Sent; server replied with: Peer certificate cannot be authenticated with given CA certificates

Bug #1423657 reported by Zooko Wilcox-O'Hearn
10
This bug affects 2 people
Affects Status Importance Assigned to Milestone
Whoopsie
Invalid
Undecided
Unassigned

Bug Description

Whenever there is a crash report to send, I get log messages like these in /var/log/syslog:

Feb 19 18:33:53 spark whoopsie[1069]: Parsing /var/crash/_usr_bin_blueman-manager.1000.crash.
Feb 19 18:33:53 spark whoopsie[1069]: Uploading /var/crash/_usr_bin_blueman-manager.1000.crash.
Feb 19 18:33:53 spark whoopsie[1069]: Sent; server replied with: Peer certificate cannot be authenticated with given CA certificates
Feb 19 18:33:53 spark whoopsie[1069]: Response code: 0
Feb 19 18:33:53 spark whoopsie[1069]: Could not upload; processing later (/var/crash/_usr_bin_blueman-manager.1000.crash).

I have the following certificate packages installed:

zooko@spark ~ $ dpkg --list | grep -i certifica
ii ca-certificates 20130906ubuntu2 all Common CA certificates
ii ca-certificates-java 20130815ubuntu1 all Common CA certificates (JKS keystore)

I don't actually understand if it is really an Ubuntu server that is attempting to authenticate my client, or if the "server" referred to in that error message is actually a local service running on my laptop.

Revision history for this message
Zooko Wilcox-O'Hearn (zooko-j) wrote :

Oh, looks like this may have had something to do with recent updates to nss and related packages that I just received after I posted this bug report:

zooko@spark ~ $ tail /var/crash/_usr_bin_blueman-manager.1000.crash
SourcePackage: blueman
Tags: trusty
Title: blueman-manager crashed with DBusDoesNotExistError in warp(): Device creation in progress
Uname: Linux 3.18.7z28-slub-cfq-preempt+ x86_64
UnreportableReason:
 You have some obsolete package versions installed. Please upgrade the following packages and check if the problem still occurs:

 libblkid1, libcgmanager0, libmount1, libuuid1, mount, util-linux, uuid-runtime
UpgradeStatus: Upgraded to trusty on 2014-08-11 (192 days ago)
_MarkForUpload: True

zooko@spark ~ $ time sudo apt-get upgrade
Reading package lists... Done
Building dependency tree
Reading state information... Done
Calculating upgrade... Done
The following packages will be upgraded:
  bind9-host bsdutils dnsutils libbind9-90 libblkid1 libcgmanager0 libdns100
  libisc95 libisccc90 libisccfg90 liblwres90 libmount1 libnss3 libnss3-1d
  libnss3-nssdb libuuid1 libuuid1:i386 mount util-linux uuid-runtime
20 upgraded, 0 newly installed, 0 to remove and 0 not upgraded.
Need to get 1,116 kB/2,951 kB of archives.
After this operation, 6,144 B of additional disk space will be used.
Do you want to continue? [Y/n]
Get:1 http://security.ubuntu.com/ubuntu/ trusty-security/main libnss3-nssdb all 2:3.17.4-0ubuntu0.14.04.1 [10.6 kB]
Get:2 http://security.ubuntu.com/ubuntu/ trusty-security/main libnss3-1d amd64 2:3.17.4-0ubuntu0.14.04.1 [9,304 B]
Get:3 http://security.ubuntu.com/ubuntu/ trusty-security/main libnss3 amd64 2:3.17.4-0ubuntu0.14.04.1 [1,096 kB]

Please close this ticket for now.

Changed in whoopsie:
status: New → Invalid
To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.