Certificate problem with https://bugzilla.opensuse.com/
-----BEGIN PGP SIGNED MESSAGE-----
I don't know if we own this domain?
Warning: Potential Security Risk Ahead
Firefox detected a potential security threat and did not continue to
bugzilla.opensuse.com. If you visit this site, attackers could try to
steal information like your passwords, emails, or credit card details.
What can you do about it?
The issue is most likely with the website, and there is nothing you can do
to resolve it. You can notify the website’s administrator about the
Websites prove their identity via certificates. Firefox does not trust
this site because it uses a certificate that is not valid for
bugzilla.opensuse.com. The certificate is only valid for the following
names: *.opensuse.org, opensuse.org
Error code: SSL_ERROR_BAD_CERT_DOMAIN
(I can't paste the certificate information except one line at a time)
Cheers / Saludos,
Carlos E. R.
(from 15.1 x86_64 at Legolas)
-----BEGIN PGP SIGNATURE-----
-----END PGP SIGNATURE-----
#1 Updated by pjessen about 2 months ago
- Private changed from Yes to No
#2 Updated by cboltz about 2 months ago
opensuse.com and *.opensuse.com all point to our haproxy, we "just" don't have a certificate for it.
AFAIK the haproxy config defaults to delivering download.o.o if it doesn't have config for a domain, so (besides getting a certificate) we should probably add some redirects for opensuse.com in the haproxy config.
I also wonder if we really want/need the *.opensuse.com wildcard DNS entry, but that's another topic.