Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 10 Nov 2014 17:28:49 -0600
From:      Matthew Grooms <mgrooms@shrew.net>
To:        freebsd-net@freebsd.org
Subject:   Re: SSL certificate check error ...
Message-ID:  <54614A31.8030209@shrew.net>
In-Reply-To: <54611DD9.2060107@shrew.net>
References:  <54611DD9.2060107@shrew.net>

next in thread | previous in thread | raw e-mail | index | archive | help
Ok, I feel a little silly. These commands do not work without the CAfile 
specified on freebsd 8.x or 9.x either. Sorry for the noise.

-Matthew

On 11/10/2014 2:19 PM, Matthew Grooms wrote:
> All,
>
> I am seeing a problem with certificate checking on several stock FreeBSD
> 10.0-RELEASE-p12 hosts using the base openssl. The ca_root_nss-3.17.2
> package is installed with the option to create the symlink in /etc/ssl
> enabled ...
>
> # ls -la /etc/ssl
> total 20
> drwxr-xr-x   2 root  wheel    512 Nov 10 13:25 .
> drwxr-xr-x  21 root  wheel   2048 Oct 28 23:45 ..
> lrwxr-xr-x   1 root  wheel     38 Nov 10 13:24 cert.pem ->
> /usr/local/share/certs/ca-root-nss.crt
> -rw-r--r--   1 root  wheel  10929 Jan 16  2014 openssl.cnf
>
> When I try to run s_client as a test to www.google.com, I see "Verify
> return code: 20 (unable to get local issuer certificate)" ...
>
> # openssl s_client -connect www.google.com:443
> CONNECTED(00000003)
> depth=2 C = US, O = GeoTrust Inc., CN = GeoTrust Global CA
> verify error:num=20:unable to get local issuer certificate
> verify return:0
> ---
> Certificate chain
>   0 s:/C=US/ST=California/L=Mountain View/O=Google Inc/CN=www.google.com
>     i:/C=US/O=Google Inc/CN=Google Internet Authority G2
>   1 s:/C=US/O=Google Inc/CN=Google Internet Authority G2
>     i:/C=US/O=GeoTrust Inc./CN=GeoTrust Global CA
>   2 s:/C=US/O=GeoTrust Inc./CN=GeoTrust Global CA
>     i:/C=US/O=Equifax/OU=Equifax Secure Certificate Authority
> ---
> Server certificate
> -----BEGIN CERTIFICATE-----
> MIIEdjCCA16gAwIBAgIIG6nRQAWDXAAwDQYJKoZIhvcNAQEFBQAwSTELMAkGA1UE
> BhMCVVMxEzARBgNVBAoTCkdvb2dsZSBJbmMxJTAjBgNVBAMTHEdvb2dsZSBJbnRl
> cm5ldCBBdXRob3JpdHkgRzIwHhcNMTQxMDIyMTI1NzUxWhcNMTUwMTIwMDAwMDAw
> WjBoMQswCQYDVQQGEwJVUzETMBEGA1UECAwKQ2FsaWZvcm5pYTEWMBQGA1UEBwwN
> TW91bnRhaW4gVmlldzETMBEGA1UECgwKR29vZ2xlIEluYzEXMBUGA1UEAwwOd3d3
> Lmdvb2dsZS5jb20wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDBUjaR
> OXkELfB431tzr0Y6Y2+YzjKiqrrDeBgFZqh8OCuzqCpoCNQQPWJqN8pPv4q+pZOd
