How do I connect my NextCloud account to Ubuntu using a self-signed certificate?












2















I'm trying to connect my NextCloud account to Ubuntu, so that I can take advantage of the calendar integration and other features. Right now I'm running my own NextCloud server with a self-signed certificate, as I'm trying to avoid relying on any outside authority.



I can access the server from my browser without issues, and I don't mind having to go through the 'untrusted' certificate exception dialog since I'm the one who signed it.



But when I try to connect my NextCloud account to Ubuntu using the "Online Accounts" feature in system Settings, the connection fails with an error message due to "Invalid Certificate."



Is there a way to force Ubuntu to accept my NextCloud server and credentials, even if the certificate is invalid? Is there a way to add the certificate so that Ubuntu will accept it and connect to my server?










share|improve this question



























    2















    I'm trying to connect my NextCloud account to Ubuntu, so that I can take advantage of the calendar integration and other features. Right now I'm running my own NextCloud server with a self-signed certificate, as I'm trying to avoid relying on any outside authority.



    I can access the server from my browser without issues, and I don't mind having to go through the 'untrusted' certificate exception dialog since I'm the one who signed it.



    But when I try to connect my NextCloud account to Ubuntu using the "Online Accounts" feature in system Settings, the connection fails with an error message due to "Invalid Certificate."



    Is there a way to force Ubuntu to accept my NextCloud server and credentials, even if the certificate is invalid? Is there a way to add the certificate so that Ubuntu will accept it and connect to my server?










    share|improve this question

























      2












      2








      2








      I'm trying to connect my NextCloud account to Ubuntu, so that I can take advantage of the calendar integration and other features. Right now I'm running my own NextCloud server with a self-signed certificate, as I'm trying to avoid relying on any outside authority.



      I can access the server from my browser without issues, and I don't mind having to go through the 'untrusted' certificate exception dialog since I'm the one who signed it.



      But when I try to connect my NextCloud account to Ubuntu using the "Online Accounts" feature in system Settings, the connection fails with an error message due to "Invalid Certificate."



      Is there a way to force Ubuntu to accept my NextCloud server and credentials, even if the certificate is invalid? Is there a way to add the certificate so that Ubuntu will accept it and connect to my server?










      share|improve this question














      I'm trying to connect my NextCloud account to Ubuntu, so that I can take advantage of the calendar integration and other features. Right now I'm running my own NextCloud server with a self-signed certificate, as I'm trying to avoid relying on any outside authority.



      I can access the server from my browser without issues, and I don't mind having to go through the 'untrusted' certificate exception dialog since I'm the one who signed it.



      But when I try to connect my NextCloud account to Ubuntu using the "Online Accounts" feature in system Settings, the connection fails with an error message due to "Invalid Certificate."



      Is there a way to force Ubuntu to accept my NextCloud server and credentials, even if the certificate is invalid? Is there a way to add the certificate so that Ubuntu will accept it and connect to my server?







      networking server ssl nextcloud self-signed






      share|improve this question













      share|improve this question











      share|improve this question




      share|improve this question










      asked Jan 29 at 9:27









      Sudo SenseiSudo Sensei

      133




      133






















          2 Answers
          2






          active

          oldest

          votes


















          1














          Firefox uses its own certificate store, so it does not affect Online Accounts. But if you add your self-signed certificate to the root trust store of the system, then it should work. This Ask Ubuntu question deals exactly with this: How do I install a root certificate?






          share|improve this answer
























          • Thank you for the link! From what I can gather, requesting NextCloud to enable SSL using a self-signed certificate doesn't actually produce a unique certificate, rather it uses a pre-installed "snake-oil" certificate that is designed to be rejected. I may have to figure out how to force NextCloud to use a unique certificate before I can install it on my client machine. It's such a hassle, though, so I'm going to go with Let's Encrypt for now. I'm going to mark your response as the answer though!

            – Sudo Sensei
            Jan 30 at 3:17



















          0















          Right now I'm running my own NextCloud server with a self-signed certificate, as I'm trying to avoid relying on any outside authority.




          Don't. Suddenly you want to share a file with someone else, who doesn't have your certificate.



