Ftp-sync: Uploading Test Failed: Error: Self Signed Certificate

Adding the self-signed certificate equally trusted to a browser

The procedures in this section testify yous how to add together the self-signed certificates generated during Kaspersky CyberTrace installation to the trusted storage. This will remove the security warnings generated past browsers.

The information in this section is applicable to the situation when a user gains admission to CyberTrace Spider web from the same computer on which CyberTrace Web runs. If the GUISettings > HTTPServer > ConnectionString chemical element of the Feed Service configuration file refers to an external interface, the CyberTrace Web website will not be considered trusted, because the cocky-signed certificate tin can exist used simply with the https://127.0.0.1 and https://localhost addresses.

To avoid potential security risks, we recommend using a trusted certificate signed by a certificate say-so (CA). For more information, see section "Generating certificates for CyberTrace Web".

Causing a self-signed certificate to be trusted by a browser (CyberTrace Web is opened in Internet Explorer installed on a Windows organization)

Gaining the browser's trust requires that you perform, in sequence, the following three procedures:

To relieve the certificate to a local file:

  1. Open the https://127.0.0.1 or https://localhost address in Net Explorer.

    The browser informs yous of a problem with the security certificate of the website.

    Document fault message

  2. Select the Go along to this website (not recommended) link.

    The Certificate Error message appears in the address bar.

  3. Click Certificate Error.

    The Untrusted Certificate window opens.

    Untrusted Certificate window

  4. Select the View certificates link.

    The Certificate window opens with information almost the CyberTrace certificate.

    Certificate window

  5. Select the Details tab, and so click Copy to File to create a local re-create of the certificate.

    The Document Export Wizard starts.

    Certificate Export Magician

  6. Follow the Wizard instructions.

    Use the default Magician settings during the certificate export.

To start the certificate import process through Microsoft Management Console (MMC):

  1. From the Search box, navigate to the Run box, and and then enter mmc.

    You tin at present run MMC as Administrator.

    Running MMC

    Running the MMC

  2. In the MMC-based console that opens, select File > Add/Remove Snap-in.

    add_remove_snap_in

    Selecting Add together/Remove Snap-in

    The Add or Remove Snap-ins window opens.

  3. In the Bachelor snap-ins list, select Certificates, and then click Add.

    Adding certificates

    Adding a Certificates snap-in

    The Certificates snap-in window opens.

  4. Select Computer business relationship, and then click Adjacent.

    Selecting Computer account

    Selecting Reckoner account

    In the Select Computer window that opens, click Cease.

    Selecting the local computer

    Selecting Local computer

  5. In the tree pane, select Certificates (Local Computer) > Trusted Root Certification Authorities, right-click Certificates, and then select All Tasks > Import.

    Importing a certificate

    Selecting Import

    The Certificate Import Wizard starts.

To add the saved document to the Trusted Root Certification Authorities store:

  1. On the Welcome folio of the Wizard, click Next.

    Certificate Import Wizard

    Certificate Import Wizard

  2. Click Browse and select the certificate that was saved in the "To brand the self-signed certificate for CyberTrace Spider web trusted when using Internet Explorer:" process above.

    Importing the saved certificate

    Importing the previously saved certificate

  3. On the next page of the Document Import Wizard, click Adjacent.

    Selectng a certificate store

    Selecting a certificate store

  4. On the concluding page of the Certificate Import Sorcerer, click Finish.

    Completing the certificate import

    Completing the certificate import

  5. Shut the MMC-based console and restart the browser.

    The security problem (untrusted certificate) is resolved, as shown in the figure below.

    Website identification

Causing a cocky-signed certificate to be trusted past a browser (CyberTrace Web opens in Google Chrome installed on a Windows system)

To make the self-signed certificate for CyberTrace Web trusted when using Google Chrome:

  1. Open the https://127.0.0.one or https://localhost address in Google Chrome.

    A warning is displayed in the address bar that the connectedness to the site is not secure.

  2. Click the Not secure bulletin.

    A window opens with security details near the website.

    Security details

  3. Click Document to view the certificate information. (When the mouse pauses over Certificate, a Evidence certificate tooltip appears.)
  4. In the Certificate window that opens, select the Details tab, and so click Copy to File to create a local re-create of the document.

    The Certificate Export Wizard starts.

    Document Export Wizard

  5. Follow the Wizard instructions.

    Use the default Wizard settings during the certificate consign.

  6. After the certificate is saved to a local disk, open it and add it to the Trusted Root Certification Authorities shop, every bit described in the procedure for Net Explorer.
  7. Restart the browser.

Causing a self-signed certificate to be trusted by a browser (CyberTrace Web opens in Mozilla Firefox)

You add together CyberTrace Web to the list of Mozilla Firefox trusted web addresses so that the browser will non display warnings about the certificate.

Causing a self-signed certificate to be trusted by a browser (CyberTrace Web opens in a browser for Linux)

Procedures for using a browser to import a certificate every bit trusted (on Linux systems) vary depending on the browser and Linux distribution used. But the procedures share common steps: to open up the browser settings form and use the form to import the certificate to a store.

To manually cause a self-signed certificate to be trusted by a browser on a Linux system:

  1. Create a /usr/local/share/ca-certificates/ directory if information technology does not exist on your estimator:

    mkdir /usr/local/share/ca-certificates/

  2. Copy your root certificate (.crt file) to the created directory:

    cp <full path to the document> /usr/local/share/ca-certificates/

  3. Update the certificates:

    sudo update-ca-certificates

    If you practise not have the ca-certificates packet, install it with your package manager.

Removing a certificate from the listing of trusted ones

After you have reconfigured or uninstalled CyberTrace, old certificates are no longer used past CyberTrace. You can remove them from the list of trusted certificates.

To remove a document from the list of trusted certificates (on Windows):

  1. Open up the Certificates management console, and then run the following control:

    certmgr.msc

  2. In the tree pane, select Trusted Root Certification Authorities > Certificates.

    Certificates management console

  3. In the results pane, correct-click the added certificate, and then select Delete.

On a Linux system, the removal process is performed in a mode that is similar to the addition of a document: open up the list of the trusted certificates and remove those that yous do not demand.

Page top

deforgequaid1949.blogspot.com

Source: https://support.kaspersky.com/CyberTrace/1.0/en-US/174127.htm

0 Response to "Ftp-sync: Uploading Test Failed: Error: Self Signed Certificate"

Postar um comentário

Iklan Atas Artikel

Iklan Tengah Artikel 1

Iklan Tengah Artikel 2

Iklan Bawah Artikel