> 1smHSo0xhZP1SB9ZdW52gXy9OLc6XHA0OLuagk/QVLFo7TyeXNBEX3RO0qTqpjJ6
> lIE6mMlBvWDzsZxdyM37NN6Sk8U9QaI0tEmaTxnGrxkwhPYcZjbX6JrqhhECMebu
> A/TIU4QbD7RhIubXPn7wjQWGZccpexoynxbw7rhW52FOsWsjy0trvFtWdoXwJji1
> Ls68cbBqFQN3bAlFp14yJ/cf4pVvxIUzplKQZshAQzpnBelFI4Q9EMRai8nNWPym
> pqq9efL//ubLJUq5AgMBAAGjggFBMIIBPTAdBgNVHSUEFjAUBggrBgEFBQcDAQYI
> KwYBBQUHAwIwGQYDVR0RBBIwEIIOd3d3Lmdvb2dsZS5jb20waAYIKwYBBQUHAQEE
> XDBaMCsGCCsGAQUFBzAChh9odHRwOi8vcGtpLmdvb2dsZS5jb20vR0lBRzIuY3J0
> MCsGCCsGAQUFBzABhh9odHRwOi8vY2xpZW50czEuZ29vZ2xlLmNvbS9vY3NwMB0G
> A1UdDgQWBBSA1gUvlcoovYeMXdLiILdTYRyBoDAMBgNVHRMBAf8EAjAAMB8GA1Ud
> IwQYMBaAFErdBhYbvPZotXb1gba7Yhq6WoEvMBcGA1UdIAQQMA4wDAYKKwYBBAHW
> eQIFATAwBgNVHR8EKTAnMCWgI6Ahhh9odHRwOi8vcGtpLmdvb2dsZS5jb20vR0lB
> RzIuY3JsMA0GCSqGSIb3DQEBBQUAA4IBAQBjkgHIXprUI8Y1r8XepqstPieJHrew
> mfjAcg6S15hQF0pd2p7MrOf26pTbe7z84ZOVjODw6PZmRK6wap+6ow14Q0hZDes8
> ugePDxkCTDjX58Mg00uakMRRmizgr0a37O4f3D2VqOdx4doeRenMdx0RluxnDT4K
> gRAXW41WB04Hr8ijwI0q4/0Gw5PzMJgQZ987f+zrUhIW5xDzo1clMSQOYM9mD8DH
> 6uVTlWv04KUAy+GkNqweDP5QT/1gdYh9FIFeMfVuaVNJwHibIfqXJX0clGJRW6GG
> TAhXz7Hr629+6VEKKgGiVmGV1azv6Eran390kzGhRWdxvrhPVrASw9S2
> -----END CERTIFICATE-----
> subject=/C=US/ST=California/L=Mountain View/O=Google Inc/CN=www.google.com
> issuer=/C=US/O=Google Inc/CN=Google Internet Authority G2
> ---
> No client certificate CA names sent
> ---
> SSL handshake has read 3719 bytes and written 435 bytes
> ---
> New, TLSv1/SSLv3, Cipher is ECDHE-RSA-AES128-GCM-SHA256
> Server public key is 2048 bit
> Secure Renegotiation IS supported
> Compression: NONE
> Expansion: NONE
> SSL-Session:
>      Protocol  : TLSv1.2
>      Cipher    : ECDHE-RSA-AES128-GCM-SHA256
>      Session-ID:
> 9890FB78A01C235769387820574E847C0F76E80DBDC867D6EC5D4422B944E956
>      Session-ID-ctx:
>      Master-Key:
> 86B4E5CBDC553D8740C462194E9244870D2468C8A736097CD467EF7461EE0ACF3D96C581EF6F68AF62218B451BBA03D7
>
>      Key-Arg   : None
>      PSK identity: None
>      PSK identity hint: None
>      SRP username: None
>      TLS session ticket lifetime hint: 100800 (seconds)
>      TLS session ticket:
>      0000 - be 92 f9 6b be 9e 07 5c-dc a4 44 5e a5 06 a8 02
> ...k...\..D^....
>      0010 - 3b b3 56 cf 98 b5 72 4f-82 fe 6a 7a 44 2f b7 24
> ;.V...rO..jzD/.$
>      0020 - 7c 23 57 f9 36 94 d6 83-54 21 dc 10 a2 df ac 43
> |#W.6...T!.....C
>      0030 - 1b 8b b0 9e b3 b0 d8 e8-7a 0a d0 b2 55 8e 96 0d
> ........z...U...