          The web is moving in the direction of TLS within the current PKI infrastructure. Set up Let's Encrypt, and optionally Public Key Pinning to ensure that no thirdparty can issue a new certificate with a new public key without your knowledge, to avoid a MiTM.






          share|improve this answer
























          • I have to admit that I don't know enough about Let's Encrypt as a service. My understanding with regards to a certificate authority is that you have to 'trust' they are signing a valid certificate, and that a compromised CA can issue fraudulent certificates for MITM attacks (and there's historical precedent for this). What is to prevent Let's Encrypt from being able to covertly perform the same attack?

            – Sudo Sensei
            Jan 29 at 22:45











          • Transparency. Every certificate shall be published. Browsers should check against the public issuing protocol, and report any certificates not in the protocol. In addition a website can use public key pinning to pin a specific key.

            – vidarlo
            Jan 30 at 5:54











          Your Answer








          StackExchange.ready(function() {
          var channelOptions = {
          tags: "".split(" "),
          id: "89"
          };
          initTagRenderer("".split(" "), "".split(" "), channelOptions);

          StackExchange.using("externalEditor", function() {
          // Have to fire editor after snippets, if snippets enabled
          if (StackExchange.settings.snippets.snippetsEnabled) {
          StackExchange.using("snippets", function() {
          createEditor();
          });
          }
          else {
          createEditor();
          }
          });

          function createEditor() {
          StackExchange.prepareEditor({
          heartbeatType: 'answer',
          autoActivateHeartbeat: false,
          convertImagesToLinks: true,
          noModals: true,
          showLowRepImageUploadWarning: true,
          reputationToPostImages: 10,
          bindNavPrevention: true,
          postfix: "",
          imageUploader: {
          brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
          contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
          allowUrls: true
          },
          onDemand: true,
          discardSelector: ".discard-answer"
          ,immediatelyShowMarkdownHelp:true
          });


          }
          });














          draft saved

          draft discarded


















          StackExchange.ready(
          function () {
          StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2faskubuntu.com%2fquestions%2f1113761%2fhow-do-i-connect-my-nextcloud-account-to-ubuntu-using-a-self-signed-certificate%23new-answer', 'question_page');
          }
          );

          Post as a guest















          Required, but never shown

























          2 Answers
          2






          active

          oldest

          votes








          2 Answers
          2






          active

          oldest

          votes









          active

          oldest

          votes






          active

          oldest

          votes









          1














          Firefox uses its own certificate store, so it does not affect Online Accounts. But if you add your self-signed certificate to the root trust store of the system, then it should work. This Ask Ubuntu question deals exactly with this: How do I install a root certificate?






          share|improve this answer
























          • Thank you for the link! From what I can gather, requesting NextCloud to enable SSL using a self-signed certificate doesn't actually produce a unique certificate, rather it uses a pre-installed "snake-oil" certificate that is designed to be rejected. I may have to figure out how to force NextCloud to use a unique certificate before I can install it on my client machine. It's such a hassle, though, so I'm going to go with Let's Encrypt for now. I'm going to mark your response as the answer though!

            – Sudo Sensei
            Jan 30 at 3:17
















          1














          Firefox uses its own certificate store, so it does not affect Online Accounts. But if you add your self-signed certificate to the root trust store of the system, then it should work. This Ask Ubuntu question deals exactly with this: How do I install a root certificate?






          share|improve this answer
























          • Thank you for the link! From what I can gather, requesting NextCloud to enable SSL using a self-signed certificate doesn't actually produce a unique certificate, rather it uses a pre-installed "snake-oil" certificate that is designed to be rejected. I may have to figure out how to force NextCloud to use a unique certificate before I can install it on my client machine. It's such a hassle, though, so I'm going to go with Let's Encrypt for now. I'm going to mark your response as the answer though!

