Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

SSL failed: certificate has expired #36

Open
FIXERMAN opened this issue Oct 27, 2023 · 4 comments
Open

SSL failed: certificate has expired #36

FIXERMAN opened this issue Oct 27, 2023 · 4 comments

Comments

@FIXERMAN
Copy link

[20:42:01] [CRITICAL] Internal error: HTTPSConnectionPool(host='cfm.etisalat.ae', port=443): Max retries exceeded with url: / (Caused by SSLError(SSLCertVerificationError(1, '[SSL: CERTIFICATE_VERIFY_FAILED] certificate verify failed: certificate has expired (_ssl.c:1007)')))
Traceback (most recent call last):
File "/home/fixer/.local/lib/python3.10/site-packages/urllib3/connectionpool.py", line 597, in urlopen
httplib_response = self._make_request(conn, method, url,
File "/home/fixer/.local/lib/python3.10/site-packages/urllib3/connectionpool.py", line 343, in _make_request
self._validate_conn(conn)
File "/home/fixer/.local/lib/python3.10/site-packages/urllib3/connectionpool.py", line 839, in validate_conn
conn.connect()
File "/home/fixer/.local/lib/python3.10/site-packages/urllib3/connection.py", line 337, in connect
self.sock = ssl_wrap_socket(
File "/home/fixer/.local/lib/python3.10/site-packages/urllib3/util/ssl
.py", line 345, in ssl_wrap_socket
return context.wrap_socket(sock, server_hostname=server_hostname)
File "/usr/lib/python3.10/ssl.py", line 513, in wrap_socket
return self.sslsocket_class._create(
File "/usr/lib/python3.10/ssl.py", line 1071, in _create
self.do_handshake()
File "/usr/lib/python3.10/ssl.py", line 1342, in do_handshake
self._sslobj.do_handshake()

how can I get around this? type -from -do not check certificate

@nabab47
Copy link

nabab47 commented Jan 28, 2024

I'm actively coming up against this same thing on a web server using a self-signed certificate. I don't know if there is actively a flag you can set to do this, however, my attack plan is to change all of the requests calls to use the parameter verify=False which should bypass the self-signed cert failure. Hope this helps!

@mothballs-x
Copy link

I'm actively coming up against this same thing on a web server using a self-signed certificate. I don't know if there is actively a flag you can set to do this, however, my attack plan is to change all of the requests calls to use the parameter verify=False which should bypass the self-signed cert failure. Hope this helps!

Did you end up doing this? Was going to try this, but I foresee it being a bit of a pain in the ass...

@nabab47
Copy link

nabab47 commented Apr 1, 2024

I'm actively coming up against this same thing on a web server using a self-signed certificate. I don't know if there is actively a flag you can set to do this, however, my attack plan is to change all of the requests calls to use the parameter verify=False which should bypass the self-signed cert failure. Hope this helps!

Did you end up doing this? Was going to try this, but I foresee it being a bit of a pain in the ass...

I did and while yes a pain in the butt, I was able to get through all the changes in about 30 minutes with Ctrl + F. It does work after doing this though so worth it I suppose.

@mothballs-x
Copy link

I'm actively coming up against this same thing on a web server using a self-signed certificate. I don't know if there is actively a flag you can set to do this, however, my attack plan is to change all of the requests calls to use the parameter verify=False which should bypass the self-signed cert failure. Hope this helps!

Did you end up doing this? Was going to try this, but I foresee it being a bit of a pain in the ass...

I did and while yes a pain in the butt, I was able to get through all the changes in about 30 minutes with Ctrl + F. It does work after doing this though so worth it I suppose.

Did you only have to change all the .get() and .post() request session object methods or were there others that one might not expect? Times like these I wish I was a sed/awk master, or that I could get certifi do do something like this.

Spent way to much time trying to set up and nginx rev-proxy to trick pwnPSS int trustingly test lab cert, but I think the concept was wrong-headed from the start.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants