01-19-2024, 11:13 AM | #16 |
Enthusiast
Posts: 27
Karma: 10
Join Date: Dec 2023
Device: K3
|
I added execute permission for update-ca-certificates with:
chmod +x /usr/sbin/update-ca-certificates But update-ca-certificates gives me this error now: mktemp: invalid option -- p BusyBox v1.7.2 (2019-05-30 09:57:42 UTC) multi-call binary Usage: mktemp [-dq] TEMPLATE Create a temporary file with its name based on TEMPLATE. TEMPLATE is any name with six 'Xs' (i.e., /tmp/temp.XXXXXX). Options: -d Make a directory instead of a file -q Fail silently if an error occurs |
01-19-2024, 12:03 PM | #17 |
Enthusiast
Posts: 27
Karma: 10
Join Date: Dec 2023
Device: K3
|
I modify update-ca-certificates file and looks like was able to update certs:
/$ update-ca-certificates Updating certificates in /etc/ssl/certs... 0 added, 0 removed; done. Running hooks in /etc/ca-certificates/update.d... done. Now I have bunch of pem certs in ssl/cert folder. Unfortunately still not able to get secure connection with webpages. |
01-19-2024, 12:14 PM | #18 |
Enthusiast
Posts: 27
Karma: 10
Join Date: Dec 2023
Device: K3
|
Deleted all in ssl/cert folder and updated again:
/etc/ssl/certs$ update-ca-certificates Updating certificates in /etc/ssl/certs... openssl:Error: 'rehash' is an invalid command. Standard commands asn1parse ca ciphers crl crl2pkcs7 dgst dh dhparam dsa dsaparam ec ecparam enc engine errstr gendh gendsa genrsa nseq ocsp passwd pkcs12 pkcs7 pkcs8 prime rand req rsa rsautl s_client s_server s_time sess_id smime speed spkac verify version x509 Message Digest commands (see the `dgst' command for more details) md2 md4 md5 rmd160 sha sha1 Cipher commands (see the `enc' command for more details) aes-128-cbc aes-128-ecb aes-192-cbc aes-192-ecb aes-256-cbc aes-256-ecb base64 bf bf-cbc bf-cfb bf-ecb bf-ofb cast cast-cbc cast5-cbc cast5-cfb cast5-ecb cast5-ofb des des-cbc des-cfb des-ecb des-ede des-ede-cbc des-ede-cfb des-ede-ofb des-ede3 des-ede3-cbc des-ede3-cfb des-ede3-ofb des-ofb des3 desx idea idea-cbc idea-cfb idea-ecb idea-ofb rc2 rc2-40-cbc rc2-64-cbc rc2-cbc rc2-cfb rc2-ecb rc2-ofb rc4 rc4-40 140 added, 0 removed; done. Running hooks in /etc/ca-certificates/update.d... done. It seems like the update-ca-certificates command has run successfully, and 140 certificates were added. The warning about 'rehash' being an invalid command can be safely ignored in this context. The system has been updated with the new certificates, and the hooks have been executed. Still no secure connection. |
Tags |
browser, ssl certificate |
|
Similar Threads | ||||
Thread | Thread Starter | Forum | Replies | Last Post |
SSL: CERTIFICATE_VERIFY_FAILED | raghiid | Library Management | 0 | 01-11-2022 07:28 AM |
plugin ssl error | waces | Plugins | 0 | 06-16-2020 08:12 AM |
[SSL: CERTIFICATE_VERIFY_FAILED] | Korben Dallas | Calibre | 8 | 03-02-2020 06:48 AM |