I'm making a bash script to ping a certain web address. The problem is, when I say:
ping https://www.dictionary.com/browse/word
then ping says
ping: https://www.dictionary.com/browse/word: Name or service not known
Can somebody please help me with this? What is a program that I can use to ping an https server.
I have to have the slashes there because I want to ping that certain page.
Thank you in advance.
I have enabled TLS 1.2 in my web server. But the http://ssllabs.com indicates that, I have enabled TLS 1.0 and 1.1 versions along with the TLS1.2 in my server. I modified my configurations files to disable 1.0 and 1.1 from my server. But it doesn't help.
/etc/apache2/mods-enabled/ssl.conf
SSLCipherSuite HIGH:!SSLv3:!kRSA:!kECDH:!ADH:!DSS
SSLHonorCipherOrder on
SSLProtocol -all +TLSv1.2
I have multiple virtual hosts in my Apache server. In each file, I have the following configuration.
SSLEngine On
SSLProtocol -all +TLSv1.2
SSLCertificateFile /etc/ssl/certs/certfile.pem
SSLCertificateKeyFile /etc/ssl/private/certfile.pem
I've never seen such thing before.
In ubuntu 18.04 LTS almost after 6 months, I have problem in loading HTTP urls in Firefox, Chrome even by wget. But I have no problem with same urls in HTTPS mode. Ping also works for the same urls.
However this problem not seen in other devices connected to same network!
Any help appreciated...
Update I have a solution for this that's not intresting (actually headache):
In firefox from
Preferences > privacy > View Certificates > Delete All Server Certificates
.Reboot the Ubuntu 18.04
- For limited time everything working fine, but after visiting one of my websites with SSL (https), all urls with http stop working!
I think this problem related to websites with self-signed certificates, however these websites doesn't have similar problems in other devices.
Hope somebody knows the reason...
Updated: Today I faced with another strange issue.
I've setup Wifi hotspot
using my Android
mobile with 4G data network & my laptop conncted to mentioned hotspot.
Everything worked fine, but changing hotspot to USB tethering caused http
stopped working.
By switching back to hotspot the problem gone!
Recently I tried to add own ssl for https
support in localhost which I couldn't achieve but now i am getting all these error with certificates
With command git push
fatal: unable to access 'https://github.com/username/project.git/': server certificate verification failed. CAfile: /etc/ssl/certs/ca-certificates.crt CRLfile: none
cat /etc/ssl/certs/ca-certificates.crt
is blank.
I tried
sudo apt install --reinstall ca-certificates
sudo update-ca-certificates
$ GIT_CURL_VERBOSE=1 git push
* Couldn't find host github.com in the .netrc file; using defaults
* Trying 192.30.253.113...
* TCP_NODELAY set
* Connected to github.com (192.30.253.113) port 443 (#0)
* found 0 certificates in /etc/ssl/certs/ca-certificates.crt
* found 4 certificates in /etc/ssl/certs
* ALPN, offering http/1.1
* SSL connection using TLS1.2 / ECDHE_RSA_AES_128_GCM_SHA256
* server certificate verification failed. CAfile: /etc/ssl/certs/ca-certificates.crt CRLfile: none
* stopped the pause stream!
* Closing connection 0
found 0 certificates in /etc/ssl/certs/ca-certificates.crt
I am getting error updating with certificates error sudo apt update
Hit:1 http://np.archive.ubuntu.com/ubuntu bionic InRelease
Hit:2 http://np.archive.ubuntu.com/ubuntu bionic-updates InRelease
Hit:3 http://np.archive.ubuntu.com/ubuntu bionic-backports InRelease
Hit:4 http://np.archive.ubuntu.com/ubuntu bionic-proposed InRelease
Get:5 http://security.ubuntu.com/ubuntu bionic-security InRelease [83.2 kB]
Ign:6 https://deb.nodesource.com/node_8.x bionic InRelease
Ign:7 http://dl.google.com/linux/chrome/deb stable InRelease
Get:8 http://archive.canonical.com/ubuntu bionic InRelease [10.2 kB]
Hit:9 http://ppa.launchpad.net/hluk/copyq/ubuntu bionic InRelease
Ign:10 https://packages.cloud.google.com/apt cloud-sdk-bionic InRelease
Hit:11 http://dl.google.com/linux/chrome/deb stable Release
Err:12 https://deb.nodesource.com/node_8.x bionic Release
Certificate verification failed: The certificate is NOT trusted. The certificate issuer is unknown. Could not handshake: Error in the certificate verification. [IP: 13.33.170.36 443]
Hit:13 http://packages.microsoft.com/repos/vscode stable InRelease
Err:14 https://packages.cloud.google.com/apt cloud-sdk-bionic Release
Certificate verification failed: The certificate is NOT trusted. The certificate issuer is unknown. Could not handshake: Error in the certificate verification. [IP: 74.125.68.113 443]
Ign:15 https://download.sublimetext.com apt/stable/ InRelease
Hit:16 http://ppa.launchpad.net/mozillateam/firefox-next/ubuntu bionic InRelease
Ign:17 http://repo.vivaldi.com/stable/deb stable InRelease
Hit:18 http://repo.vivaldi.com/stable/deb stable Release
Hit:19 http://ppa.launchpad.net/ubuntubudgie/backports/ubuntu bionic InRelease
Err:20 https://download.sublimetext.com apt/stable/ Release
Certificate verification failed: The certificate is NOT trusted. The certificate issuer is unknown. Could not handshake: Error in the certificate verification. [IP: 104.236.0.104 443]
Reading package lists... Done
W: https://deb.nodesource.com/node_8.x/dists/bionic/InRelease: No system certificates available. Try installing ca-certificates.
W: https://packages.cloud.google.com/apt/dists/cloud-sdk-bionic/InRelease: No system certificates available. Try installing ca-certificates.
W: https://deb.nodesource.com/node_8.x/dists/bionic/Release: No system certificates available. Try installing ca-certificates.
W: https://download.sublimetext.com/apt/stable/InRelease: No system certificates available. Try installing ca-certificates.
E: The repository 'https://deb.nodesource.com/node_8.x bionic Release' no longer has a Release file.
N: Updating from such a repository can't be done securely, and is therefore disabled by default.
N: See apt-secure(8) manpage for repository creation and user configuration details.
W: https://packages.cloud.google.com/apt/dists/cloud-sdk-bionic/Release: No system certificates available. Try installing ca-certificates.
E: The repository 'https://packages.cloud.google.com/apt cloud-sdk-bionic Release' no longer has a Release file.
N: Updating from such a repository can't be done securely, and is therefore disabled by default.
N: See apt-secure(8) manpage for repository creation and user configuration details.
W: https://download.sublimetext.com/apt/stable/Release: No system certificates available. Try installing ca-certificates.
E: The repository 'https://download.sublimetext.com apt/stable/ Release' no longer has a Release file.
N: Updating from such a repository can't be done securely, and is therefore disabled by default.
N: See apt-secure(8) manpage for repository creation and user configuration details.
[edited]
cat /etc/ca-certificates.conf
# This file lists certificates that you wish to use or to ignore to be
# installed in /etc/ssl/certs.
# update-ca-certificates(8) will update /etc/ssl/certs by reading this file.
#
# This is autogenerated by dpkg-reconfigure ca-certificates.
# Certificates should be installed under /usr/share/ca-certificates
# and files with extension '.crt' is recognized as available certs.
#
# line begins with # is comment.
# line begins with ! is certificate filename to be deselected.
#
!mozilla/ACCVRAIZ1.crt
!mozilla/AC_RAIZ_FNMT-RCM.crt
!mozilla/Actalis_Authentication_Root_CA.crt
!mozilla/AddTrust_External_Root.crt
!mozilla/AffirmTrust_Commercial.crt
!mozilla/AffirmTrust_Networking.crt
!mozilla/AffirmTrust_Premium.crt
!mozilla/AffirmTrust_Premium_ECC.crt
!mozilla/Amazon_Root_CA_1.crt
!mozilla/Amazon_Root_CA_2.crt
!mozilla/Amazon_Root_CA_3.crt
!mozilla/Amazon_Root_CA_4.crt
!mozilla/Atos_TrustedRoot_2011.crt
!mozilla/Autoridad_de_Certificacion_Firmaprofesional_CIF_A62634068.crt
!mozilla/Baltimore_CyberTrust_Root.crt
!mozilla/Buypass_Class_2_Root_CA.crt
!mozilla/Buypass_Class_3_Root_CA.crt
!mozilla/CA_Disig_Root_R2.crt
!mozilla/CFCA_EV_ROOT.crt
!mozilla/COMODO_Certification_Authority.crt
!mozilla/COMODO_ECC_Certification_Authority.crt
!mozilla/COMODO_RSA_Certification_Authority.crt
!mozilla/Certigna.crt
!mozilla/Certinomis_-_Root_CA.crt
!mozilla/Certplus_Class_2_Primary_CA.crt
!mozilla/Certplus_Root_CA_G1.crt
!mozilla/Certplus_Root_CA_G2.crt
