Description of problem: Using "Open URL" with a https URL leads to error message: "TrustFailure (Authentication failed, see inner exception.)" Everything works fine with a http URL. Version-Release number of selected component (if applicable): keepass-2.41-3.fc30.x86_64 How reproducible: Always Steps to Reproduce: 1. Start keepass 2. Use "File>Open>Open URL" 3. Enter URL "https://www.bubecks.de/dav/bubeck/zugaenge-tbubeck.kdbx" Actual results: "TrustFailure (Authentication failed, see inner exception.)" Expected results: "(401) Unauthorized" Because no user/pw is given. If you would enter a valud user/pw it succeeds Additional info: http works, https does not. Using the keepass from https://keepass.info/download.html works also with https
Does running `sudo cert-sync /etc/pki/tls/certs/ca-bundle.crt` solve this for you?
YES, it does. (I tried it once more before cert-sync, to make sure, that it still not worked. It failed. After "cert-sync" it works without problems).
Raised pull request https://src.fedoraproject.org/rpms/mono/pull-request/3.
cert-sync still needed in fc31 with keepass-2.42.1-3.fc31.x86_64 After cert-sync everything works.
FC31 still uses mono-core-5.20.1-1.fc31.x86_64 and I see you PR went into 5.20.1-2 at https://koji.fedoraproject.org/koji/buildinfo?buildID=1399968 Is there a Bodhi Update request for 5.20.1-2 missing?
FEDORA-2019-9ef37b01aa has been submitted as an update to Fedora 31. https://bodhi.fedoraproject.org/updates/FEDORA-2019-9ef37b01aa
Thanks for the reminder. I must have forgotten about it, after initiating the build. Now the bodhi update is on its way.
mono-5.20.1-2.fc31 has been pushed to the Fedora 31 testing repository. If problems still persist, please make note of it in this bug report. See https://fedoraproject.org/wiki/QA:Updates_Testing for instructions on how to install test updates. You can provide feedback for this update here: https://bodhi.fedoraproject.org/updates/FEDORA-2019-9ef37b01aa
mono-5.20.1-2.fc31 has been pushed to the Fedora 31 stable repository. If problems still persist, please make note of it in this bug report.