After upgrade from 9.0.6 to 10.0.3 I have several errors regarding my owncloud installation.
In 9.0.6 everything woks perfect, noc errors warning except StrictHTTPS duration time.
Now, I receive every time the following errors:
In German:
Transaktionales Sperren sollte zur Nutzung des speicherbasierten Sperrens anstatt des langsamen Datenbank basierten Sperrens konfiguriert werden.
In the documentation the memchache is recommended."Dieser Server hat keine funktionierende Internetverbindung. Dies bedeutet, dass einige Funktionen wie das Einhängen externen Speicherplatzes, Update-Benachrichtigungen oder die Installation von Drittanbieter-Apps nicht funktionieren werden. Der Fernzugriff auf Dateien und der Versand von E-Mail-Benachrichtigungen kann ebenfalls nicht funktionieren. Es wird empfohlen, die Internetverbindung dieses Servers zu aktivieren, wenn Sie alle Funktionen nutzen möchten."
The error could not be possible. I have upgraded from a fully working version. The app installation worked properply. Also every other CMS isntallation on the server works properly. Connections are availabe in both directions to and from the server on several ports.
Which kind of connection owncloud uses to test the availability of h ttps://ownlcoud.org ?
- No Marketplace connection:
Shortly the error message appears:
No marketplace connection: cURL error 77: error setting certificate verify locations: CAfile: /tmp/oc_tmp_rfRzGo-.crt CApath: /etc/ssl/certs
I have read in several threads that a ca_bundle.crt has to be present in config-dir. But this doesn't work at my installation. Therefore the api key is not working.
Curl-Tests:
curl -I -v h ttps://google.com
* Rebuilt URL to: h ttps://google.com/
* Trying 216.58.208.46...
* Connected to google.com (216.58.208.46) port 443 (#0)
* found 148 certificates in /etc/ssl/certs/ca-certificates.crt
* found 596 certificates in /etc/ssl/certs
* ALPN, offering http/1.1
* SSL connection using TLS1.2 / ECDHE_ECDSA_AES_128_GCM_SHA256
* server certificate verification OK
* server certificate status verification SKIPPED
* common name: *.google.com (matched)
* server certificate expiration date OK
* server certificate activation date OK
* certificate public key: EC
* certificate version: #3
* subject: C=US,ST=California,L=Mountain View,O=Google Inc,CN=*.google.com
* start date: Tue, 03 Oct 2017 17:45:20 GMT
* expire date: Tue, 26 Dec 2017 17:44:00 GMT
* issuer: C=US,O=Google Inc,CN=Google Internet Authority G2
* compression: NULL
* ALPN, server accepted to use http/1.1
HEAD / HTTP/1.1
Host: google.com
User-Agent: curl/7.47.0
Accept: /< HTTP/1.1 302 Found
HTTP/1.1 302 Found
< Cache-Control: private
Cache-Control: private
< Content-Type: text/html; charset=UTF-8
Content-Type: text/html; charset=UTF-8
< Referrer-Policy: no-referrer
Referrer-Policy: no-referrer
< Location: h t t ps://www.google.de/?gfe_rd=cr&dcr=0&ei=gXHgWbXTJ4Lb8Afpm67IAQ
Location: h t t ps://www.google.de/?gfe_rd=cr&dcr=0&ei=gXHgWbXTJ4Lb8Afpm67IAQ
< Content-Length: 269
Content-Length: 269
< Date: Fri, 13 Oct 2017 07:55:45 GMT
Date: Fri, 13 Oct 2017 07:55:45 GMT
< Alt-Svc: quic=":443"; ma=2592000; v="39,38,37,35"
Alt-Svc: quic=":443"; ma=2592000; v="39,38,37,35"
<
* Connection #0 to host google.com left intact
With ownclod.org, I receive the following output:
curl -I -k -v h ttps://ownlcoud.org
* Rebuilt URL to: h ttps://ownlcoud.org/
* Trying 185.53.179.7...
* Connected to ownlcoud.org (185.53.179.7) port 443 (#0)
* found 149 certificates in /etc/ssl/certs/ca-certificates.crt
* found 745 certificates in /etc/ssl/certs
* ALPN, offering http/1.1
* SSL connection using TLS1.2 / ECDHE_RSA_AES_256_GCM_SHA384
* server certificate verification SKIPPED
* server certificate status verification SKIPPED
* common name: www.parkingcrew.com (does not match 'ownlcoud.org')
* server certificate expiration date FAILED
* server certificate activation date OK
* certificate public key: RSA
* certificate version: #3
* subject: CN=www.parkingcrew.com
* start date: Mon, 24 Nov 2014 00:00:00 GMT
* expire date: Sat, 01 Jul 2017 23:59:59 GMT
* issuer: C=US,O=thawte\, Inc.,OU=Domain Validated SSL,CN=thawte DV SSL CA - G2
* compression: NULL
* ALPN, server accepted to use http/1.1
HEAD / HTTP/1.1
Host: ownlcoud.org
User-Agent: curl/7.47.0
Accept: /< HTTP/1.1 302 Found
HTTP/1.1 302 Found
< Location: h ttp://ownlcoud.org?_xas=28d726c7756aabc895def1e90c2a4ca4b8e424ba
Location: h ttp://ownlcoud.org?_xas=28d726c7756aabc895def1e90c2a4ca4b8e424ba
< Date: Fri, 13 Oct 2017 08:14:00 GMT
Date: Fri, 13 Oct 2017 08:14:00 GMT
< Content-Type: text/plain; charset=utf-8
Content-Type: text/plain; charset=utf-8
<
* Connection #0 to host ownlcoud.org left intact
Without the -k oprion in curl:
curl -I -v h t t p s : //ownlcoud.org
* Rebuilt URL to: https ://ownlcoud.org/
* Trying 185.53.179.7...
* Connected to ownlcoud.org (185.53.179.7) port 443 (#0)
* found 149 certificates in /etc/ssl/certs/ca-certificates.crt
* found 745 certificates in /etc/ssl/certs
* ALPN, offering http/1.1
* SSL connection using TLS1.2 / ECDHE_RSA_AES_256_GCM_SHA384
* server certificate verification failed. CAfile: /etc/ssl/certs/ca-certificates.crt CRLfile: none
* Closing connection 0
curl: (60) server certificate verification failed. CAfile: /etc/ssl/certs/ca-certificates.crt CRLfile: none
More details here: http ://curl.haxx.se/docs/sslcerts.html
curl performs SSL certificate verification by default, using a "bundle"
of Certificate Authority (CA) public keys (CA certs). If the default
bundle file isn't adequate, you can specify an alternate file
using the --cacert option.
If this HTTPS server uses a certificate signed by a CA represented in
the bundle, the certificate verification probably failed due to a
problem with the certificate (it might be expired, or the name might
not match the domain name in the URL).
If you'd like to turn off curl's verification of the certificate, use
the -k (or --insecure) option.
It seems that the ssl-certificate from owncloud is not set properly.
Please fix.
All links have an extra space character due to new user limitations.