 /C=US/ST=New Mexico/L=Albuquerque/O=GENTOO Foundation, Inc./OU=Gentoo Infrastructure/CN=bugs.gentoo.org
verify return:1
---
Certificate chain
 0 s:/C=US/ST=New Mexico/L=Albuquerque/O=GENTOO Foundation, Inc./OU=Gentoo Infrastructure/CN=bugs.gentoo.org
   i:/O=CAcert Inc./OU=http://www.CAcert.org/CN=CAcert Class 3 Root
 1 s:/O=Root CA/OU=http://www.cacert.org/CN=CA Cert Signing Authority/emailAddress=support@cacert.org
   i:/O=Root CA/OU=http://www.cacert.org/CN=CA Cert Signing Authority/emailAddress=support@cacert.org
 2 s:/O=CAcert Inc./OU=http://www.CAcert.org/CN=CAcert Class 3 Root
   i:/O=Root CA/OU=http://www.cacert.org/CN=CA Cert Signing Authority/emailAddress=support@cacert.org
---

Comment 2 Christian Asseburg 2009-08-30 16:53:45 UTC
There's no point in importing a security certificate from a http: link - I cannot trust it.
Comment 3 Robin Johnson archtester Gentoo Infrastructure gentoo-dev Security 2009-08-30 20:04:48 UTC
Here's an SSL link to find the root cert:
https://www.cacert.org/index.php?id=3
But you're still in the catch-22 that it's used to sign that same page you're getting it from.

The ca-certificates package already includes these certificates as well, so you can just install from there too, and avoid going over the Internet at all.

Also, we DO present the entire chain:
- bugs.gentoo.org
- CAcert Class 3 Root
- CA Cert Signing Authority (root).
Comment 4 Christian Asseburg 2009-09-01 19:10:03 UTC
I think I found the problem. CA Cert issues only self-signed certificates, and they did not submit their root certificate to the root certificate store of my browser. (Nor to those of any other browser, if I can believe Wikipedia: http://en.wikipedia.org/wiki/Cacert .) That's why my browser does not trust the bugs.gentoo.org certificate and I cannot verify the https link.
Probably with non-browser software I could use the Gentoo certificate store to verify the link, but that's not so useful when I'm trying to open a website.
This issue will be resolved when CA Cert completes submission of their certificates to the browser root stores.
Comment 5 Robin Johnson archtester Gentoo Infrastructure gentoo-dev Security 2009-09-01 19:28:01 UTC
- Any root certificates are by definition self-signed.
- No CA issues self-signed certificates. 
- Work is ongoing to make browsers use the system cert store instead of their own.