-
Notifications
You must be signed in to change notification settings - Fork 1.1k
[VirusBulletin] Add new domain #4280
Conversation
|
As mentioned in my comment in #4273, https://www.virusbtn.com seems problematic enough that it should not be used as a target for the forwarding. Under normal circumstances, I would just point to #3107 and say that that would have caught the issue, but that does not actually seem to be the case: running |
|
Ah, seeing the issue now; I hadn't noticed that |
|
(I was about to blame your cURL version) @fuglede Debian has had issues with certs since January, it works fine in other (newer) Linux distributions and in every browser. Here's an example: https://einstein.phys.uwm.edu/forum_thread.php?id=11768 |
|
Yeah, I came across https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=812708. I didn't look into the background myself, but from that it looks like the removal is entirely on purpose. And probably warranted: Should we not expect such changes to diffuse into other stores? Mozilla's not a fan either. |
|
@fuglede The certificates change (directly) isn't to blame, it's the use of an old OpenSSL. In the case of Ubuntu 14.04, they patched theirs. https://bugs.launchpad.net/debian/+source/ca-certificates/+bug/1551615 |
|
But as far as I can tell from https://www.ssllabs.com/ssltest/analyze.html?d=www.virusbtn.com, only 1 path is provided? Edit: Ah, scratch that, the Qualys test gives a purely 2048 bit path; the site itself provides the complete chain (CA included, but with the CA cert listing the 1024 bit cert as its issuer). |
|
@fuglede I don't know what's taking Debian so long to resolve a "grave" issue when it's already been resolved for Ubuntu, but I don't see the reason to change this rule to workaround it. This way when they kill off the old domain, people will actually update their bookmarks. |
|
@fuglede https-everywhere-checker used its own certs which should have been kept in sync with whatever Firefox has, plus transitive closure of intermediate certs for validating chains with missing intermediate certs. But the certs just got a few updates and haven't been kept up to date. It might be better to use 'static_ca_path' option, point to copy of your distro's certs. IIRC c_rehash utility from openssl needs to be run in the dir beforehand, otherwise openssl won't be able to lookup the proper certs (maybe this have changed and you just point it at /etc/ssl/certs). |
|
@funkydude: Agreed on that. @hiviah: Apologies for going completely off-topic in this PR, but why patch up the broken chains? We would want those to give errors since they will when browsers discover them in the wild. |
Resolves #4273