-
Notifications
You must be signed in to change notification settings - Fork 1.5k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
InternetOpenUrl() failed - 0x80072f05 : unknown error #2956
Comments
Seconded here:
The served certificate is here, fingerprint |
Looks like the certificate for https://cdn.winget.microsoft.com/cache expired about 1.5 hours ago. |
You can add a source like https://winget.azureedge.net/cache using the command below. |
it works. thx! |
'sudo' is not recognized as an internal or external command, |
powershell do not need sudo if you are admin account. winget source remove -n winget
winget source add -n winget https://winget.azureedge.net/cache |
Is it safe to do this? Will we have to go back to the old URL, https://cdn.winget.microsoft.com/cache? |
maybe. But its a aliases of cdn.winget.microsoft.com. you can nslookup it. Aliases: cdn.winget.microsoft.com |
You can always run |
Does each Microsoft Product Team manage the certificates of their infrastructure themselves? How are there not processes and automated checks to ensure various Product Teams CDNs etc. don't have their certificates expire on live services? Microsoft even operates the Issuing CA for the expired certificate in this instance. |
@denelon Red alert. |
This worked for me. |
Hey all. We're working on getting the certificate renewed. |
according to the certificate transparency logs it should have already been renewed 3 times, most recently in november 2022... but none of those renewed certificates were actually picked up by the server. |
That error message also needs to be fixed. What a terrible terrible error message |
The new certificate has been imported. We're waiting for the provisioning to complete. The expectation is 6 - 8 hours for full propagation. |
Here is a screenshot from an endpoint that has the new certificate. The URL is https://cdn.winget.microsoft.com/cache The actual file used by the client is https://cdn.winget.microsoft.com/cache/source.msix I'm going to keep the issue open until tomorrow so we can make sure the certificate has fully propagated before closing this issue. |
seems to be working now. @denelon, what's the action taken to ensure this does not happen again? |
We're going to do a root cause on Monday. The certificate was issued in November, and it was published to the secret store, but it didn't get configured on the endpoints. I'm not sure yet if it was code that we wrote not doing the right thing, or something else. |
Since we haven't had any new reports of certificate problems, I'm going to go ahead and close this issue now. |
All, |
i think the problem for the server refusing to pick the new certificates is that the "renewals" were issued from a different certification authority. The first certificate (the one that expired on February 12th) was issued from edit: I suspect they will be superseded a bit before that, at the latest in April or May 2023 they will probably be replaced and will stop issuing any new certificates a bit earlier than the cutoff. |
Root CauseWhile our certificate was being properly auto renewed, the new certificate was not being loaded into the CDN endpoints. After discussing with our Azure infrastructure team, we were informed that autorotation is not supported with our specific configuration. Additionally, it does not appear that any monitoring was in place to check the certificate that was actually in use on the endpoint for validity. Our planned path forwardIn consultation with the Azure Front Door team – we have determined that the Azure Front Door CDN does support certificate autorotation. We will beging working on changes to our Azure Front Door CDN so that autorotation is supported. We will also add monitoring to verify that the certificates have been configured on the CDN endpoints. |
For what it's worth, I'm still having issues as documented in #1656. My post from there: Can confirm I'm also getting Things I've tried that don't work:
For me
I can |
Brief description of your issue
Looks like https://cdn.winget.microsoft.com/cache/source.msix does not come with a valid SSL certificate:
Steps to reproduce
Expected behavior
it should just work
Actual behavior
see screenshot.
Environment
The text was updated successfully, but these errors were encountered: