KDE doesn't honor root certs chosen by ca-certificates
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
| kdelibs |
Invalid
|
Undecided
|
Unassigned | |
| ca-certificates (Ubuntu) |
Undecided
|
Unassigned | ||
| kde4libs (Ubuntu) |
Wishlist
|
Harald Sitter | ||
| kdelibs (Debian) |
Fix Released
|
Unknown
|
||
| kdelibs (Ubuntu) |
Undecided
|
Unassigned | ||
Bug Description
Currently ther kdelibs-package maintains an own copy of trusted root certs in /usr/share/
Malte S. Stretz (mss) wrote : | #1 |
James Westby (james-w) wrote : | #2 |
Hi,
I'm not sure why you think ca-certificates needs to change here?
What does it not do that you want it to do?
Can kdelibs not just be changed to use the list already generated in
/etc/ssl/certs?
Thanks,
James
Changed in ca-certificates: | |
status: | New → Incomplete |
Changed in kdelibs: | |
status: | Unknown → New |
Malte S. Stretz (mss) wrote : | #3 |
@James: Nope, ca-certificates doesn't have to be changed, I didn't know that it already is modular enough. If you know how to remove a package from this bug, please do so with ca-certificates :)
And nope, it can't just use the list in /etc/ssl/certs because it uses an own ini-styled ca-"bundle". So I guess the easiest way to implement this is to create an extra package ca-certificates-kde (based on ca-certificates
James Westby (james-w) wrote : | #4 |
Hi,
Is kde's bundle different to /etc/ssl/
Could it perhaps grow support for that type of bundle as well?
Thanks,
James
Changed in ca-certificates: | |
status: | Incomplete → Invalid |
Malte S. Stretz (mss) wrote : | #5 |
Yes, its different: Its not PEM-encoded but stored in an ini-file.
Maybe somebody could write a patch for kdelibs to use a PEM file instead but it seems like the SSL stuff is currently not well maintained in KDE itself and I doubt that such a patch would go in before 4.3. So for now the easiest (and quickest) way is to hook into ca-certificates with a custom generator.
Malte S. Stretz (mss) wrote : | #6 |
Hm, this is really... convoluted. Seems like KDE uses (at least) two files: A PEM-file /usr/share/
See also
http://
and
http://
It *seems* like replacing the ca-bundle.crt with a symlink to /etc/ssl/
Changed in kde4libs: | |
importance: | Undecided → Wishlist |
status: | New → Confirmed |
Jonathan Thomas (echidnaman) wrote : | #7 |
Most likely this won't be implemented for KDE 3's kdelibs, since upstream is no longer working on KDE3.
Changed in kdelibs (Ubuntu): | |
status: | New → Won't Fix |
Changed in kdelibs: | |
status: | New → Unknown |
Changed in kdelibs: | |
status: | Unknown → New |
Changed in kdelibs (Debian): | |
status: | Unknown → New |
Malte S. Stretz (mss) wrote : | #8 |
For some time now I've got this in my root's crontab:
@reboot ln -sf /etc/ssl/
Which works fine. It seems (also from grepping through the sources) like the ksslcalist is just some ancient thing from KDE3 and not needed at all (it is horribly outdated anyway).
So replacing the ca-bundle.crt in the packages with a symlink and adding a dependency on ca-certificates should make the whole KDE SSL experience a lot better for Ubuntu.
Harald Sitter (apachelogger) wrote : | #9 |
Aye, see bug #334191 SSL support in KDE 4 is broken at a much larger scale than outdated crt file. So this does not qualify as a paper cut at all, more like someone-
Changed in hundredpapercuts: | |
status: | New → Invalid |
Changed in kdelibs: | |
importance: | Unknown → Undecided |
status: | New → Invalid |
affects: | hundredpapercuts → null |
Malte S. Stretz (mss) wrote : | #10 |
Yes, I am a big... umm... fan of KDE bug 162485 :)
Delegating the cert storage to ca-certificates doesn't fix that bug but IMO improves it quite a bit; I can at least add system wide CAs again which make my CAcert servers work. And I haven't noticed any side effects of replacing the ca bundle, so maybe this symlink could just be packaged as part of the KDE packages? (If not, well, the cronjob hack works for me.)
Jonathan Thomas (echidnaman) wrote : | #11 |
Hi there!
Thanks for reporting this bug! Your bug seems to be a problem with the KDE program itself, and not with our KDE packages. While we appreciate your issue, it would be better if it was tracked at https:/
Thanks!
Changed in kde4libs (Ubuntu): | |
status: | Confirmed → Invalid |
Philipp Kern (pkern) wrote : | #12 |
While it might be true that it should be reported upstream, ca-certificates is a way specific to Debian/Ubuntu and some others how certificates are handled, so it's distro-specific and should probably tracked there.