!mozilla/Certum_Trusted_Network_CA.crt
!mozilla/Certum_Trusted_Network_CA_2.crt
!mozilla/Chambers_of_Commerce_Root_-_2008.crt
!mozilla/Comodo_AAA_Services_root.crt
!mozilla/Cybertrust_Global_Root.crt
!mozilla/D-TRUST_Root_Class_3_CA_2_2009.crt
!mozilla/D-TRUST_Root_Class_3_CA_2_EV_2009.crt
!mozilla/DST_Root_CA_X3.crt
!mozilla/Deutsche_Telekom_Root_CA_2.crt
!mozilla/DigiCert_Assured_ID_Root_CA.crt
!mozilla/DigiCert_Assured_ID_Root_G2.crt
!mozilla/DigiCert_Assured_ID_Root_G3.crt
!mozilla/DigiCert_Global_Root_CA.crt
!mozilla/DigiCert_Global_Root_G2.crt
!mozilla/DigiCert_Global_Root_G3.crt
!mozilla/DigiCert_High_Assurance_EV_Root_CA.crt
!mozilla/DigiCert_Trusted_Root_G4.crt
!mozilla/E-Tugra_Certification_Authority.crt
!mozilla/EC-ACC.crt
!mozilla/EE_Certification_Centre_Root_CA.crt
!mozilla/Entrust.net_Premium_2048_Secure_Server_CA.crt
!mozilla/Entrust_Root_Certification_Authority.crt
!mozilla/Entrust_Root_Certification_Authority_-_EC1.crt
!mozilla/Entrust_Root_Certification_Authority_-_G2.crt
!mozilla/GDCA_TrustAUTH_R5_ROOT.crt
!mozilla/GeoTrust_Global_CA.crt
!mozilla/GeoTrust_Primary_Certification_Authority.crt
!mozilla/GeoTrust_Primary_Certification_Authority_-_G2.crt
!mozilla/GeoTrust_Primary_Certification_Authority_-_G3.crt
!mozilla/GeoTrust_Universal_CA.crt
!mozilla/GeoTrust_Universal_CA_2.crt
!mozilla/GlobalSign_ECC_Root_CA_-_R4.crt
!mozilla/GlobalSign_ECC_Root_CA_-_R5.crt
!mozilla/GlobalSign_Root_CA.crt
!mozilla/GlobalSign_Root_CA_-_R2.crt
!mozilla/GlobalSign_Root_CA_-_R3.crt
!mozilla/Global_Chambersign_Root_-_2008.crt
!mozilla/Go_Daddy_Class_2_CA.crt
!mozilla/Go_Daddy_Root_Certificate_Authority_-_G2.crt
!mozilla/Hellenic_Academic_and_Research_Institutions_ECC_RootCA_2015.crt
!mozilla/Hellenic_Academic_and_Research_Institutions_RootCA_2011.crt
!mozilla/Hellenic_Academic_and_Research_Institutions_RootCA_2015.crt
!mozilla/Hongkong_Post_Root_CA_1.crt
!mozilla/ISRG_Root_X1.crt
!mozilla/IdenTrust_Commercial_Root_CA_1.crt
!mozilla/IdenTrust_Public_Sector_Root_CA_1.crt
!mozilla/Izenpe.com.crt
!mozilla/LuxTrust_Global_Root_2.crt
!mozilla/Microsec_e-Szigno_Root_CA_2009.crt
!mozilla/NetLock_Arany_=Class_Gold=_Főtanúsítvány.crt
!mozilla/Network_Solutions_Certificate_Authority.crt
!mozilla/OISTE_WISeKey_Global_Root_GA_CA.crt
!mozilla/OISTE_WISeKey_Global_Root_GB_CA.crt
!mozilla/OpenTrust_Root_CA_G1.crt
!mozilla/OpenTrust_Root_CA_G2.crt
!mozilla/OpenTrust_Root_CA_G3.crt
!mozilla/QuoVadis_Root_CA.crt
!mozilla/QuoVadis_Root_CA_1_G3.crt
!mozilla/QuoVadis_Root_CA_2.crt
!mozilla/QuoVadis_Root_CA_2_G3.crt
!mozilla/QuoVadis_Root_CA_3.crt
!mozilla/QuoVadis_Root_CA_3_G3.crt
!mozilla/SSL.com_EV_Root_Certification_Authority_ECC.crt
!mozilla/SSL.com_EV_Root_Certification_Authority_RSA_R2.crt
!mozilla/SSL.com_Root_Certification_Authority_ECC.crt
!mozilla/SSL.com_Root_Certification_Authority_RSA.crt
!mozilla/SZAFIR_ROOT_CA2.crt
!mozilla/SecureSign_RootCA11.crt
!mozilla/SecureTrust_CA.crt
!mozilla/Secure_Global_CA.crt
!mozilla/Security_Communication_RootCA2.crt
