I have a Turris Omnia still running 3.11.23 due to a complex VLAN switch setup that I’ve not wanted to break and have downtime on while figuring out the new way of doing such things.
I’ve just noticed a lot of notifications about the updater failing due to not recognising the server certificates:
# pkgupdate
line not found
line not found
line not found
ERROR:
unreachable: https://repo.turris.cz/omnia/lists/base.lua: SSL certificate problem: self signed certificate
This is confirmed by:
# curl https://repo.turris.cz/omnia/lists/base.lua
curl: (60) SSL certificate problem: self signed certificate
More details here: https://curl.se/docs/sslcerts.html
curl failed to verify the legitimacy of the server and therefore could not
establish a secure connection to it. To learn more about this situation and
how to fix it, please visit the web page mentioned above.
I’ve not missed any updates. Is there a new CA bundle that is required?
I’ve had this same behaviour since at least last week, and I see the certificate on repo.turris.cz has changed on 2 aug 2021. But still, it is not self-signed and it is valid. However, my Turris OS version 3.11.23, after my reboot ten minutes ago, still says
curl: (60) SSL certificate problem: self signed certificate
More details here: curl - SSL CA Certificates
I don’t mind too much because there are no updates since everyone is working on OS5, but I want to be sure nothing stands in the way for an update to V5 in the future. Right now, if I would enable the “Migration to Turris OS 5.x (HIGHLY EXPERIMENTAL)” option in Foris, it wouldn’t work.
Whereas on an up to date Debian Linux lxc container on the Omnia:
# echo | openssl s_client -showcerts -connect repo.turris.cz:443
CONNECTED(00000003)
depth=2 C = US, O = Internet Security Research Group, CN = ISRG Root X1
verify return:1
depth=1 C = US, O = Let's Encrypt, CN = R3
verify return:1
depth=0 CN = repo.turris.cz
verify return:1
---
Certificate chain
0 s:CN = repo.turris.cz
i:C = US, O = Let's Encrypt, CN = R3
[snip]
So my thoughts yesterday was that we were missing the Let’s Encrypt root CA or something, but then it started working in curl despite that openssl command still printing stuff about self signing.
nslookup repo.turris.cz returns 217.31.192.84 but no reverse record.
nslookup proxy.turris.cz returns 217.31.192.69 and a matching reverse record.
This is when I use my ISP’s DNS, but also if I ask 8.8.8.8 or 1.0.0.1.
Don’t know why it’s there but probably because of an an earlier problem. I deleted the first line and my problem is instantly solved, a clear case of PEBCAC.