-
Notifications
You must be signed in to change notification settings - Fork 6
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
error trying to connect: TLS handshake failed: cert verification failed #1
Comments
Did you try adding these patches to Cargo.toml?
Then run |
Thanks. Yeah, I had the patches in https://github.com/ludios/test-reqwest-impersonate/blob/master/Cargo.toml. I tried (I also see the same error on Debian after removing that |
It works oob on my arch machine, but being able to use the webpki roots should be easy enough to add. That being said I'm currently unable to use one of my hands so it'll take some time before I can tackle this. For now you could try overriding the tls client used like
use_boring_tls and work from there.
|
for anyone still have this issue. this is a fix |
Hello,
Thank you very much for publishing this, as it may be invaluable for surveying the web without tripping up Cloudflare and other WAFs. I am trying to use it (my test repo), but it seems to be failing where reqwest would not:
(Debian 11.4 with
ca-certificates
installed, rustc 1.63.0)When used on NixOS 22.05 which has a different
/etc/ssl
, it seems to fail on all https:// sites with a different error:Details
Is there something I should be doing to give reqwest-impersonate/BoringSSL a Chrome-like set of trusted certificate authorities? It would be very helpful if this were documented, or if it could trust all the certificates in webpki-roots or similar.
The text was updated successfully, but these errors were encountered: