I have a Self-signed certificate on the server where the bot is located.
The bot is written in Django, I send the following request
curl-F "url=http:/ / promauto. ru/telegram/bot/" - F "certificate=#YOURPUBLIC.pem" "https://api.telegram.org/bot/setWebhook"
the response in the curl console is: (35) schannel: next InitializeSecurityContext failed: Unknown error (0x80092012) - The revocation function could not perform a revocation check for the certificate. What am I doing wrong?
Related
I need to connect to a 3rd party API signed by Go Daddy secure certificate authority - G2. (I verified that in the Chrome browser).
When I try to issue a curl request to that API over port 8443 (which is opened) I receive the following error:
SSL certificate problem: unable to get local issuer certificate
Closing connection 0 curl: (60) SSL certificate problem: unable to get local issuer certificate More details here:
https://curl.haxx.se/docs/sslcerts.html
I checked and in the default curl cacert store there is Go Daddy secure certificate authority - G2 listed.
I also downloaded the latest cacert store from https://curl.se/docs/caextract.html and used that by supplying --cacert option to curl command and again I received the same error.
By using -v option with curl command in output I receive which cacert store is used so with that I am sure it is using the one I explicitly added to the command.
Since the certificate exists in cacert store that I am telling curl to use, what else am I missing here?
Curl says ssl certificate expired but my ssl certificate not expired using php. I have no idea about this. Where do I get cert? Where should I add?
I'm working on a gRPC service, and we're using a CA certificate we generated ourselves for our server. Unfortunately, I can't seem to figure out how to tell grpc_cli about that certificate, and so I get "Handshake failed with fatal error SSL_ERROR_SSL: error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed."
I see an option for specifying the client cert and key, but not for the CA cert. What am I missing?
I have a Go program that uses tls.Server to accept TLS connections from clients. When a particular client connects, I'm getting the error "tls: failed to verify client's certificate: x509: certificate signed by unknown authority".
I'd like to see the certificate chain that was presented (and failed to verify) so that I can figure out what the client is doing wrong. Is there a way to do that using Go's tls package? The obvious answer - to use the ConnectionState method - doesn't work because the ConnectionState's PeerCertificates field is only populated after the handshake has completed successfully.
I'm getting an SSL Connection failed error when I try to connection to an HTTPS endpoint using Parse.Cloud.HTTPRequest. My guess is that the CA that issued the SSL Certificate isn't trusted by the Parse Server. Is there a way to trust that particular CA/Certificate?