>      0040 - 3c ff d2 af 65 ea c7 69-1b a4 bb 04 f2 73 c2 a8
> <...e..i.....s..
>      0050 - 6c b9 0d 54 cb 50 f2 5e-fc a8 0a 5a ec 4d 10 c6
> l..T.P.^...Z.M..
>      0060 - 34 f1 3b cb 14 96 f8 0f-1d 75 bd c6 56 61 73 64
> 4.;......u..Vasd
>      0070 - 98 55 c5 24 18 43 e7 58-cc 2f 50 35 03 14 de c5
> .U.$.C.X./P5....
>      0080 - d7 12 5b 58 6d 6e 6f 7c-61 78 40 1a 02 66 31 94
> ..[Xmno|ax@..f1.
>      0090 - 6d a0 fb 7c 36 aa 4c d2-38 9c dd 89 f9 5c 4a 62
> m..|6.L.8....\Jb
>      00a0 - f6 f7 e0 24                                       ...$
>
>      Start Time: 1415648696
>      Timeout   : 300 (sec)
>      Verify return code: 20 (unable to get local issuer certificate)
> ---
>
> ... but when I explicitly specify the path to /etc/ssl/cert.pem, it
> works fine ...
>
> # openssl s_client -CApath /etc/ssl/cert.pem -connect www.google.com:443
> CONNECTED(00000003)
> depth=3 C = US, O = Equifax, OU = Equifax Secure Certificate Authority
> verify return:1
> depth=2 C = US, O = GeoTrust Inc., CN = GeoTrust Global CA
> verify return:1
> depth=1 C = US, O = Google Inc, CN = Google Internet Authority G2
> verify return:1
> depth=0 C = US, ST = California, L = Mountain View, O = Google Inc, CN =
> www.google.com
> verify return:1
> ---
> Certificate chain
>   0 s:/C=US/ST=California/L=Mountain View/O=Google Inc/CN=www.google.com
>     i:/C=US/O=Google Inc/CN=Google Internet Authority G2
>   1 s:/C=US/O=Google Inc/CN=Google Internet Authority G2
>     i:/C=US/O=GeoTrust Inc./CN=GeoTrust Global CA
>   2 s:/C=US/O=GeoTrust Inc./CN=GeoTrust Global CA
>     i:/C=US/O=Equifax/OU=Equifax Secure Certificate Authority
> ---
> Server certificate
> -----BEGIN CERTIFICATE-----
> MIIEdjCCA16gAwIBAgIIG6nRQAWDXAAwDQYJKoZIhvcNAQEFBQAwSTELMAkGA1UE
> BhMCVVMxEzARBgNVBAoTCkdvb2dsZSBJbmMxJTAjBgNVBAMTHEdvb2dsZSBJbnRl
> cm5ldCBBdXRob3JpdHkgRzIwHhcNMTQxMDIyMTI1NzUxWhcNMTUwMTIwMDAwMDAw
> WjBoMQswCQYDVQQGEwJVUzETMBEGA1UECAwKQ2FsaWZvcm5pYTEWMBQGA1UEBwwN
> TW91bnRhaW4gVmlldzETMBEGA1UECgwKR29vZ2xlIEluYzEXMBUGA1UEAwwOd3d3
> Lmdvb2dsZS5jb20wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDBUjaR
> OXkELfB431tzr0Y6Y2+YzjKiqrrDeBgFZqh8OCuzqCpoCNQQPWJqN8pPv4q+pZOd
> 1smHSo0xhZP1SB9ZdW52gXy9OLc6XHA0OLuagk/QVLFo7TyeXNBEX3RO0qTqpjJ6
