Note |
---|
The rest of this page contains several links to certificates that your browser is likely to already possess. Simply clicking the certificate link may result in your browser attempting to install the certificate in your browser. You may have to use the "save link as" feature of your browser or use other software (for example, curl or wget) to download the certificate. |
cURL
mk-ca-bundle.pl
script.-k/--insecure
option
to the curl command like
this
$ curl --insecure
https://sscweb.gsfc.nasa.gov/WS/sscr/2/application.wadl | xmllint
--format -
cURL mk-ca-bundle.pl
script
include with
the source for cURL.mk-ca-bundle.pl
that is available at ca-bundle.crt
.--cacert
option to all uses of cURL
like
this$ curl --cacert
ca-bundle.crt
https://sscweb.gsfc.nasa.gov/WS/sscr/2/application.wadl | xmllint
--format -
--cacert
option by setting the environment variable named CURL_CA_BUNDLE
to the path of the ca-bundle.crt
file.wget
are know to have problems evaluating the
multi-domain certficate used for our sites. If you you encounter
the errorERROR: certificate common
name
'spdf.gsfc.nasa.gov' doesn't match requested host name
'cdaweb.gsfc.nasa.gov'
wget/openssl
also do not support newer
versions of the SSL/TLS protocols. If you get an error like
OpenSSL: error:14077410:SSL routines:SSL23_GET_SERVER_HELLO:sslv3 alert handshake failure
Unable to establish SSL connection.
wget
and/or
openssl
.
Wget
may also not have a new enough certificate bundle. To
overcome this problem, do one of the following:$HOME/.wgetrc
containing the line
ca_certificate=ca-bundle.crtWhere
ca-bundle.crt
is the
full-pathname of the new certficate bundle file. Now use
wget
as usual. For example
wget -O -
https://sscweb.gsfc.nasa.gov/WS/sscr/2/application.wadl |
xmllint --format -
--ca-certificate
option to the
wget command like this
wget --ca-certificate=ca-bundle.crt -O -
https://sscweb.gsfc.nasa.gov/WS/sscr/2/application.wadl |
xmllint --format -
wget --no-check-certificate
-O -
https://sscweb.gsfc.nasa.gov/WS/sscr/2/application.wadl | xmllint
--format -
$ cd JAVA_HOME/jre
JAVA_HOME
is the root directory of your
Java installation.$ bin/keytool -import -trustcacerts
-file lets-encrypt-x3-cross-signed.pem
-keystore lib/security/cacerts
lets-encrypt-x3-cross-signed.pem
is the CA certificate file downloaded in step 1.javax.net.debug=SSL
IDLnetURL
object and through
the IDL-Java bridge. Instructions for each of these cases are
describe separately below.IDLnetURL
to access the
web services, do one of the following:SSL_VERIFY_PEER
property to 0 like this
idlNetUrlObj->SetProperty, SSL_VERIFY_PEER=0
.libcurl.(so|dll|dylib)
file with
the one from version 8.4 or higher.ca-bundle.crt
file
as
described in cURL above.<IDL_DIR>/bin/bin.<platform>/ca-bundle.crt
file with the one obtained in step 1 above.
ca-bundle.crt
file in your IDL installation, you could programatically set
the SSL_CERTIFICATE_FILE IDLnetURL
property to
the fully-qualified path of the
downloaded ca-bundle.crt
file.IDLnetURL
object should be able to
use these web services over HTTPS.SSL_VERIFY_PEER
property to 0
like this
idlNetUrlObj->SetProperty, SSL_VERIFY_PEER=0
.$ cd <IDL_DIR>/idlde/bin.<platform>/jre
<IDL_DIR>
is the directory
where IDL is installed and <platform>
is your platform.$ bin/keytool -import -trustcacerts -file lets-encrypt-x3-cross-signed.pem -keystore lib/security/cacerts
lets-encrypt-x3-cross-signed.pem
is the file obtained in step 1.ca-bundle.crt
file as
described in cURL above.PERL_LWP_SSL_CA_FILE
environment variable to the ca-bundle.crt
file before running your Perl program.For python code that utilizes the
httplib2 (http.client in Python 3) library, verification of the
certificate may be disabled by adding the
disable_ssl_certificate_validation=True
parameter to the
constructor. For example,
import httplib2 client = httplib2.Http(".cache", disable_ssl_certificate_validation=True)
Questions or comments concerning these Web services should be sent to SPDF Feedback.