Bug 1385539 - Empathy reports Gmail certificate as self signed.
Summary: Empathy reports Gmail certificate as self signed.
Keywords:
Status: CLOSED DUPLICATE of bug 1381671
Alias: None
Product: Fedora
Classification: Fedora
Component: empathy
Version: 24
Hardware: x86_64
OS: Linux
unspecified
medium
Target Milestone: ---
Assignee: Brian Pepple
QA Contact: Fedora Extras Quality Assurance
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2016-10-17 09:51 UTC by Paolo Antinori
Modified: 2016-10-18 23:31 UTC (History)
3 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed: 2016-10-18 23:31:27 UTC
Type: Bug
Embargoed:


Attachments (Terms of Use)

Description Paolo Antinori 2016-10-17 09:51:09 UTC
Description of problem:

Empathy reports gmail certificate as self signed.

Version-Release number of selected component (if applicable):

$ rpm -qa | ag empathy
empathy-3.12.12-2.fc24.x86_64


How reproducible:

Always


Steps to Reproduce:
1. just try to go online with a gtalk account
2.
3.

Actual results:

Window "Untrusted connection" pops up


Expected results:

Validate the certificate automatically and don't report any alert

Additional info:

- it seems very similar to this old bug: https://bugs.launchpad.net/ubuntu/+source/empathy/+bug/828756

Certificate details:

```

gmail.com
Identity: gmail.com
Verified by: Google Internet Authority G2
Expires: 29/12/16

Subject Name
C (Country):	US
ST (County):	California
L (Locality):	Mountain View
O (Organisation):	Google Inc
CN (Common Name):	gmail.com
Issuer Name
C (Country):	US
O (Organisation):	Google Inc
CN (Common Name):	Google Internet Authority G2
Issued Certificate
Version:	3
Serial Number:	47 65 04 BF 05 8D B2 17
Not Valid Before:	2016-10-06
Not Valid After:	2016-12-29
Certificate Fingerprints
SHA1:	44 5B C2 8F 79 09 E5 36 85 42 33 8A 4E 6D AF 6E F3 8D A3 C5
MD5:	4F D2 2B 9D 34 34 53 E3 40 CC 14 CE 13 99 AC 89
Public Key Info
Key Algorithm:	RSA
Key Parameters:	05 00
Key Size:	2048
Key SHA1 Fingerprint:	D4 B0 04 04 E1 C6 C1 3A 29 10 CD 14 A7 63 7B 39 76 02 E3 0B
Public Key:	30 82 01 0A 02 82 01 01 00 B5 F4 6A F5 09 3F 72 4C 22 A0 EE 77 44 F8 7C 26 B8 4E BE C3 5F A7 6A 0C 6E 4F F1 59 CE 3B 7B D0 24 96 5C 4B 56 04 14 EE 86 2B E5 F2 2A F5 68 F7 33 C9 AD FE AE EF E9 6E 3C C2 7E 65 70 AC 1B FB 6E BE 51 EE 39 07 90 90 A2 95 84 71 7D 03 9D 15 32 0A 2F 40 6C B2 82 8A 99 F0 5F 12 C1 2B 6F FE 0F 33 9A 09 46 63 14 47 F1 64 18 9F E3 92 35 0D E7 4D 3B B2 DD 3E 7D 69 6D ED D2 DB 82 AD 4F 57 B5 C6 24 C9 57 2C 34 E0 2B 98 80 12 59 13 BE 74 D4 FE 16 E1 A3 9B 37 2B 81 91 85 F5 4A 75 E3 9E 4D 89 17 9C D0 A2 AF 46 B0 23 52 07 84 35 BD 57 AB FF 89 9C 0F FA EF AD 61 A5 12 5E 70 41 F1 7A F3 A5 C1 AC 67 8D C2 09 CB 9A FD 88 6B 27 08 FF 12 AA 85 56 47 96 72 FD E0 22 E0 00 4F 7F FD F2 BA 55 31 2E 71 CC C1 A2 BB BB 5F D2 B6 91 F5 EC D6 D1 28 7D 64 9B DD 5F 16 AB 5D F7 5B 6D 07 5D 02 03 01 00 01
Extended Key Usage
Allowed Purposes:	Server Authentication
Client Authentication
Critical:	No
Subject Alternative Names
DNS:	gmail.com
DNS:	*.gmail.com
DNS:	policy.mta-sts.gmail.com
Critical:	No
Extension
Identifier:	1.3.6.1.5.5.7.1.1
Value:	30 5A 30 2B 06 08 2B 06 01 05 05 07 30 02 86 1F 68 74 74 70 3A 2F 2F 70 6B 69 2E 67 6F 6F 67 6C 65 2E 63 6F 6D 2F 47 49 41 47 32 2E 63 72 74 30 2B 06 08 2B 06 01 05 05 07 30 01 86 1F 68 74 74 70 3A 2F 2F 63 6C 69 65 6E 74 73 31 2E 67 6F 6F 67 6C 65 2E 63 6F 6D 2F 6F 63 73 70
Critical:	No
Subject Key Identifier
Key Identifier:	F4 F2 EB 37 44 4D D9 12 41 08 E3 7A 8E A9 8B DF 5F E9 66 06
Critical:	No
Basic Constraints
Certificate Authority:	No
Max Path Length:	Unlimited
Critical:	Yes
Extension
Identifier:	2.5.29.35
Value:	30 16 80 14 4A DD 06 16 1B BC F6 68 B5 76 F5 81 B6 BB 62 1A BA 5A 81 2F
Critical:	No
Extension
Identifier:	2.5.29.32
Value:	30 18 30 0C 06 0A 2B 06 01 04 01 D6 79 02 05 01 30 08 06 06 67 81 0C 01 02 02
Critical:	No
Extension
Identifier:	2.5.29.31
Value:	30 27 30 25 A0 23 A0 21 86 1F 68 74 74 70 3A 2F 2F 70 6B 69 2E 67 6F 6F 67 6C 65 2E 63 6F 6D 2F 47 49 41 47 32 2E 63 72 6C
Critical:	No
Signature
Signature Algorithm:	1.2.840.113549.1.1.11
Signature Parameters:	05 00
Signature:	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

```

Comment 1 Tom Prince 2016-10-18 23:31:27 UTC
Closing in favour of 1381671, since that has some explanation of what is going on.

*** This bug has been marked as a duplicate of bug 1381671 ***


Note You need to log in before you can comment on or make changes to this bug.