Bug 348318 - Will not connect to openconnect vpn if signer not found
Summary: Will not connect to openconnect vpn if signer not found
Status: RESOLVED FIXED
Alias: None
Product: plasma-nm
Classification: Plasma
Component: general (show other bugs)
Version: 5.3.0
Platform: Kubuntu Linux
: NOR normal
Target Milestone: ---
Assignee: Lukáš Tinkl
URL:
Keywords:
Depends on:
Blocks:
 
Reported: 2015-05-27 15:34 UTC by Leon Maurer
Modified: 2015-12-24 07:03 UTC (History)
13 users (show)

See Also:
Latest Commit:
Version Fixed In:
Sentry Crash Report:


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Leon Maurer 2015-05-27 15:34:13 UTC
First off, let me say that that I'm not certain that this is a problem with KDE; it could be a problem with some underlying software. All I know is that this problem showed up when I upgraded from Kubuntu 14.10 to 15.04, which included an upgrade to Frameworks 5. However, it may be a KDE problem, so I'll start here.

If I try to connect to a vpn I use, I get a pop-up saying:

    Check failed for certificate from VPN server "dept-ra-cssc.vpn.wisc.edu".
    Reason: signer not found
    Accept it anyway?

This is not new (it happened with previous versions of networkmanager). However when I tell it to connect anyway, the pop-up goes away and the main windows says:

    Failed to open HTTPS connection to dept-ra-cssc.vpn.wisc.edu

Not surprisingly, network manager does not connect to the VPN. If I click "View Log", I get the following:

    POST https://dept-ra-cssc.vpn.wisc.edu/
    Attempting to connect to server 144.92.42.108:443
    SSL negotiation with dept-ra-cssc.vpn.wisc.edu
    Server certificate verify failed: signer not found
    SSL connection failure: Error in the certificate.
    Failed to open HTTPS connection to dept-ra-cssc.vpn.wisc.edu

FWIW, in the popup, there is the following additional information:

X.509 Certificate Information:
Version: 3
Serial Number (hex): 0080ebb5df10f74fb514696ef69e148cc8
Issuer: C=US,ST=MI,L=Ann Arbor,O=Internet2,OU=InCommon,CN=InCommon RSA Server CA
Validity:
Not Before: Thu Feb 05 00:00:00 UTC 2015
Not After: Tue Mar 06 23:59:59 UTC 2018
Subject: C=US,postalCode=53706,ST=WI,L=Madison,street=1210 West Dayton Street,O=University of Wisconsin-Madison,OU=OCIS,CN=dept-ra-cssc.vpn.wisc.edu,1.2.840.113549.1.9.2=#162366612d637373632d623338302d31302d76706e2d7072693138732e776973632e656475
Subject Public Key Algorithm: RSA
Algorithm Security Level: Medium (2048 bits)
Modulus (bits 2048):
00:af:b4:00:a1:43:61:66:e1:d0:e6:02:2d:05:51:44
17:38:02:4e:f1:54:b4:fd:9c:cb:e9:37:ae:38:bf:c5
f7:13:4b:4b:5b:a7:17:72:58:c5:e5:00:ee:b2:37:10
a8:67:46:f7:55:33:30:d0:09:3f:7f:ae:81:6e:63:63
7c:5b:32:0a:9a:84:a5:4f:f2:4c:e5:0b:08:24:db:5b
4d:a2:b2:aa:32:52:8c:6b:90:6c:83:dd:94:5d:77:54
7f:5a:70:3a:95:61:36:25:8f:7c:48:e4:84:00:b6:95
4c:5a:c7:39:3e:a5:a2:42:aa:60:8a:78:78:e4:3b:9c
4e:fa:15:3a:93:89:76:b5:80:13:a9:08:ef:ac:65:c0
e2:98:44:f4:cc:46:ef:e3:49:37:18:ab:a9:7b:73:00
7a:b2:4b:b8:93:06:72:a3:da:7c:77:35:08:fa:f5:ad
74:29:0c:1b:cd:2f:ef:4c:fc:b9:34:82:25:e9:10:0a
13:7f:f5:59:85:81:6b:e4:ad:ce:42:f2:3d:b7:e5:9a
6b:70:74:79:ad:39:68:13:4e:ca:58:79:95:28:26:5e
69:75:de:af:f1:d1:f6:f2:a7:86:35:0b:31:7e:8a:d4
ea:77:e3:21:e0:be:f9:0d:a7:e5:2f:bf:99:3e:9c:04
db
Exponent (bits 24):
01:00:01
Extensions:
Authority Key Identifier (not critical):
1e05a3778f6c96e25b874ba6b486ac71000ce738
Subject Key Identifier (not critical):
62aca730c0842d047d64bba0915fb654830f4f6f
Key Usage (critical):
Digital signature.
Key encipherment.
Basic Constraints (critical):
Certificate Authority (CA): FALSE
Key Purpose (not critical):
TLS WWW Server.
TLS WWW Client.
Certificate Policies (not critical):
1.3.6.1.4.1.5923.1.4.3.1.1
URI: https://www.incommon.org/cert/repository/cps_ssl.pdf
2.23.140.1.2.2
CRL Distribution points (not critical):
URI: http://crl.incommon-rsa.org/InCommonRSAServerCA.crl
Authority Information Access (not critical):
Access Method: 1.3.6.1.5.5.7.48.2 (id-ad-caIssuers)
Access Location URI: http://crt.usertrust.com/InCommonRSAServerCA_2.crt
Access Method: 1.3.6.1.5.5.7.48.1 (id-ad-ocsp)
Access Location URI: http://ocsp.usertrust.com
Subject Alternative Name (not critical):
DNSname: dept-ra-cssc.vpn.wisc.edu
Signature Algorithm: RSA-SHA256
Signature:
63:88:8b:e2:7f:8b:ff:28:a2:0e:b0:16:9a:69:9a:f8
dc:9d:6d:df:09:e2:d1:78:48:65:74:30:e7:c4:45:aa
ba:19:8f:40:28:7b:d6:aa:1d:de:81:73:cb:70:5d:1f
58:6a:1d:cd:10:cf:98:4c:38:56:d4:ab:0f:2c:be:bb
b0:27:22:21:91:3c:60:57:95:4e:aa:2d:ee:3b:10:9f
b8:f0:54:ed:0e:68:20:ee:12:77:08:2b:66:7b:49:21
3c:f3:1b:2c:45:eb:a0:f1:96:3c:e6:b4:4c:7f:33:d4
61:19:41:ad:11:11:46:ff:94:0a:9b:2f:75:2e:19:a6
22:4e:e4:ef:77:8b:5e:b3:f8:38:9d:ba:1e:51:8c:43
9f:0b:d8:2c:1a:52:be:00:eb:a1:f7:3a:42:83:8c:13
ec:9c:9e:e0:e9:76:28:fb:9c:a9:29:51:32:cd:0f:1c
1e:ff:a9:dc:52:61:fa:f9:de:39:a8:de:34:cf:0e:06
b7:b8:e0:2f:cd:92:75:7a:7d:41:db:c8:6e:5c:2c:58
5e:70:fa:45:df:fa:91:ec:85:40:db:da:1e:95:0a:c2
c4:64:6f:85:62:d7:96:79:f3:6e:99:60:a2:a8:f4:c9
ae:43:58:6e:53:12:f0:9e:16:d5:59:dd:5b:fc:73:88
Other Information:
SHA1 fingerprint:
89db514cabc86168864a02d7ad28fbd1de0ef2d4
SHA256 fingerprint:
a8d1f7a7ef260005ef8d5aeafa43e2ecd75fedd2763306869e1a4397e0243fb3
Public Key ID:
fd87d52d2889ce6f20da039597c90d3581a6f33b
Public key's random art:
+--[ RSA 2048]----+
| o+. |
| + . |
| = = |
| = =o.. . ..|
| . +S + . o o|
| . .oo o o . |
| + .oo o . |
| . o E.. . |
| . o. |
+-----------------+

Reproducible: Always
Comment 1 Leon Maurer 2015-05-27 15:36:31 UTC
I should add that this sounds very similar to bug 308630.
Comment 2 Wim Entrop 2015-05-29 20:07:22 UTC
Same problem here. After upgrading from kubuntu 14.10 to 15.04 is is not possible to setup a vpn connection if the certificate is not recognized. using network-manager-openconnect.
On a system running ubuntu 15.04  (also upgraded from 14.10) using  network-manager-openconnect-gnome everything works.
Problem is that under kubuntu the screen for accepting the certificate is shown but the connection is already refused. The errorlog op openconnect is the same as with Leon.
There is not even the change to provide your credentials.
==================
POST https://xxx.yyy.eu/
Attempting to connect to server xxx.xxx.xxx.xxx:443
SSL negotiation with xxx.yyy.eu
Server certificate verify failed: signer not found
SSL connection failure: Error in the certificate.
Failed to open HTTPS connection to xxx.yyy.eu
=======================================
Comment 3 Daniel Theron 2015-06-26 17:20:24 UTC
I have the same problem here. Installed Kubuntu 15.04 from scratch & installed network-manager-openconnect (including dependencies - openconnect + vpnc-scripts)

