[windows] ESET Smart Security Firewall breaks syncdaemon interaction

Bug #1065088 reported by Roman Yepishev
6
This bug affects 1 person
Affects Status Importance Assigned to Milestone
Ubuntu One Client
Confirmed
Undecided
Ubuntu One Client Engineering team

Bug Description

ESET Smart Security Firewall is able to scan the SSL traffic by installing its own Root CA into user's system and creating the SSL Certificates on demand.

Ubuntu One SyncDaemon is using its own certificate and verifies the server certificate properly.
syncdaemon.log contains the following:

2012-10-10 17:42:47,181 - ubuntuone.SyncDaemon.StorageClient - INFO - Connection lost, reason: [Failure instance: Traceback: <class 'OpenSSL.SSL.Error'>: [('SSL routines', 'SSL3_GET_SERVER_CERTIFICATE', 'certificate verify failed')]
twisted\python\context.pyc:81:callWithContext
twisted\internet\selectreactor.pyc:150:_doReadOrWrite
twisted\internet\tcp.pyc:199:doRead
twisted\protocols\tls.pyc:406:dataReceived
--- <exception caught here> ---
twisted\protocols\tls.pyc:505:_write
].
2012-10-10 17:42:47,181 - ubuntuone.SyncDaemon.ActionQueue - INFO - The request 'protocol_version' failed with the error: [('SSL routines', 'SSL3_GET_SERVER_CERTIFICATE', 'certificate verify failed')]

Leo Arias (elopio)
Changed in ubuntuone-client:
assignee: nobody → Ubuntu One Desktop+ team (ubuntuone-desktop+)
status: New → Confirmed
tags: added: certificate desktop+
To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.