From mboxrd@z Thu Jan 1 00:00:00 1970 From: "Raghav Gururajan" Subject: bug#34861: TLS Error with Flatpak Date: Tue, 19 Mar 2019 00:43:03 +0000 Message-ID: References: <87d0mnn282.fsf@elephly.net> <87ef73yiyr.fsf@elephly.net> <87imwgpl5e.fsf@gnu.org> <002a84964102ac2171089fa7dc007092@disroot.org> <2d04774df83fe600777de7b8f26aca87@disroot.org> Mime-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable Return-path: Received: from eggs.gnu.org ([209.51.188.92]:46425) by lists.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1h62rW-0003zZ-Bg for bug-guix@gnu.org; Mon, 18 Mar 2019 20:44:15 -0400 Received: from Debian-exim by eggs.gnu.org with spam-scanned (Exim 4.71) (envelope-from ) id 1h62rR-0005Bt-Sd for bug-guix@gnu.org; Mon, 18 Mar 2019 20:44:10 -0400 Received: from debbugs.gnu.org ([209.51.188.43]:35834) by eggs.gnu.org with esmtps (TLS1.0:RSA_AES_128_CBC_SHA1:16) (Exim 4.71) (envelope-from ) id 1h62rK-00058q-9M for bug-guix@gnu.org; Mon, 18 Mar 2019 20:44:04 -0400 Received: from Debian-debbugs by debbugs.gnu.org with local (Exim 4.84_2) (envelope-from ) id 1h62rK-00031s-4U for bug-guix@gnu.org; Mon, 18 Mar 2019 20:44:02 -0400 Sender: "Debbugs-submit" Resent-Message-ID: In-Reply-To: <87d0mnn282.fsf@elephly.net> List-Id: Bug reports for GNU Guix List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: bug-guix-bounces+gcggb-bug-guix=m.gmane.org@gnu.org Sender: "bug-Guix" To: Ricardo Wurmus Cc: 34861@debbugs.gnu.org Hi Ricardo!=0A=0APlease find the log at: https://bin.disroot.org/?597e32c= b7e42e40e#r9lqwZ6w7sIAWlY2mt6dsgKCKRO5q0ZVt9U69vnZVZs=3D=0A=0AThank you!= =0A=0ARegards,=0ARG.=0A=0AMarch 19, 2019 12:22 AM, "Ricardo Wurmus" wrote:=0A=0A> Hi Raghav,=0A> =0A>> Please find the follow= ing information. [=E2=80=A6]=0A> =0A> Unfortunately, this is not very hel= pful as it only shows that flatpak=0A> uses libsoup.=0A> =0A>> Raghav, co= uld you trace flatpak to see what certificate files it is=0A>> trying to = access?=0A> =0A> I meant: could you run the flatpak command with =E2=80= =9Cstrace -f -o log -s=0A> 2048 flatpak =E2=80=A6=E2=80=9D? This would sh= ow us what files it attempts to access,=0A> hopefully including certifica= te files.=0A> =0A> --=0A> Ricardo