[02:11] anyone have issues with python/requests... actually all of ubuntu... not supporting LetsEncrypt root certs? python/requests/curl fails for me, but on my mac the same root cert works. [02:11] I get * TLSv1.2 (OUT), TLS alert, handshake failure (552): [02:11] * error:1414D172:SSL routines:tls12_check_peer_sigalg:wrong signature type [02:14] Which version of python / requests? [02:21] python 3.8, not sure about requests. [02:21] but it seems to be system wide as curl is also effected. [02:21] can anyone compare this file on tehir system? [02:21] 2a02:840:1:1:1::1 [02:21] 200348 Jun 3 22:15 /etc/ssl/certs/ca-certificates.crt [02:21] gah, I thought maybe it was ipv6, but no, evne on ipv4 same error. [02:21] my only guess is ca-certifactes.crt is no good. [02:25] ca-certificates is already the newest version (20190110ubuntu1.1). [02:25] that does seem too old. [02:26] hrm... or not... despite the version it is from June of 2020 [02:31] Does it work on other sites? [02:37] yes [02:37] i'm thinking it is this, but the fix didn't work for me. [02:37] https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=900984 [02:41] yeah, adding --ciphers DEFAULT@SECLEVEL=1 to the curl command makes it pass, but I've no idea how to set default openssl client ciphers [02:43] well, curl is excellent, so ciphers = in ~/.curlrc works great, but that doesn't fix requests. [02:44] https://github.com/psf/requests/issues/4775 [02:48] https://askubuntu.com/questions/1233186/ubuntu-20-04-how-to-set-lower-ssl-security-level WINS [02:51] well that was really interesting [11:56] Wow, that's fun. :) [12:10] it really was. I'm glad I solved it.