shift / pulledpork

Automatically exported from code.google.com/p/pulledpork
GNU General Public License v2.0
0 stars 0 forks source link

Error 500 Can't verify SSL peers without knowning which Certificate Authorities to trust #73

Closed GoogleCodeExporter closed 9 years ago

GoogleCodeExporter commented 9 years ago
What steps will reproduce the problem?
1. Edit pulledpork.conf, and change lines, like documenation
*. Replace with my own oinkcode.
• uncomment the line that reads ips_policy=security.
• Find and change the rule_path to /etc/snort/rules/snort.rules
• Find and change local_rules path to /etc/snort/rules/local.rules
• Find and change sid_msg path to /etc/snort/sid-msg.map.
• Find and change config_path to /etc/snort/snort.conf
• Find and change sostub_path to /etc/snort/rules/so_rules.rules
• Find and change the distro to FC-12
• Find pid_path. Change the statement to read “pid_path=/var/run/
snort_eth1.pid,/var/run/barnyard2_eth1.pid”

2. After execute
/usr/local/pulledpork-0.5.0/pulledpork.pl -c /etc/snort/pulledpork.conf
3. Error message

What is the expected output? What do you see instead?
Fly piggy Fly

Checkingng latest MD5 for snortrules-snapshot-2904.tar.gz....
Error 500 when 
https://www.snort.org/reg-rules/snortrules-snapshot-2904.tar.gz.md5/fd6d4ce95597
918d338669c6ca53161e001e5247 ==> 500 Can't verify SSL peers without knowning 
which Certificate Authorities to trust
    Error 500 when fetching https://www.snort.org/reg-rules/snortrules-snapshot-2904.tar.gz.md5 at /usr/local/pulledpork-0.5.0/pulledpork.pl line 390
fetching https://www.snort.org/reg-rules/snortrules-snapshot-2904.tar.gz.md5 at 
/usr/local/pulledpork-0.5.0/pulledpork.pl line 390
--vv option
https://www.snort.org/reg-rules/snortrules-snapshot-2904.tar.gz.md5/fd6d4ce95597
918d338669c6ca53161e001e5247 ==> 500 Can't verify SSL peers without knowning 
which Certificate Authorities to trust
    Error 500 when fetching https://www.snort.org/reg-rules/snortrules-snapshot-2904.tar.gz.md5 at /usr/local/pulledpork-0.5.0/pulledpork.pl line 390

What version of the product are you using? On what operating system?
snort 2.9.0.4
pulledpork 0.5.0
banyard2-1.9
OS Fedora 14
Please provide any additional information below.

Original issue reported on code.google.com by com90...@gmail.com on 22 Mar 2011 at 6:40

GoogleCodeExporter commented 9 years ago
This is caused by having outdated trusted root certificates on the system that 
is running the pulledpork tool.  Please updated those and let me know the 
outcome.  I am marking this as an invalid bug as pulledpork doesn't have 
anything to do with your trusted certificate store.

Original comment by Cummin...@gmail.com on 22 Mar 2011 at 8:13

GoogleCodeExporter commented 9 years ago
I update trusted root certificate with the next command
wget -O - http://www.cacert.org/certs/root.txt >> 
/etc/pki/tls/certs/ca-bundle.crt
all it's ok.
But It seems can't find the the path, I try to look for it in the browser, and 
appear the next message:  The page you are looking for isn’t here, 

Error 500 when fetching 
https://www.snort.org/reg-rules/snortrules-snapshot-2904.tar.gz.md5 at 
/usr/local/pulledpork-0.5.0/pulledpork.pl line 390

Original comment by com90...@gmail.com on 22 Mar 2011 at 9:13

GoogleCodeExporter commented 9 years ago
I tested the url and it seems to work for me (using your oinkcode)...  I might 
also suggest using the svn version of pulledpork ( the 0.6.0 development 
version ) it has a ton of bug fixes in it.. I'm hoping to have it released 
soon! 

Original comment by Cummin...@gmail.com on 22 Mar 2011 at 9:18

GoogleCodeExporter commented 9 years ago
I'm getting the same problem on Centos 5.5.  If I paste the generated URL into 
a browser, the link works, but PP errors out.

Original comment by garyho...@gmail.com on 24 Mar 2011 at 8:33