!mozilla/Security_Communication_Root_CA.crt
!mozilla/Sonera_Class_2_Root_CA.crt
!mozilla/Staat_der_Nederlanden_EV_Root_CA.crt
!mozilla/Staat_der_Nederlanden_Root_CA_-_G2.crt
!mozilla/Staat_der_Nederlanden_Root_CA_-_G3.crt
!mozilla/Starfield_Class_2_CA.crt
!mozilla/Starfield_Root_Certificate_Authority_-_G2.crt
!mozilla/Starfield_Services_Root_Certificate_Authority_-_G2.crt
!mozilla/SwissSign_Gold_CA_-_G2.crt
!mozilla/SwissSign_Silver_CA_-_G2.crt
!mozilla/T-TeleSec_GlobalRoot_Class_2.crt
!mozilla/T-TeleSec_GlobalRoot_Class_3.crt
!mozilla/TUBITAK_Kamu_SM_SSL_Kok_Sertifikasi_-_Surum_1.crt
!mozilla/TWCA_Global_Root_CA.crt
!mozilla/TWCA_Root_Certification_Authority.crt
!mozilla/Taiwan_GRCA.crt
!mozilla/TeliaSonera_Root_CA_v1.crt
!mozilla/TrustCor_ECA-1.crt
!mozilla/TrustCor_RootCert_CA-1.crt
!mozilla/TrustCor_RootCert_CA-2.crt
!mozilla/Trustis_FPS_Root_CA.crt
!mozilla/TÜRKTRUST_Elektronik_Sertifika_Hizmet_Sağlayıcısı_H5.crt
!mozilla/USERTrust_ECC_Certification_Authority.crt
!mozilla/USERTrust_RSA_Certification_Authority.crt
!mozilla/VeriSign_Class_3_Public_Primary_Certification_Authority_-_G4.crt
!mozilla/VeriSign_Class_3_Public_Primary_Certification_Authority_-_G5.crt
!mozilla/VeriSign_Universal_Root_Certification_Authority.crt
!mozilla/Verisign_Class_3_Public_Primary_Certification_Authority_-_G3.crt
!mozilla/Visa_eCommerce_Root.crt
!mozilla/XRamp_Global_CA_Root.crt
!mozilla/certSIGN_ROOT_CA.crt
!mozilla/ePKI_Root_Certification_Authority.crt
!mozilla/thawte_Primary_Root_CA.crt
!mozilla/thawte_Primary_Root_CA_-_G2.crt
!mozilla/thawte_Primary_Root_CA_-_G3.crt
I have an little app I wrote in Python and it used to work... until yesterday, when it suddenly started giving me an error in a HTTPS connection. I don't remember if there was an update, but both Python 2.7.3rc2 and Python 3.2 are failing just the same.
I googled it and found out that this happens when people are behind a proxy, but I'm not (and nothing have changed in my network since the last time it worked). My syster's computer running windows and Python 2.7.2 has no problems (in the same network).
>>> url = 'https://www.mediafire.com/api/user/get_session_token.php'
>>> response = urllib2.urlopen(url).read()
File "/usr/lib/python2.7/urllib2.py", line 126, in urlopen
return _opener.open(url, data, timeout)
File "/usr/lib/python2.7/urllib2.py", line 400, in open
response = self._open(req, data)
File "/usr/lib/python2.7/urllib2.py", line 418, in _open
'_open', req)
File "/usr/lib/python2.7/urllib2.py", line 378, in _call_chain
result = func(*args)
File "/usr/lib/python2.7/urllib2.py", line 1215, in https_open
return self.do_open(httplib.HTTPSConnection, req)
File "/usr/lib/python2.7/urllib2.py", line 1177, in do_open
raise URLError(err)
urllib2.URLError: <urlopen error [Errno 8] _ssl.c:504: EOF occurred in violation of protocol>
What's wrong? Any help is appreciated.
PS.: Older python versions don't work either, not in my system and not in a live session from USB, but DO work in a Ubuntu 11.10 live session.