POST https://hostx.domainy.com/
Attempting to connect to server xx.x.xx.xxx:443
SSL negotiation with hostx.domainy.com
Server certificate verify failed: signer not found
SSL connection failure: Error in the certificate.
Failed to open HTTPS connection to hostx.domainy.com

Also did not ask me for my credentials.

Versions:
vpnc-scripts (0.1~git20140806-1)
openconnect (6.00-1)
network-manager-openconnect (0.9.10.0-1ubuntu2)

Workaround - connect to VPN from command line:
$ sudo openconnect hostx.domainy.com
POST https://hostx.domainy.com/
Attempting to connect to server xx.x.xx.xxx:443
SSL negotiation with hostx.domainy.com
Server certificate verify failed: signer not found

Certificate from VPN server "hostx.domainy.com" failed verification.
Reason: signer not found
Enter 'yes' to accept, 'no' to abort; anything else to view: yes
Connected to HTTPS on hostx.domainy.com
XML POST enabled
Please enter your username and password.
GROUP: [SSL]:SSL
POST https://hostx.domainy.com/
XML POST enabled
Please enter your username and password.
Username:domain123\professorx
Password:
POST https://hostx.domainy.com/
Got CONNECT response: HTTP/1.1 200 OK
CSTP connected. DPD 30, Keepalive 20
Connect Banner:
| Notice: This system is intended solely for users authorized by ABC
| Worldwide, Inc. and related and affiliated entities ('ABC'). By
| continuing to access this system you agree to be bound by these
| terms:
| Any unauthorized use, misuse, or disclosure of information
| contained in this system may result in disciplinary action for ABC
| employees, up to and including termination of employment;
| termination of business relationship with ABC or further legal action.
| 

Connected tun0 as xx.x.xxx.xxx, using SSL
Established DTLS connection (using GnuTLS). Ciphersuite AES128-SHA.
Comment 4 ashkan 2015-08-07 15:44:49 UTC
Same problem on latest Fedora22 (Linux localhost.localdomain 4.1.3-201.fc22.x86_64).
Works on fedora 22 gnome and fedora 21 kde

log says : 
POST https://example.com/
Attempting to connect to server 146.12.36.55:443
SSL negotiation with example
Server certificate verify failed: signer not found
SSL connection failure: Error in the certificate.
Failed to open HTTPS connection to example.com
POST https://example.com/
Attempting to connect to server 146.12.36.55:443
SSL negotiation with example.com
Server certificate verify failed: signer not found
SSL connection failure: Error in the certificate.
Failed to open HTTPS connection to example.com
POST https://example.com/
Attempting to connect to server 146.12.36.55:443
SSL negotiation with example.com
Server certificate verify failed: signer not found
SSL connection failure: Error in the certificate.
Failed to open HTTPS connection to example.com
Comment 5 Franco Pellegrini 2015-09-28 18:27:30 UTC
I also am having this exact same issue KDE Plasma 5.3.2 Hitting "Ok" to accept certificate will just fail

If connecting from CLI works fine:

$ sudo openconnect example.com -u user
POST https://example.com/
Attempting to connect to server 8.8.8.8:443
SSL negotiation with example.com
Server certificate verify failed: signer not found

Certificate from VPN server "example.com" failed verification.
Reason: signer not found
Enter 'yes' to accept, 'no' to abort; anything else to view: yes
Connected to HTTPS on example.com
Disabling XML POST due to authgroup option
GET https://example.com/
Attempting to connect to server 8.8.8.8:443
SSL negotiation with example.com
Server certificate verify failed: signer not found
Connected to HTTPS on example.com
Got HTTP response: HTTP/1.0 302 Object Moved
GET https://example.com/+webvpn+/index.html
SSL negotiation with example.com
Server certificate verify failed: signer not found
Connected to HTTPS on example.com
Please enter your username and password.
GROUP: [Group-A|Group-B]:Group-A
Password:
POST https://example.com/+webvpn+/index.html
Got CONNECT response: HTTP/1.1 200 OK
CSTP connected. DPD 30, Keepalive 20
Connected tun0 as 10.0.8.69, using SSL + deflate
Established DTLS connection (using OpenSSL)
Comment 6 kde 2015-10-21 12:00:58 UTC
*** This bug has been confirmed by popular vote. ***
Comment 7 serhii.dovhan 2015-10-24 11:27:29 UTC
I have same problem in archlinux with plasma5. Even if openconnect in command line works fine and trusts to server sertificate, Network Manager doesn't work.
Comment 8 Michał Karpiński 2015-10-30 09:11:54 UTC
I have the same problem in Kubuntu 15.10 (Plasma 5.4.2).
Comment 9 Kai Hofstetter 2015-10-31 12:59:38 UTC
I have the same problem after upgrading to Kubuntu 15.04 (from Kubuntu 15.10)
Comment 10 Kai Hofstetter 2015-10-31 13:02:52 UTC
sorry, to 15.10 from 15.04 of course
Comment 11 Kai Hofstetter 2015-10-31 18:53:43 UTC
Found the reason, why vpn didn't work after the upgrade!
After the upgrade, the user certificate file is also used for the CA certificate!
Comment 12 Robert Demski 2015-11-08 17:25:46 UTC
Hi @Leon

After upgrade openSUSE distro 13.2 -> Leap 42.1 i have got similar problem (plasma-nm5-openconnect-5.4.2).
The VPN server to which I am  trying to connect, has an untrusted certificate (self-signed) and in addition its CN does not match the hostname.

POST https://my-vpn-server
Attempting to connect to server my-vpn-server-ip:443
SSL negotiation with centaur1.visiona.com
Server certificate verify failed: signer not found
SSL connection failure: Error in the certificate.
Failed to open HTTPS connection to my-vpn-server

To get around this, I added the untrusted certificate in the edit VPN in "CA Certificate" (first saving it as a .cer by with some HTML browser)

I have tested your link https://dept-ra-cssc.vpn.wisc.edu/
and it work for me.

POST https://dept-ra-cssc.vpn.wisc.edu/
Attempting to connect to server 144.92.42.108:443
SSL negotiation with dept-ra-cssc.vpn.wisc.edu
Connected to HTTPS on dept-ra-cssc.vpn.wisc.edu
Got HTTP response: HTTP/1.1 200 OK
Content-Type: text/html; charset=utf-8
Transfer-Encoding: chunked
Cache-Control: no-cache
Pragma: no-cache
Connection: Keep-Alive
Date: Sun, 08 Nov 2015 16:28:14 GMT
X-Frame-Options: SAMEORIGIN
X-Aggregate-Auth: 1
HTTP body chunked (-2)
XML POST enabled

I am getting a dialogue to select a group and enter a user name and password.

To me it looks like in your system (some truststore / cacerts) lack Root CA that issued the certificate for "InCommon RSA Server CA". Analyzing the certificate chain it would be "USERTrust RSA Certification Authority". Try download certificate from https://dept-ra-cssc.vpn.wisc.edu/  and add that certificate (the path to .cer) at set up a VPN connection.
Comment 13 ioann 2015-11-17 21:27:15 UTC
Some problem on Debian Stretch.

I fix that with next steps:
1. apt-get install cinammon
2. apt-get install network-manager-openconnect-gnome
3. Create new VPN connection in GUI
4. That work
5. Change session to Plasma
6. At now, network-manager with openconnect work fine.
Comment 14 Jan Grulich 2015-12-02 08:25:42 UTC
Git commit 42f0cbd57677cde47d671774fc099c33ab749c7e by Jan Grulich.
Committed on 02/12/2015 at 08:25.
Pushed by grulich into branch 'master'.

Revert: avoid using dialog->exec() in openconnect VPN plugin

We need to wait for the dialog result before we continue

M  +9    -11   vpn/openconnect/openconnectauth.cpp

http://commits.kde.org/plasma-nm/42f0cbd57677cde47d671774fc099c33ab749c7e
Comment 15 Jan Grulich 2015-12-02 08:26:21 UTC
Git commit 77282d889333d558e805ef744627d567cf9816e9 by Jan Grulich.
Committed on 02/12/2015 at 08:26.
Pushed by grulich into branch 'Plasma/5.5'.

Revert: avoid using dialog->exec() in openconnect VPN plugin

We need to wait for the dialog result before we continue

M  +9    -11   vpn/openconnect/openconnectauth.cpp

http://commits.kde.org/plasma-nm/77282d889333d558e805ef744627d567cf9816e9