> lIE6mMlBvWDzsZxdyM37NN6Sk8U9QaI0tEmaTxnGrxkwhPYcZjbX6JrqhhECMebu
> A/TIU4QbD7RhIubXPn7wjQWGZccpexoynxbw7rhW52FOsWsjy0trvFtWdoXwJji1
> Ls68cbBqFQN3bAlFp14yJ/cf4pVvxIUzplKQZshAQzpnBelFI4Q9EMRai8nNWPym
> pqq9efL//ubLJUq5AgMBAAGjggFBMIIBPTAdBgNVHSUEFjAUBggrBgEFBQcDAQYI
> KwYBBQUHAwIwGQYDVR0RBBIwEIIOd3d3Lmdvb2dsZS5jb20waAYIKwYBBQUHAQEE
> XDBaMCsGCCsGAQUFBzAChh9odHRwOi8vcGtpLmdvb2dsZS5jb20vR0lBRzIuY3J0
> MCsGCCsGAQUFBzABhh9odHRwOi8vY2xpZW50czEuZ29vZ2xlLmNvbS9vY3NwMB0G
> A1UdDgQWBBSA1gUvlcoovYeMXdLiILdTYRyBoDAMBgNVHRMBAf8EAjAAMB8GA1Ud
> IwQYMBaAFErdBhYbvPZotXb1gba7Yhq6WoEvMBcGA1UdIAQQMA4wDAYKKwYBBAHW
> eQIFATAwBgNVHR8EKTAnMCWgI6Ahhh9odHRwOi8vcGtpLmdvb2dsZS5jb20vR0lB
> RzIuY3JsMA0GCSqGSIb3DQEBBQUAA4IBAQBjkgHIXprUI8Y1r8XepqstPieJHrew
> mfjAcg6S15hQF0pd2p7MrOf26pTbe7z84ZOVjODw6PZmRK6wap+6ow14Q0hZDes8
> ugePDxkCTDjX58Mg00uakMRRmizgr0a37O4f3D2VqOdx4doeRenMdx0RluxnDT4K
> gRAXW41WB04Hr8ijwI0q4/0Gw5PzMJgQZ987f+zrUhIW5xDzo1clMSQOYM9mD8DH
> 6uVTlWv04KUAy+GkNqweDP5QT/1gdYh9FIFeMfVuaVNJwHibIfqXJX0clGJRW6GG
> TAhXz7Hr629+6VEKKgGiVmGV1azv6Eran390kzGhRWdxvrhPVrASw9S2
> -----END CERTIFICATE-----
> subject=/C=US/ST=California/L=Mountain View/O=Google Inc/CN=www.google.com
> issuer=/C=US/O=Google Inc/CN=Google Internet Authority G2
> ---
> No client certificate CA names sent
> ---
> SSL handshake has read 3719 bytes and written 435 bytes
> ---
> New, TLSv1/SSLv3, Cipher is ECDHE-RSA-AES128-GCM-SHA256
> Server public key is 2048 bit
> Secure Renegotiation IS supported
> Compression: NONE
> Expansion: NONE
> SSL-Session:
>      Protocol  : TLSv1.2
>      Cipher    : ECDHE-RSA-AES128-GCM-SHA256
>      Session-ID:
> 9DD76F7AC8D34085E2B230CA02B955D3A35482C5AD983CD43A0AF65EDDF0905B
>      Session-ID-ctx:
>      Master-Key:
> FCF5D6AB32816ABD660AB744386531308C3F3203BBB61EB8273A5783DDE92B04C87ADA3DB12C87092BB7BE21CFAD3CCA
>
>      Key-Arg   : None
>      PSK identity: None
>      PSK identity hint: None
>      SRP username: None
>      TLS session ticket lifetime hint: 100800 (seconds)
>      TLS session ticket:
>      0000 - be 92 f9 6b be 9e 07 5c-dc a4 44 5e a5 06 a8 02
> ...k...\..D^....
>      0010 - 63 64 66 84 cd c8 07 dc-69 64 6f ff 69 05 99 a0
> cdf.....ido.i...
