Home News Best Way To Fix Certificado Ssl Pidgin Errors

Best Way To Fix Certificado Ssl Pidgin Errors

47
0

 

If you see ssl pidgin error Certificado ssl error code error on your computer, check out these repair tips.

 

 

All information, including names and email addresses, entered on this website or sent to the mailing lists associated with this website is publicly available. Don’t post confidential information, especially passwords!

Trac is switching to new services! Problems can be found in our new

An instance of YouTrack

and WIKI pages can be found on our

Website

.

Causes Of Errors

If you see a “Certificate could not be verified” error, it means that the certificate sent by your computer is not compatible with the required SSL certificates from Pidgin. … When a company offering a service that works with Pidgin renews their SSL certificates, they can use one that Pidgin does not accept. If you try to connect to this service, Pidgin will fail because the new SSL certificate is not recognized.

# 17118 Closed Malfunction (Firmly)

I created a new XMPP account to login to Google Talks like this:Base:

  • Username: my usernameGoogle caller (i.e. without @ gmail.com)
  • Domain: gmail.com
  • Password: The app password I created on my google account (as my regular password wouldn’t work if I had two-step verification enabled)
  • Advanced:

    • Encryption required
  • Port 5222 (standard)
  • File transfer proxy: proxy.eu.jabber.org (default)
  • Proxy:

    • use global proxy settings (default)

    error certificado ssl pidgin

    Other accounts like IRC will connect correctly. Only this XMPP is not done. Actually I am getting the following error:”SSL certificate error – the certificate could not be verified -The gmail.com certificate could not be verified. The displayed certificate chain is not valid. – SSL host presented an invalid certificate “

    And in debug:

