Short of hacking neon/curl/vagrant, is there another solution? Perhaps use a config.vm.box_url which is a file:// URL?
Thanks
> To unsubscribe from this group and stop receiving emails from it, send an email to vagrant-up+unsubscribe@googlegroups.com.
> For more options, visit https://groups.google.com/d/optout.
--
You received this message because you are subscribed to a topic in the Google Groups "Vagrant" group.
To unsubscribe from this topic, visit https://groups.google.com/d/topic/vagrant-up/gp-vueK03WU/unsubscribe.
To unsubscribe from this group and all its topics, send an email to vagrant-up+unsubscribe@googlegroups.com.
Thanks
On Wed, 31 Dec 2014 11:36 PM Torben Knerr <torben...@gmail.com> wrote:
The latest cacerts bundle from http://curl.haxx.se/docs/sslcerts.html
has some weak 1024 bit RSA certs removed in September 2014:
http://curl.haxx.se/mail/lib-2014-09/0041.html
This causes some https sites to fail, among others Amazon S3 on which
several base boxes are hosted:
https://forums.aws.amazon.com/thread.jspa?threadID=164095
As a workaround, you can use an older version of the cacerts bundle
from August, e.g. this one here:
https://github.com/bagder/ca-bundle/blob/e9175fec5d0c4d42de24ed6d84a06d504d5e5a09/ca-bundle.crt
Dowload the file, then this should work:
```
export SSL_CERT_FILE=/path/to/ca-bundle.crt
vagrant up
```
HTH, Torben
On Wed, Dec 31, 2014 at 7:59 AM, Sayth Renshaw <flebbe...@gmail.com> wrote:
> So was this solved ? I still can't get it to work?
>
> Sayth
>
> --
> You received this message because you are subscribed to the Google Groups "Vagrant" group.
> To unsubscribe from this group and stop receiving emails from it, send an email to vagrant-up+...@googlegroups.com.
> For more options, visit https://groups.google.com/d/optout.
--
You received this message because you are subscribed to a topic in the Google Groups "Vagrant" group.
To unsubscribe from this topic, visit https://groups.google.com/d/topic/vagrant-up/gp-vueK03WU/unsubscribe.
To unsubscribe from this group and all its topics, send an email to vagrant-up+...@googlegroups.com.
$ vagrant --version
Vagrant 1.7.2
$ /opt/vagrant/bin/../embedded/bin/curl -v https://atlas.hashicorp.com/
* About to connect() to atlas.hashicorp.com port 443 (#0)
* Trying 107.23.224.212...
* Adding handle: conn: 0x82a200
* Adding handle: send: 0
* Adding handle: recv: 0
* Curl_addHandleToPipeline: length: 1
* - Conn 0 (0x82a200) send_pipe: 1, recv_pipe: 0
* Connected to atlas.hashicorp.com (107.23.224.212) port 443 (#0)
* SSLv3, TLS handshake, Client hello (1):
* SSLv3, TLS handshake, Server hello (2):
* SSLv3, TLS handshake, CERT (11):
* SSLv3, TLS alert, Server hello (2):
* SSL certificate problem: unable to get local issuer certificate
* Closing connection 0
curl: (60) SSL certificate problem: unable to get local issuer certificate
More details here: http://curl.haxx.se/docs/sslcerts.html
curl performs SSL certificate verification by default, using a "bundle"
of Certificate Authority (CA) public keys (CA certs). If the default
bundle file isn't adequate, you can specify an alternate file
using the --cacert option.
If this HTTPS server uses a certificate signed by a CA represented in
the bundle, the certificate verification probably failed due to a
problem with the certificate (it might be expired, or the name might
not match the domain name in the URL).
If you'd like to turn off curl's verification of the certificate, use
the -k (or --insecure) option.
The os-supplied curl works fine:
$ curl -v https://atlas.hashicorp.com/
* Hostname was NOT found in DNS cache
* Trying 107.23.224.212...
* Connected to atlas.hashicorp.com (107.23.224.212) port 443 (#0)
* TLS 1.2 connection using TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
* Server certificate: *.hashicorp.com
* Server certificate: RapidSSL SHA256 CA - G3
* Server certificate: GeoTrust Global CA
> GET / HTTP/1.1
> User-Agent: curl/7.37.1
> Host: atlas.hashicorp.com
> Accept: */*
>
< HTTP/1.1 200 OK
Out of curiosity, why does Vagrant ship with its own curl?
cheers,
Chris
If anyone else runs into this problem. In case you trust the source you can use the config.vm.box_download_insecure = true switch to force vagrant to use --insecure on the curl method.