>      0020 - f4 d7 00 1a 3c 36 41 61-70 5b b4 79 2c 45 c1 3b
> ....<6Aap[.y,E.;
>      0030 - 6d 5e 13 77 09 3f f8 35-f5 e4 92 ae ce c8 f9 7b
> m^.w.?.5.......{
>      0040 - ca 6e 49 94 cd 19 51 89-a3 f4 32 64 a6 a5 27 66
> .nI...Q...2d..'f
>      0050 - 96 d1 f0 c6 7b a6 07 20-7b 35 d9 0b f7 f1 8c a5   ....{..
> {5......
>      0060 - e7 58 1d 0c b3 86 12 d6-86 49 4c 7d 31 c5 1a b6
> .X.......IL}1...
>      0070 - 3f 7a 8a b5 e5 da 63 a3-f2 2b ee f3 ae 20 3d 1a
> ?z....c..+... =.
>      0080 - fd d7 d7 af f8 db 11 73-eb 3a 9b cb 41 a9 be 5c
> .......s.:..A..\
>      0090 - ec cc 65 1f 3c 13 a7 57-92 a5 cc d9 39 05 41 9d
> ..e.<..W....9.A.
>      00a0 - 9c 3f 94 d8                                       .?..
>
>      Start Time: 1415648909
>      Timeout   : 300 (sec)
>      Verify return code: 0 (ok)
> ---
>
> Also, if I run the commands under truss I see that the file
> /etc/ssl/cert.pem is not being opened when I do not specify the option
> on the command line ...
>
> # truss openssl s_client -connect www.google.com:443
> ...
> open("/dev/crypto",O_RDWR,00)                    ERR#2 'No such file or
> directory'
> open("/dev/crypto",O_RDWR,00)                    ERR#2 'No such file or
> directory'
> open("/etc/ssl/openssl.cnf",O_RDONLY,0666)       = 3 (0x3)
> fstat(3,{ mode=-rw-r--r-- ,inode=1123703,size=10929,blksize=32768 }) = 0
> (0x0)
> read(3,"# $FreeBSD: release/10.0.0/crypt"...,32768) = 10929 (0x2ab1)
> read(3,0x80186e000,32768)                        = 0 (0x0)
> close(3)                                         = 0 (0x0)
> sigaction(SIGPIPE,{ SIG_IGN SA_RESTART ss_t },{ SIG_IGN SA_RESTART ss_t
> }) = 0 (0x0)
> issetugid(0x7fffffffd2c0,0xc8,0x1,0x7fffffffd538,0x0,0x800c82648) = 0 (0x0)
> issetugid(0x7fffffffdf5a,0x800c642bf,0x8,0x52,0x0,0x800c82648) = 0 (0x0)
> stat("/root/.rnd",0x7fffffffce08)                ERR#2 'No such file or
> directory'
> getpid()                                         = 16324 (0x3fc4)
> __sysctl(0x7fffffffd1c8,0x2,0x7fffffffd128,0x7fffffffd1c0,0x0,0x0) = 0
> (0x0)
> getpid()                                         = 16324 (0x3fc4)
> getpid()                                         = 16324 (0x3fc4)
> getpid()                                         = 16324 (0x3fc4)
> getpid()                                         = 16324 (0x3fc4)
> getpid()                                         = 16324 (0x3fc4)
> getpid()                                         = 16324 (0x3fc4)
> getpid()                                         = 16324 (0x3fc4)
> getpid()                                         = 16324 (0x3fc4)
> getpid()                                         = 16324 (0x3fc4)
> getpid()                                         = 16324 (0x3fc4)
> getpid()                                         = 16324 (0x3fc4)
> issetugid(0x0,0x80,0x10,0x2,0x368,0x1)           = 0 (0x0)
> open("/etc/resolv.conf",O_CLOEXEC,0666)          = 3 (0x3)
> fstat(3,{ mode=-rw-r--r-- ,inode=1123958,size=35,blksize=32768 }) = 0 (0x0)
> read(3,"search cn.bf\nnameserver 10.16.6"...,32768) = 35 (0x23)
> read(3,0x8018b3000,32768)                        = 0 (0x0)
> close(3)                                         = 0 (0x0)
> issetugid(0x0,0x8018009c0,0x14,0x3,0x7fffffffc2b0,0x801801068) = 0 (0x0)
> stat("/etc/nsswitch.conf",{ mode=-rw-r--r--
> ,inode=1123624,size=324,blksize=32768 }) = 0 (0x0)
> open("/etc/nsswitch.conf",O_CLOEXEC,0666)        = 3 (0x3)
> ioctl(3,TIOCGETA,0xffffca80)                     ERR#25 'Inappropriate
> ioctl for device'
> fstat(3,{ mode=-rw-r--r-- ,inode=1123624,size=324,blksize=32768 }) = 0
> (0x0)
> read(3,"#\n# nsswitch.conf(5) - name ser"...,32768) = 324 (0x144)
> read(3,0x8018b3000,32768)                        = 0 (0x0)
>
> ... and it is being opened when I do specify the option on the command
> line ...
>
> # truss openssl s_client -CApath /etc/ssl/cert.pem -connect
> www.google.com:443
> ...
> open("/dev/crypto",O_RDWR,00)                    ERR#2 'No such file or
> directory'
> open("/dev/crypto",O_RDWR,00)                    ERR#2 'No such file or
> directory'
> open("/etc/ssl/openssl.cnf",O_RDONLY,0666)       = 3 (0x3)
> fstat(3,{ mode=-rw-r--r-- ,inode=1123703,size=10929,blksize=32768 }) = 0
> (0x0)
> read(3,"# $FreeBSD: release/10.0.0/crypt"...,32768) = 10929 (0x2ab1)
> read(3,0x80186e000,32768)                        = 0 (0x0)
> close(3)                                         = 0 (0x0)
> sigaction(SIGPIPE,{ SIG_IGN SA_RESTART ss_t },{ SIG_IGN SA_RESTART ss_t
> }) = 0 (0x0)
> issetugid(0x7fffffffd290,0xc8,0x1,0x7fffffffd508,0x0,0x800c82648) = 0 (0x0)
> issetugid(0x7fffffffdf5c,0x800c642bf,0x8,0x52,0x0,0x800c82648) = 0 (0x0)
> stat("/root/.rnd",0x7fffffffcdd8)                ERR#2 'No such file or
> directory'
> getpid()                                         = 16371 (0x3ff3)
> __sysctl(0x7fffffffd198,0x2,0x7fffffffd0f8,0x7fffffffd190,0x0,0x0) = 0
> (0x0)
> getpid()                                         = 16371 (0x3ff3)
> getpid()                                         = 16371 (0x3ff3)
> getpid()                                         = 16371 (0x3ff3)
> getpid()                                         = 16371 (0x3ff3)
> getpid()                                         = 16371 (0x3ff3)
> getpid()                                         = 16371 (0x3ff3)
> getpid()                                         = 16371 (0x3ff3)
> getpid()                                         = 16371 (0x3ff3)
> getpid()                                         = 16371 (0x3ff3)
