Portál AbcLinuxu, 6. května 2025 09:18
Warn: ... client tls handshake failed. the client does not trust the proxy's certificate for "jmeno_domeny" (ssl/tls alert bad certificate)
warn: ... client tls handshake failed. the client does not trust the proxy's certificate for "jmeno_domeny" (tlsv1 alert unknown ca)
Řešení dotazu:
hele vypadá to že maj cizí/externí certifikáty defaultně vyplý a nějak řešit bugy s tim spojený neni jejich prirota :O :O
....dole hele chlap radí vypnout v about:config položku security.nocertdb (a restartovat browser by to začalo platit), to si ale asi už zkoušel :O :O
The first time mitmproxy is run, it creates the keys for a certificate authority (CA) in the config directory (~/.mitmproxy by default). This CA is used for on-the-fly generation of dummy certificates for each visited website. Since your browser won’t trust the mitmproxy CA out of the box, you will either need to click through a TLS certificate warning on every domain, or install the CA certificate once so that it is trusted. mitmproxy-ca.pem The certificate and the private key in PEM format. mitmproxy-ca-cert.pem The certificate in PEM format. Use this to distribute on most non-Windows platforms. mitmproxy-ca-cert.p12 The certificate in PKCS12 format. For use on Windows. mitmproxy-ca-cert.cer Same file as .pem, but with an extension expected by some Android devices.
Tiskni
Sdílej:
ISSN 1214-1267, (c) 1999-2007 Stickfish s.r.o.