            – Sudo Sensei
            Jan 30 at 3:17














          1












          1








          1







          Firefox uses its own certificate store, so it does not affect Online Accounts. But if you add your self-signed certificate to the root trust store of the system, then it should work. This Ask Ubuntu question deals exactly with this: How do I install a root certificate?






          share|improve this answer













          Firefox uses its own certificate store, so it does not affect Online Accounts. But if you add your self-signed certificate to the root trust store of the system, then it should work. This Ask Ubuntu question deals exactly with this: How do I install a root certificate?







          share|improve this answer












          share|improve this answer



          share|improve this answer










          answered Jan 29 at 9:41









          meskobalazsmeskobalazs

          2,2241122




          2,2241122













          • Thank you for the link! From what I can gather, requesting NextCloud to enable SSL using a self-signed certificate doesn't actually produce a unique certificate, rather it uses a pre-installed "snake-oil" certificate that is designed to be rejected. I may have to figure out how to force NextCloud to use a unique certificate before I can install it on my client machine. It's such a hassle, though, so I'm going to go with Let's Encrypt for now. I'm going to mark your response as the answer though!

            – Sudo Sensei
            Jan 30 at 3:17



















          • Thank you for the link! From what I can gather, requesting NextCloud to enable SSL using a self-signed certificate doesn't actually produce a unique certificate, rather it uses a pre-installed "snake-oil" certificate that is designed to be rejected. I may have to figure out how to force NextCloud to use a unique certificate before I can install it on my client machine. It's such a hassle, though, so I'm going to go with Let's Encrypt for now. I'm going to mark your response as the answer though!

            – Sudo Sensei
            Jan 30 at 3:17

















          Thank you for the link! From what I can gather, requesting NextCloud to enable SSL using a self-signed certificate doesn't actually produce a unique certificate, rather it uses a pre-installed "snake-oil" certificate that is designed to be rejected. I may have to figure out how to force NextCloud to use a unique certificate before I can install it on my client machine. It's such a hassle, though, so I'm going to go with Let's Encrypt for now. I'm going to mark your response as the answer though!

          – Sudo Sensei
          Jan 30 at 3:17





          Thank you for the link! From what I can gather, requesting NextCloud to enable SSL using a self-signed certificate doesn't actually produce a unique certificate, rather it uses a pre-installed "snake-oil" certificate that is designed to be rejected. I may have to figure out how to force NextCloud to use a unique certificate before I can install it on my client machine. It's such a hassle, though, so I'm going to go with Let's Encrypt for now. I'm going to mark your response as the answer though!

          – Sudo Sensei
          Jan 30 at 3:17













          0















          Right now I'm running my own NextCloud server with a self-signed certificate, as I'm trying to avoid relying on any outside authority.




          Don't. Suddenly you want to share a file with someone else, who doesn't have your certificate.



          The web is moving in the direction of TLS within the current PKI infrastructure. Set up Let's Encrypt, and optionally Public Key Pinning to ensure that no thirdparty can issue a new certificate with a new public key without your knowledge, to avoid a MiTM.






          share|improve this answer
























          • I have to admit that I don't know enough about Let's Encrypt as a service. My understanding with regards to a certificate authority is that you have to 'trust' they are signing a valid certificate, and that a compromised CA can issue fraudulent certificates for MITM attacks (and there's historical precedent for this). What is to prevent Let's Encrypt from being able to covertly perform the same attack?

            – Sudo Sensei
            Jan 29 at 22:45











          • Transparency. Every certificate shall be published. Browsers should check against the public issuing protocol, and report any certificates not in the protocol. In addition a website can use public key pinning to pin a specific key.

            – vidarlo
            Jan 30 at 5:54
















          0















          Right now I'm running my own NextCloud server with a self-signed certificate, as I'm trying to avoid relying on any outside authority.




          Don't. Suddenly you want to share a file with someone else, who doesn't have your certificate.



          The web is moving in the direction of TLS within the current PKI infrastructure. Set up Let's Encrypt, and optionally Public Key Pinning to ensure that no thirdparty can issue a new certificate with a new public key without your knowledge, to avoid a MiTM.






          share|improve this answer
























          • I have to admit that I don't know enough about Let's Encrypt as a service. My understanding with regards to a certificate authority is that you have to 'trust' they are signing a valid certificate, and that a compromised CA can issue fraudulent certificates for MITM attacks (and there's historical precedent for this). What is to prevent Let's Encrypt from being able to covertly perform the same attack?

