You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
It might require fixes in both Wine and Cygwin to get this issue fully resolved. If anyone makes some progress on this, let us know!
17
17
18
-
### How can I make MSYS2/pacman trust my company's custom TLS CA certificate
18
+
### How can I make MSYS2/pacman trust my company's/antivirus's custom TLS CA certificate
19
19
20
-
In case your computer is managed by an organization they might MITM all your TLS connections and install their own custom CA certificate onto your system so that MITM connections are still marked as secure. Because OpenSSL in MSYS2 currently doesn't integrate with the Windows system CA store, and thus doesn't know about your organization's custom certificates you have to add them and trust them manually.
20
+
In case your computer is managed by an organization or by certain antivirus software (Avast antivirus is known to do this by default) they might MITM all your TLS connections and install their own custom CA certificate onto your system so that MITM connections are still marked as secure. Because OpenSSL in MSYS2 currently doesn't integrate with the Windows system CA store, and thus doesn't know about your organization's/antivirus's custom certificates, you have to add them and trust them manually.
21
21
22
22
You might be affected if you see the following errors when using pacman, curl or similar:
23
23
24
24
*`SSL certificate problem: unable to get local issuer certificate`
25
25
*`SSL certificate problem: self signed certificate in certificate chain`
26
+
*`ERROR: The certificate of ‘<website>’ is not trusted.`
27
+
*`ERROR: The certificate of ‘<website>’ doesn't have a known issuer.`
26
28
27
-
First we need to get the certificates of your organization
29
+
First we need to get the certificates of your organization/antivirus
28
30
29
31
1) via Firefox:
30
32
31
33
* Open https://repo.msys2.org in Firefox (the connection should be marked as secure!)
32
34
* Press ctrl+i to open the page info
33
35
* Go to "Security" and click "View Certificate"
34
-
* Go through all tabs where the certificate belongs to your organization, scroll down and click on "PEM (cert)" to download the "*.pem" file
36
+
* Go through all tabs where the certificate belongs to your organization/antivirus, scroll down and click on "PEM (cert)" to download the "*.pem" file
35
37
36
38
2) or via Chrome/Chromium/Edge:
37
39
@@ -54,6 +56,8 @@ OK!
54
56
55
57
The certificates can be removed again by deleting the .pem/.cer files in `/etc/pki/ca-trust/source/anchors` and running `update-ca-trust` again.
56
58
59
+
In case your TLS connections are intercepted by an antivirus, you can also turn off this functionality in the antivirus to fix the issue. This can make your computer more vulnerable, the solution described above should therefore be preferred. Instructions on how to turn this off for Avast antivirus can be found [here](https://support.avast.com/en-us/article/use-antivirus-https-scan/#pc). Other antivirus software which intercepts TLS connections may require similar steps to fix the issue.
60
+
57
61
### How long are old packages kept on repo.msys2.org?
58
62
59
63
1.75 years after a package version leaves the pacman package database, it is removed from the server. This means that if you do not update the pacman DB for more than 1.75 years, the installation of packages may fail until you update.
0 commit comments