> getpid()                                         = 16371 (0x3ff3)
> open("/etc/ssl/cert.pem",O_RDONLY,0666)          = 3 (0x3)
> fstat(3,{ mode=-rw-r--r-- ,inode=1052618,size=908574,blksize=32768 }) =
> 0 (0x0)
> read(3,"##\n##  ca-root-nss.crt -- Bundl"...,32768) = 32768 (0x8000)
> madvise(0x80186a000,0x2000,0x5,0xaaaaaaaaaaaaaaab,0x8018017a0,0x80127cb10)
> = 0 (0x0)
> madvise(0x8018a1000,0x4000,0x5,0xaaaaaaaaaaaaaaab,0x8018017a0,0x80127cb10)
> = 0 (0x0)
> madvise(0x8018ac000,0x3000,0x5,0xaaaaaaaaaaaaaaab,0x8018017a0,0x80127cb10)
> = 0 (0x0)
> madvise(0x8018bc000,0x2000,0x5,0xaaaaaaaaaaaaaaab,0x8018017a0,0x80127cb10)
> = 0 (0x0)
> madvise(0x8018cd000,0x3000,0x5,0xaaaaaaaaaaaaaaab,0x8018017a0,0x80127cb10)
> = 0 (0x0)
> madvise(0x8018df000,0x2000,0x5,0xaaaaaaaaaaaaaaab,0x8018017a0,0x80127cb10)
> = 0 (0x0)
> madvise(0x801900000,0x2000,0x5,0xaaaaaaaaaaaaaaab,0x8018017a0,0x80127cb10)
> = 0 (0x0)
> madvise(0x801875000,0x1000,0x5,0xaaaaaaaaaaaaaaab,0x801800c48,0x80127cb10)
> = 0 (0x0)
> madvise(0x801887000,0x2000,0x5,0xaaaaaaaaaaaaaaab,0x801800c48,0x80127cb10)
> = 0 (0x0)
> read(3," 42:68:ac:a0:bd:4e:5a:da:18:bf:6"...,32768) = 32768 (0x8000)
> read(3,":9a:9b:bb:\n                    "...,32768) = 32768 (0x8000)
> read(3,"      17:7d:a0:f9:b4:dd:c5:c5:eb"...,32768) = 32768 (0x8000)
> madvise(0x8018ba000,0x6000,0x5,0xaaaaaaaaaaaaaaab,0x7fffffffc770,0x80127cb10)
> = 0 (0x0)
> madvise(0x8018f1000,0xc000,0x5,0xaaaaaaaaaaaaaaab,0x7fffffffc770,0x80127cb10)
> = 0 (0x0)
> madvise(0x80190e000,0x3000,0x5,0xaaaaaaaaaaaaaaab,0x7fffffffc770,0x80127cb10)
> = 0 (0x0)
> madvise(0x801921000,0x5000,0x5,0xaaaaaaaaaaaaaaab,0x7fffffffc770,0x80127cb10)
> = 0 (0x0)
> madvise(0x801936000,0x2000,0x5,0xaaaaaaaaaaaaaaab,0x7fffffffc770,0x80127cb10)
> = 0 (0x0)
> read(3,"c Constraints: critical\n       "...,32768) = 32768 (0x8000)
> read(3,"DYu5Def131TN3ubY1gkIl2PlwS6w\nt0"...,32768) = 32768 (0x8000)
> read(3,"\nxvbxrN8y8NmBGuScvfaAFPDRLLmF9d"...,32768) = 32768 (0x8000)
> read(3,"f:1f:31:9c:\n                   "...,32768) = 32768 (0x8000)
> read(3,"igiCert Inc, OU=www.digicert.com"...,32768) = 32768 (0x8000)
> read(3,"93:36:85:23:88:8a:3c:03:68:d3:c9"...,32768) = 32768 (0x8000)
> read(3,"orzAzu8T2bgmmkTPiab+ci2hC6X5L8GC"...,32768) = 32768 (0x8000)
> read(3,"2zsmWLIodz2uFHdh\n1voqZiegDfqnc1"...,32768) = 32768 (0x8000)
> read(3,"hUNfBvitbtaSeodlyWL0AG0y/YckUHUW"...,32768) = 32768 (0x8000)
> read(3,"            CA:TRUE\n    Signatu"...,32768) = 32768 (0x8000)
> read(3,":22:d7:8b:0b:\n                 "...,32768) = 32768 (0x8000)
> read(3,"  6b:53:7f:db:df:df:f3:71:3d:26:"...,32768) = 32768 (0x8000)
> read(3,"f:f2:89:4d:d4:ec:c5:e2:e6:7a:d0:"...,32768) = 32768 (0x8000)