Changed in kde4libs (Ubuntu): | |
status: | Invalid → Confirmed |
Malte S. Stretz (mss) wrote : | #13 |
Plus, this bug has a simple hint on how to fix it. A small symlink is enough to improve the current situation a lot.
rdratlos (rdratlos) wrote : | #14 |
Even though the proposed fix will/may help to solve the Konqueror issue, it does not fix the Kmail part of [https:/
Has anyone here tested the patch in KDE4?
rdratlos (rdratlos) wrote : | #15 |
After some testing using KDE 4.3 in Kubuntu karmic I can now confirm that Malte's fix works also for kmail. In fact, all kio slaves (like kio_http, kio_smtp) that use the KTcpSocket class correctly support with this fix self-signed certificates.
Kmail correctly uses the certification list that is connected by the symbolic link fix. See extract of the debug log:
kmail(20529) KMComposeWin:
kmail(20529) KMComposeWin:
kmail(20529) KMComposeWin:
kmail(20529) MessageComposer
kmail(20529) MessageComposer
kmail(20529) MessageComposer
kmail(20529) MessageComposer
kmail(20529) MessageComposer
kmail(20529) MessageComposer
charset=
kmail(20529) KMComposeWin:
kmail(20529) KMFolderMaildir
kmail(20529)/kmail (storage internals) KMFolderMaildir
kmail(20529)/kmail (storage internals) KMFolderMaildir
kmail(20529)
kmail(20529)/kio (Slave) KIO::Slave:
kmail(20529)/kio (KIOConnection) KIO::Connection
klauncher(
klauncher(
kmail(20529)
kmail(20529) KMComposeWin:
kmail(20529) KMFolderMaildir
kio_smtp(20570)/kio (TCPSlaveBase) KIO::TCPSlaveBa
<b>kio_
kio_smtp(
kio_smtp(
Alex Wauck (awauck) wrote : | #16 |
The steps needed to mitigate this bug do not seem to have been taken in Lucid. Can we please at least add Malte's workaround for Maverick?
Harald Sitter (apachelogger) wrote : | #17 |
This should not be done anyway, unless someone who is involved with KDE's SSL magic agrees with the proposed course of action.
Tom Helner (duffman) wrote : | #18 |
Here is another workaround solution that can be leveraged until KDE gets this fixed (https:/
My new SSL cert for uses a chained certificate, and was loading with an authenticity check warning because "Entrust.net Certification Authority (2048)" was not included in KDE's ca-bundle.crt. And to add insult to injury KDE no longer has a GUI to import CA Certificates.
Simply appending the Entrust.
$ sudo cp -p /usr/share/
$ sudo cat /usr/share/
Restart KDE
I finally found out the one and only solution for this bug : After about 10 years of KDE exclusive use and enthusiasm, I shifted to Gnome a couple days ago.
Just fed up with the KDE 4.x branch being a very _nice_ environment graphically speaking but with a whole lot of things broke that worked perfectly in KDE 3.x and have been broke for more than a year now in KDE 4, without any evidence that it will ever be fixed.
The incomplete bluetooth support in KDE and non-working UbuntuOne, and past long pain with KDE Network Manager besides this bug put an end to my patience.
If KDE wants to be a shiny environment with a lot of broken things that used to work but nobody cares, oh well, without me.
If just went to Gnome. I don't like Gnome. It's ugly compared to KDE. But oh well, it works, KDE doesn't, and I just need to get the job done.
no longer affects: | null |
Harald Sitter (apachelogger) wrote : | #20 |
I just talked to Debian about this and as it stands right now there is little interest of patching in ca-cert support as the KDE upstream is slowly moving towards using platform certs. So instead of deviating from upstream KDE on this they choose to wait for upstream KDE's long-term solution here (which is in general using platform certs). Now short of wanting to deviate from both Debian and KDE, even though both do not appear to consider this a pressing matter, this wish it not worth tracking in a Kubuntu scope as the ultimate resolution would have to be done by KDE.
Hence I am closing it as wontfix for now.
However feel free to reopen this bug once support has landed in either upstream's kdelibs.
Changed in kde4libs (Ubuntu): | |
assignee: | nobody → Harald Sitter (apachelogger) |
status: | Confirmed → Won't Fix |
Is this bug then triaged into KDE's bug tracker?
If you want to defer it to KDE upstream, please at least provide a link to the upstream bug #
Harald Sitter (apachelogger) wrote : | #22 |
I do not know if there is one.
You ARE (one of the) maintainer(s), right?
How are you tracking this issue now, if you don't know if it's in KDE's tracker?
Harald Sitter (apachelogger) wrote : | #24 |
There is no issue for me to track. Stuff is working as intended by upstream.
Changed in kdelibs (Debian): | |
status: | New → Fix Released |
Hmmm... doesn't look so hard to create a package based on ca-certificates -java. I'll have a shot...