Edit much later: as Gal Bracha noted in the comments, you ?might? need to delete /usr/local/opt/openssl before doing the reinstalls, just to be safe. I didn't need to at the time, but if you're still having trouble, give that a try.
I have a similar case. I need to install openssl via brew and then use pip to install mitmproxy. I get the same complaint from brew link --force. Following is the solution I reached: (without force link by brew)
Openssl@3 Failed To Download Resource Openssl@3 ✓✓✓ https://cinurl.com/2zE0ZE
I needed to install Python 3 on Mac and things escalated. In the end, updating homebrew, node and python lead to the problem with openssl. I did not have openssl 1.0 anymore, so I couldn't "brew switch" to it.
So what was still trying to use that old 1.0 version?
I was following the article Why 'apt-get install openssl' did not install last version of OpenSSL? to install openssl on my UBuntu box but am getting command not found on my ubuntu box, am a windows user and this is my first time experience on ubuntu box and not sure how it fix it
Doing this, openssl package worked. But if I try to install package "devtools", which was the initial action that triggered this whole mess, the same error appear while trying to install openssl (which is installed and working)
Once OPENSSL_cleanup() has been called the library cannot be reinitialised. Attempts to call OPENSSL_init_crypto() will fail and an ERR_R_INIT_FAIL error will be added to the error stack. Note that because initialisation has failed OpenSSL error strings will not be available, only an error code. This code can be put through the openssl errstr command line application to produce a human readable error (see errstr(1)).
./configure: error: SSL modules require the OpenSSL library. You can either do not enable the modules, or install the OpenSSL library into the system, or build the OpenSSL library statically from the source with nginx by using --with-openssl= option.
Though it turns out that is a soft link which points to something I deleted. OK, so I change the soft link and have it point to another openssl/opensslv.h file elsewhere on my system (there sure are a lot of openssl packages on my system, mostly having to do with rails or anaconda). After that I try running
If I do things more sensibly by installing openssl with brew and changing the opensslv.h soft link to point to the opensslv.h installed by brew, I get the same error when installing openssl in R (either in Rstudio or by running R in the terminal)
From what I've read online, that last R error (the package r namespace load failed one) has to do with multiple openssl versions on my system. And yes, I have a ton of openssl versions of my system (using locate and grep shows that I have 212 copies of openssl on my system) but the vast majority of those are from anaconda, ruby, or node, and the only one that looks like it's in my PATH is /usr/bin/openssl, which is read-only on later versions of macOS, btw.
To locate brew openssl use echo $(brew --prefix openssl) in your terminal, then add two lines to your /.R/Makevars file with the output, e.g. if the output of the command is /usr/local/opt/[email protected], add
I've added $CFG->opensslcnf = 'C:/PHP/extras/ssl/openssl.cnf'; to the config.php file, but I'm not 100% sure what the correct syntax is for the path since I've seen it a few different ways. I've also set an Environment Variable in Windows for OPENSSL_CONF to C:\PHP\extras\ssl\openssl.cnf, and made sure the openssl.dll PHP extension is enabled. Beyond that, I'm not sure what else to try.
I noticed some 404s in the .sig files in pacman -Syu --debug output so I blocked out that mirror and reran pacman -Syu --debug. No 404s and a whole bunch of upgrades, including openssl. Problem solved.
But, I also don't understand what is wrong with my system setup -- the original problem began on October 1 (after DST Root X3 expired) on our Centos6 servers running openssl 1.0.1 and 1.0.2. I've been trying to get this new Centos7 environment working in order to migrate our production environments before our current certs & keystores expire in 8 days!!
Your post #21 shows your Centos 7 system using openssl 1.1.1 although I thought the base package was still 1.0.2k on Centos7 too. How did you update that? I know EPEL7 has openssl 1.1.1 in it but installed from that it is named openssl11. At least that's how I understand it based on my use of RHEL7 and this stackoverflow post for Centos7.
I wondered about your openssl version as you were not using -servername for your s_client commands. Without that and openssl 1.0.2 your server responds with a self-signed cert which cannot verify (of course). The same can be seen with openssl 1.1.1 using -noservername with s_client.
On the newly spun up Centos7, the default openssl was 1.0.2. I continued to have the openssl failure. So I upgraded to 1.1.1k hoping this would solve my problem. I also updated ca-certificates and installed certbot using pip and not snap (my host provider recommended against using snap on a VPS).
Out of fear, I installed openssl at /usr/local/openssl rather than overwrite the existing ssl installation directories -- some research showed that legacy packages still require 1.0.2. Then I discovered that the certs folder was empty at /usr/local/openssl so I then created a symbolic link to /etc/ssl/certs:
As an aside, I would avoid using non-standard methods of installing key system components like openssl. As I noted earlier, openssl 1.1.1 is available in EPEL7 as a supported package component. All that is needed is to change the name in any command to openssl11. The link I provided to stackoverflow was for a post by the openssl package maintainer for EPEL7 who further linked to key info about RHEL/Centos. It isn't some random person doing something with unknown goals and implications.
Yes, the only problem I have had since October is with the "openssl verify -CAfile /etc/ssl/certs/ca-bundle.crt chain.pem" that I was using to verify the cerificate & chain prior to combining to create the keystore.
By default, openssl s_client will read from standard input for data to send to the remote server. Appending an echo to the one-liner sends a newline and immediately terminates the connection. Without this, you would need to press Ctrl+C to quit the connection.
First, you can list the supported ciphers for a particular SSL/TLS version using the openssl ciphers command. Below, you can see that I have listed out the supported ciphers for TLS 1.3. The -s flag tells the ciphers command to only print those ciphers supported by the specified TLS version (-tls1_3):
Are you putting the value "C:\Program Files\VMware\Infrastructure\SSOServer\bin" in the --openssl-path ? What if in the --openssl-path you put "C:\Program Files\VMware\Infrastructure\Inventory Service\bin/" ?
I've added the local path to the cacert.pem (as seen below) file to both openssl.cafile and curl.cainfo to the php.ini file. After restarting Apache (can see the new entries in php.ini) however the updates are still not being fetched.
So I went back to this today. Didn't change anything since your last post. The first thing I did was visit the reports page to see if the error was still being thrown and much to my surprise it wasn't. I then went to check the php.ini settings to confirm its settings. Under the 'openssl section' the 'openssl.capath' was using the absolute path to the cacert.pem file. Everything apparently was set correctly. Why the error didn't go away the other day after restarting Apache is beyond me. Even though this process requires restarting Apache, I took it one step further and cleared cache 2-3 times for good measure. Beyond me why it didn't resolve the other day.
So after checking this the php.ini file was using 'openssl.capath' with the absolute url to the cacert.pem file and an everything is working fine now. So I stand by my last comments. Don't know why starting Apache and clearing cache the other day didn't remove the error. Came back a few days later with the same settings and it is working fine.
Apache Tomcat requires the OCSP-enabled certificate to have the OCSP responder location encoded in the certificate. The basic OCSP-related certificate authority settings in the openssl.cnf file could look as follows:
The settings above encode the OCSP responder address 127.0.0.1:8088 into the certificate. Note that for the following steps, you must have openssl.cnf and other configuration of your CA ready. To generate an OCSP-enabled certificate:
Apache Tomcat will query an OCSP responder server to get the certificate status. When testing, an easy way to create an OCSP responder is by executing the following: openssl ocsp -port 127.0.0.1:8088 \ -text -sha256 -index index.txt \ -CA ca-chain.cert.pem -rkey ocsp-cert.key \ -rsigner ocsp-cert.crt
When trying to import a P12 certificate using the API SecPKCS12Import, it is failing with error errSecDecode = -26275 since 09/23 in production. We tried to figure out the change in our code base (client as well as server side) that might have triggered this failure but there is no change on either side. The same P12 certificate is successfully validated using the below mentioned openssl command on the terminal.
760c119bf3