> read(3,":57:d2:b0:0a:\n                 "...,32768) = 32768 (0x8000)
> read(3,"      X509v3 CRL Distribution Po"...,32768) = 32768 (0x8000)
> read(3,"60:45:f2:31:eb:a9:31:\n         "...,32768) = 32768 (0x8000)
> read(3,"4QgEBBAQDAgAHMDgGCWCGSAGG+EIBDQQ"...,32768) = 32768 (0x8000)
> read(3,"9:28:a7:\n                    2e"...,32768) = 32768 (0x8000)
> read(3,"A1UdEwEB/wQFMAMBAf8wDgYDVR0PAQH/"...,32768) = 32768 (0x8000)
> read(3,"4GoRz6JI5UwFpB/6FcHSOcZrr9FZ7E3G"...,32768) = 32768 (0x8000)
> read(3,"QUFADCBvjE/MD0GA1UEAww2VMOc\nUkt"...,32768) = 32768 (0x8000)
> read(3,"dq6hw2v+vPhwvCkxWeM\n1tZUOt4KpLo"...,32768) = 32768 (0x8000)
> read(3,"        Exponent: 65537 (0x10001"...,32768) = 32768 (0x8000)
> read(3,":35:88:67:74:57:e3:df:8c:b8:a7:7"...,32768) = 23838 (0x5d1e)
> read(3,0x801899000,32768)                        = 0 (0x0)
> close(3)                                         = 0 (0x0)
> getpid()                                         = 16371 (0x3ff3)
> issetugid(0x0,0x80,0x10,0x2,0x368,0x1)           = 0 (0x0)
> open("/etc/resolv.conf",O_CLOEXEC,0666)          = 3 (0x3)
> fstat(3,{ mode=-rw-r--r-- ,inode=1123958,size=35,blksize=32768 }) = 0 (0x0)
> read(3,"search cn.bf\nnameserver 10.16.6"...,32768) = 35 (0x23)
> read(3,0x801931000,32768)                        = 0 (0x0)
> close(3)                                         = 0 (0x0)
> issetugid(0x0,0x801801cf8,0x33,0x3,0x7fffffffc280,0x801801c38) = 0 (0x0)
> stat("/etc/nsswitch.conf",{ mode=-rw-r--r--
> ,inode=1123624,size=324,blksize=32768 }) = 0 (0x0)
> open("/etc/nsswitch.conf",O_CLOEXEC,0666)        = 3 (0x3)
> ioctl(3,TIOCGETA,0xffffca50)                     ERR#25 'Inappropriate
> ioctl for device'
> fstat(3,{ mode=-rw-r--r-- ,inode=1123624,size=324,blksize=32768 }) = 0
> (0x0)
> read(3,"#\n# nsswitch.conf(5) - name ser"...,32768) = 324 (0x144)
> read(3,0x801931000,32768)                        = 0 (0x0)
>
> This is the only copy of openssl on my system ...
>
> # whereis openssl
> openssl: /usr/bin/openssl /usr/share/openssl/man/man1/openssl.1.gz
>
> Did something change with the FreeBSD 10 configuration of OpenSSL? At
> first I thought it was a problem with this particular host, but I've
> been able to reproduce the problem on 3 different 10.x hosts I've tested
> so far. I don't see how an unmodified program will pickup the default
> system CA file unless that problem has an option to explicitly hand in
> the path. Was this intended?
>
> Thanks in advance,
>
> -Matthew
> _______________________________________________
> freebsd-net@freebsd.org mailing list
> http://lists.freebsd.org/mailman/listinfo/freebsd-net
> To unsubscribe, send any mail to "freebsd-net-unsubscribe@freebsd.org"




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?54614A31.8030209>