     (14:12:31) Account: Sign in to [email protected]/.(14:12:31) Connection: Establish a connection. gc = 0x7fae936d27f0(14:12:31) dnssrv: Request SRV data record for gmail.com: _xmpp-client._tcp.gmail.com(14:12:31) dnssrv: Found 5 SRV records(14:12:31) dnsquery: do a DNS lookup for xmpp.l.google.com(14:12:31) DNS: Could not wait for child DNS19238: no child process(14:12:31) dns: New child DNS server created in 19254, now there are 1.(14:12:31) DNS: DNS request was sent to child 19254(14:12:31) dns: Received response for "xmpp.l.google.com"(14:12:31) dnsquery: Allowed IP for xmpp.l.google.com(14:12:31) Proxy: trying to connect to 74.125.71.125(14:12:31) Proxy: connect to xmpp.l.google.com:5222 without proxy(14:12:31) Proxy: connection is working(14:12:31) Proxy: connect to xmpp.l.google.com:5222.(14:12:31) Proxy: Connected to xmpp.l.google.com:5222.(14:12:31) jabber: Send ([email protected]): (14:12:31) jabber: Send ([email protected]): (14:12:31) jabber: Recv (379):        X-OAUTH2   X-GOOGLE-TOKEN   (14:12:31) jabber: Send ([email protected]): (14:12:31) jabber: Recv (50): (14:12:31) gnutls: Start handshake with gmail.com(14:12:31) gnutls: handshake completed(14:12:31) gnutls / x509: keypress: b0: d2: b9: d4: 9a: e9: 1f: d8: af: 6a: b3: df: 2f: fb: db: 1c: 26: 39: 28: 4th(14:12:31) gnutls / x509: Footprint: d6: ad: 07: c6: 67: 56: 30: f5: 7b: 92: 7f: 66: be: 8c: e1: f7: 68: f8: 79 : 48(14:12:31) gnutls / x509: keypress: 73: 59: 75: 5c: 6d: f9: a0: ab: c3: 06: 0b: ce: 36: 95: 64: c8: ec: 45: 42: a3(14:12:31) gnutls: Peer provided 3 certificates(14:12:31) gnutls: Lvl 0 Fingerprint SHA1: b0: d2: b9: d4: 9a: e9: 1f: d8: af: 6a: b3: df: 2f: fb: db: 1c: 26: 39 : 28: 4th(14:12:31) gnutls: Series: 1b: 53: bc: 55: bd: ba: bf: 6c(14:12:31) gnutls: Certificate DN: C = US, ST = California, L = Mountain View, O = Google Inc, CN = gmail.com(14:12:31) gnutls: certifier DN: C = US, O = Google Inc, CN = XXX Google Internet Authority G2(14:12:31) gnutls: Lvl 1 SHA1 fingerprint: d6: ad: 07: c6: 67: 56: 30: f5: 7b: 92: 7f: 66: be: 8c: e1: f7: 68: f8: 79:48(14:12:31) gnutls: Series: 02: 3a: 92(14:12:31) gnutls: Certificate DN: C = US, O = Google Inc, CN = Google Internet Authority G2(14:12:31) gnutls: Certificate issuer DN: C = US, O = GeoTrust Inc., CN = GeoTrust Global CA.(14:12:31) gnutls: Lvl 2 Fingerprint SHA1: 73: 59: 75: 5c: 6d: f9: a0: ab: c3: 06: 0b: ce: 36: 95: 64: c8: ec: 45 : 42: a3(14:12:31) gnutls: Series: 12: bb: e6(14:12:31) gnutls: Certificate DN: C = US, O = GeoTrust Inc., CN = GeoTrust Global CA.(14:12:31) gnutls: Certificate issuer DN: C = US, O = Equifax, OU = Equifax Secure CA(14:12:31) Certificate / x509 / tls_cached: start search gmail.com(14:12:31) certificate / x509 / tls_cached: Checking cached certificates ...(14:12:31) Certificate / x509 / tls_cached: ... Not in cache(14:12:31) gnutls / x509: Certified C = US, ST = California, L = Mountain View, O = Google Inc, CN= gmail.com is issued by C = US, O = Google Inc, CN = Google G2 Internet Authority, which does not match C = US, ST = California, L = Mountain View, O = Google Inc, CN = gmail.com.(14:12:31) Certificate: Verify signature string for uid = C = US, ST = California, L = Mountain View, O = Google Inc, CN = gmail.com(14:12:31) Certificate: ... Correct signature from C = US, O = Google Inc, CN = Google Internet Authority G2(14:12:31) Certificate: ... Nice signature from C = US, O = GeoTrust Inc., CN = GeoTrust Global CA.(14:12:31) Certificate: string VALID(14:12:31) Certificate / x509 / tls_cached: Find CA with DN = C = US, O = Equifax, OU = Equifax Secure Certificate Authority(14:12:31) Certificate / x509 / tls_cached: Also check if the CA is available with DN = C = US, O = GeoTrust Inc., CN = GeoTrust Global CA(14:12:31) gnutls: Trying to load X.509 certificates from /usr/local/Cellar/pidgin/2.11.0/share/purple/ca-certs/CAcert_Class3.pem(14:12:31) Certificate / x509 / ca: Root class CAcert 3 loaded from /usr/local/Cellar/pidgin/2.11.0/share/purple/ca-certs/CAcert_Class3.pem(14:12:31) gnutls: trying to download X.509 certificates from /usr/local/Cellar/pidgin/2.11.0/share/purple/ca-certs/CAcert_Root.pem(14:12:31) Certificate / x509 / ca: CA Certificate Signing Center downloaded from /usr/local/Cellar/pidgin/2.11.0/share/purple/ca-certs/CAcert_Root.pem(14:12:31) gnutls: Trying to download X.509 certificates from /usr/local/Cellar/pidgin/2.11.0/share/purple/ca-certs/mozilla.pem(14:12:31) Certificate / x509 / ca: Charged Trusted Network Center  Certum 2 certification from /usr/local/Cellar/pidgin/2.11.0/share/purple/ca-certs/mozilla.pem(14:12:31) Certificate / x509 / ca: SZAFIR ROOT CA2 downloaded from /usr/local/Cellar/pidgin/2.11.0/share/purple/ca-certs/mozilla.pem(14:12:31) Certificate / x509 / ca: CA WoSign ECC strain downloaded from /usr/local/Cellar/pidgin/2.11.0/share/purple/ca-certs/mozilla.pem(14:12:31) Certificate / x509 / ca: CA responsible for WoSign G2 from /usr/local/Cellar/pidgin/2.11.0/share/purple/ca-certs/mozilla.pem(14:12:31) Certificate / x509 / ca: OISTE Certification Authority WISeKey Global Root GB downloaded from /usr/local/Cellar/pidgin/2.11.0/share/purple/ca-certs/mozilla.pem(14:12:31) Certificate / x509 / ca: Certinomis loaded - root CA /usr/local/Cellar/pidgin/2.11.0/share/purple/ca-certs/mozilla.pem(14:12:31) Certificate / x509 / ca: Uploaded by TÃœRKTRUST Electronics Sertifika Hizmet SaÄŸlayÄ ± cÄ ± sÄ ± H6 from /usr/local/Cellar/pidgin/2.11.0/share/purple/ca-certs /mozilla.pem(14:12:31) Certificate / x509 / ca: Uploaded by TÃœRKTRUST Electronics Sertifika Hizmet SaÄŸlayÄ ± cÄ ± sÄ ± H5 from /usr/local/Cellar/pidgin/2.11.0/share/purple/ca-certs /mozilla.pem(14:12:31) Certificate / x509 / ca: CFCA EV ROOT downloaded from /usr/local/Cellar/pidgin/2.11.0/share/purple/ca-certs/mozilla.pem(14:12:31) Certificate / x509 / ca: Entrust Root Certification Authority loaded - EC1 from /usr/local/Cellar/pidgin/2.11.0/share/purple/ca-certs/mozilla.pem(14:12:31) Certificate / x509 / ca: Entrust Root CA loaded - G2 from /usr/local/Cellar/pidgin/2.11.0/share/purple/ca-certs/mozilla.pem(14:12:31) Certificate / x509 / ca: Root CA IdenTrust 1 Public Sectorand was downloaded from /usr/local/Cellar/pidgin/2.11.0/share/purple/ca-certs /mozilla.pem(14:12:31) Certificate / x509 / ca: IdenTrust 1 Commercial Root CA was downloaded from /usr/local/Cellar/pidgin/2.11.0/share/purple/ca-certs/mozilla.pem(14:12:31) Certificate / x509 / ca: Responsible state of the Nederlanden EV root CA from /usr/local/Cellar/pidgin/2.11.0/share/purple/ca-certs/mozilla. pem(14:12:31) Certificate / x509 / ca: The loaded state of the Nederlanden root CA is G3 from /usr/local/Cellar/pidgin/2.11.0/share/purple/ca-c