Note: This bug is displayed in read-only format because the product is no longer active in Red Hat Bugzilla.
For bugs related to Red Hat Enterprise Linux 2.1 product line. For Red Hat Enterprise Linux 6 and above, please visit Red Hat JIRA https://issues.redhat.com/secure/CreateIssue!default.jspa?pid=12332745 to report new issues.

Bug 113118

Summary: brower reports server certificate as either being expired or not yet valid
Product: Red Hat Enterprise Linux 2.1 Reporter: Scott Sibert <ssibert>
Component: mod_sslAssignee: Joe Orton <jorton>
Status: CLOSED WONTFIX QA Contact: Brian Brock <bbrock>
Severity: low Docs Contact:
Priority: medium    
Version: 2.1   
Target Milestone: ---   
Target Release: ---   
Hardware: i686   
OS: Linux   
URL: Verisign intermediate certificate expired 1/7/04
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2007-10-19 19:23:21 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:

Description Scott Sibert 2004-01-08 16:40:50 UTC
From Bugzilla Helper:
User-Agent: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.4.1)
Gecko/20031030

Description of problem:
the intermediate Verisign certificate has expired (was valid 4/16/97
through 1/7/04).  I either have to update the intermediate certificate
myself (which I did already) or RedHat should put out a new package
with the updated intermediate certificate.

Version-Release number of selected component (if applicable):
apache-1.3.27-6.ent

How reproducible:
Always

Steps to Reproduce:
1. Install verisign certificate
2. Browse to server
3.
    

Actual Results:  Received security notice that certificate is either
expired or is not yet valid.

Expected Results:  no messages, just surf normally

Additional info:

It was fairly easy to update (fix), but it might be good to release an
update anyway for those people who don't want to or can't spend the
time to manually update each machine they have.  Also, I have not
checked RHEL3; I just noticed it on this one machine that uses a
certificate.

Comment 1 Scott Sibert 2004-01-08 16:50:56 UTC
sorry; I later realized it should be mod_ssl and not apache since the
CA bundle is shipped with mod_ssl

Comment 2 Scott Sibert 2004-01-08 16:51:41 UTC
<sigh> and the mod_ssl version is currently mod_ssl-2.8.12-3

Comment 3 Joe Orton 2005-09-12 14:20:39 UTC
The intermediate cert which expired was not shipped in the root CA bundle
/etc/httpd/conf/ssl.crt/ca-bundle.crt nor anywhere else in the mod_ssl package
that I'm aware of.

Comment 5 RHEL Program Management 2007-10-19 19:23:21 UTC
This bug is filed against RHEL2.1, which is in maintenance phase.
During the maintenance phase, only security errata and select mission
critical bug fixes will be released for enterprise products.  Since
this bug does not meet that criteria, it is now being closed.

For more information of the RHEL errata support policy, please visit:
http://www.redhat.com/security/updates/errata/

If you feel this bug is indeed mission critical, please contact your
support representative.  You may be asked to provide detailed
information on how this bug is affecting you.