Index | Recent Threads | Unanswered Threads | Who's Active | Guidelines | Search |
![]() |
World Community Grid Forums
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() |
No member browsing this thread |
Thread Status: Active Total posts in this thread: 15
|
![]() |
Author |
|
ligfietser
Cruncher Joined: Jan 1, 2010 Post Count: 8 Status: Offline Project Badges: ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() |
Recently the boinc-client on my computer stopped uploading to and updating with world community grid. I suspected a transient problem on the severs at first, but the logfile on my machine contains error messages like:
31-Jan-2016 20:59:55 [World Community Grid] Scheduler request failed: Peer certificate cannot be authenticated with given CA certificates Apparently the certificate used by wcg is no longer trusted on my machine. I have tried downgrading and upgrading the ca-certificates package to no avail. I have an amd64 processor running boinc-client on Debian 8.3 and would like to resume contributing to wcg, but that seems impossible as long as wcg does not have a trrusted certificate. |
||
|
SekeRob
Master Cruncher Joined: Jan 7, 2013 Post Count: 2741 Status: Offline |
Check "Start Here" for discussions on Peer certificate failure, noting that WCG recently switched to SHA256 enforcing. You don't say what version of BOINC came from your repo, but 7.2.47 is kind of the minimum to ensure minimum security compatibility, some found they even needed to go to 7.6.9 and above to resolve the security issues.
----------------------------------------As for certificates on Linux, builds are known that actually use the system certificates instead of the once that come with the BOINC package. These I'd expect are kept current without need of upgrading BOINC. [Edit 1 times, last edit by SekeRob* at Feb 1, 2016 9:13:09 AM] |
||
|
TimSmall
Cruncher Joined: Apr 14, 2009 Post Count: 7 Status: Offline Project Badges: ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() |
Linux, builds are known that actually use the system certificates instead of the once that come with the BOINC package. These I'd expect are kept current without need of upgrading BOINC. Yes, this is the reason that this is showing up on these systems relatively early. Mozilla stopped trusting the CA cert in question ("Thawte Premium Server CA" issued in 1996) in Jan 2015, since 1024 bit RSA is no longer considered secure (see: https://blog.mozilla.org/security/2014/09/08/...s-with-1024-bit-rsa-keys/ ), and Debian has followed suit. Point of Trivia - since this particular Thawte CA was issued back in 1996, this would have been during the time that Thawte was still being run by founder Mark Shuttleworth (not sure if it had moved out of his parents' garage by that point?). Mark later used part of the proceeds of the sale of Thawte to found the Ubuntu Linux distribution... Ubuntu is based on Debian, and so will probably be phasing out trusting this CA shortly too (but doesn't seem to have done-so already). More detail and workaround: https://www.worldcommunitygrid.org/forums/wcg/viewthread_thread,38800 [Edit 2 times, last edit by TimSmall at Feb 1, 2016 10:59:41 AM] |
||
|
Tern
Cruncher Joined: Nov 27, 2015 Post Count: 15 Status: Offline Project Badges: ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() |
Additional related issue - the certificate at Harvard for Clean Energy uploads (140.247.231.147) is invalid, "host name mismatch", so work won't upload there from up-to-date and secure hosts.
|
||
|
ligfietser
Cruncher Joined: Jan 1, 2010 Post Count: 8 Status: Offline Project Badges: ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() |
Thank you for your explanation. I have successfully used the work-around in the thread you linked to for uploading the results I already had waiting.
I have reverted the work-around as I do not know whether it affects the trust for other boinc-projects, so my computer will crunch on other projects until WGC gets a new and trusted certificate. I can confirm boinc on Debian uses the system certificates rather than those that come with the boinc package: /var/lib/boinc-client$ ls -l ca-bundle.crt lrwxrwxrwx 1 boinc boinc 34 sep 19 2009 ca-bundle.crt -> /etc/ssl/certs/ca-certificates.crt |
||
|
siu77
Cruncher Russia Joined: Mar 12, 2012 Post Count: 20 Status: Offline Project Badges: ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() |
I've the same problem on Debian 8.3 and boinc 7.7.0 (git version).
And I'm to paranoid to edit certificates manually. So, I'm gonna crunch another project on linux until It's gonna be fixed. |
||
|
Former Member
Cruncher Joined: May 22, 2018 Post Count: 0 Status: Offline |
This is effecting me also. Very frustrating! The work around worked thankfully though as you say, they really should be upgrading their certificate.
|
||
|
RKN-Cluster
Cruncher Joined: Jan 29, 2007 Post Count: 1 Status: Offline Project Badges: ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() |
This has nothing to do with BOINC or the certificates. At the core it is an issue with openssl on Debian Jessie that is unable to verify cross-signed certificates that have two root certificates. The easy workaround was already posted at EaH: https://einstein.phys.uwm.edu/forum_thread.php?id=11768 which is to downgrade the ca-certificates package which contains the missing root certificate. Just because it is using a SHA1 signature doesn't mean it is insecure.
----------------------------------------Edit: This only fixes the scheduler contact not the problem with uploading result files! [Edit 1 times, last edit by RKN-Cluster at Feb 1, 2016 9:36:34 PM] |
||
|
TimSmall
Cruncher Joined: Apr 14, 2009 Post Count: 7 Status: Offline Project Badges: ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() |
Just came to the same conclusion regarding alternative certificate validation paths, sorry for the noise...
Here are some possible solutions/workarounds: . Manually add the 1024 bit RSA key to ca-bundle.crt as above (the debug output indicates that the boinc client searches both this and /etc/ssl/certs, so it shouldn't impact other SSL connections as far as I can tell. CAfile: ca-bundle.crt Mon 01 Feb 2016 09:34:16 GMT | World Community Grid | [http] [ID#18] Info: CApath: /etc/ssl/certs . Use a newer Debian e.g. 9.0 Stretch (currently in testing) with openssl 1.0.2f does support alternative validation paths - you can perhaps just run boinc under this alone using a container or schroot etc. . The server admins install alternative SSL server certs which don't have this issue (although maintaining compatibility with older releases may be an issue unless they (ab)use round robin DNS to have multiple different SSL setups on different IP addresses - the boinc client retry should mean that the client eventually hits a compatible upload server. Tim. |
||
|
TimSmall
Cruncher Joined: Apr 14, 2009 Post Count: 7 Status: Offline Project Badges: ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() |
|
||
|
|
![]() |