            – Sudo Sensei
            Jan 29 at 22:45











          • Transparency. Every certificate shall be published. Browsers should check against the public issuing protocol, and report any certificates not in the protocol. In addition a website can use public key pinning to pin a specific key.

            – vidarlo
            Jan 30 at 5:54














          0












          0








          0








          Right now I'm running my own NextCloud server with a self-signed certificate, as I'm trying to avoid relying on any outside authority.




          Don't. Suddenly you want to share a file with someone else, who doesn't have your certificate.



          The web is moving in the direction of TLS within the current PKI infrastructure. Set up Let's Encrypt, and optionally Public Key Pinning to ensure that no thirdparty can issue a new certificate with a new public key without your knowledge, to avoid a MiTM.






          share|improve this answer














          Right now I'm running my own NextCloud server with a self-signed certificate, as I'm trying to avoid relying on any outside authority.




          Don't. Suddenly you want to share a file with someone else, who doesn't have your certificate.



          The web is moving in the direction of TLS within the current PKI infrastructure. Set up Let's Encrypt, and optionally Public Key Pinning to ensure that no thirdparty can issue a new certificate with a new public key without your knowledge, to avoid a MiTM.







          share|improve this answer












          share|improve this answer



          share|improve this answer










          answered Jan 29 at 9:47









          vidarlovidarlo

          10.9k52750




          10.9k52750













          • I have to admit that I don't know enough about Let's Encrypt as a service. My understanding with regards to a certificate authority is that you have to 'trust' they are signing a valid certificate, and that a compromised CA can issue fraudulent certificates for MITM attacks (and there's historical precedent for this). What is to prevent Let's Encrypt from being able to covertly perform the same attack?

            – Sudo Sensei
            Jan 29 at 22:45











          • Transparency. Every certificate shall be published. Browsers should check against the public issuing protocol, and report any certificates not in the protocol. In addition a website can use public key pinning to pin a specific key.

            – vidarlo
            Jan 30 at 5:54



















          • I have to admit that I don't know enough about Let's Encrypt as a service. My understanding with regards to a certificate authority is that you have to 'trust' they are signing a valid certificate, and that a compromised CA can issue fraudulent certificates for MITM attacks (and there's historical precedent for this). What is to prevent Let's Encrypt from being able to covertly perform the same attack?

            – Sudo Sensei
            Jan 29 at 22:45











          • Transparency. Every certificate shall be published. Browsers should check against the public issuing protocol, and report any certificates not in the protocol. In addition a website can use public key pinning to pin a specific key.

            – vidarlo
            Jan 30 at 5:54

















          I have to admit that I don't know enough about Let's Encrypt as a service. My understanding with regards to a certificate authority is that you have to 'trust' they are signing a valid certificate, and that a compromised CA can issue fraudulent certificates for MITM attacks (and there's historical precedent for this). What is to prevent Let's Encrypt from being able to covertly perform the same attack?

          – Sudo Sensei
          Jan 29 at 22:45





          I have to admit that I don't know enough about Let's Encrypt as a service. My understanding with regards to a certificate authority is that you have to 'trust' they are signing a valid certificate, and that a compromised CA can issue fraudulent certificates for MITM attacks (and there's historical precedent for this). What is to prevent Let's Encrypt from being able to covertly perform the same attack?

          – Sudo Sensei
          Jan 29 at 22:45













          Transparency. Every certificate shall be published. Browsers should check against the public issuing protocol, and report any certificates not in the protocol. In addition a website can use public key pinning to pin a specific key.

          – vidarlo
          Jan 30 at 5:54





          Transparency. Every certificate shall be published. Browsers should check against the public issuing protocol, and report any certificates not in the protocol. In addition a website can use public key pinning to pin a specific key.

          – vidarlo
          Jan 30 at 5:54


















          draft saved

          draft discarded




















































          Thanks for contributing an answer to Ask Ubuntu!


          • Please be sure to answer the question. Provide details and share your research!

          But avoid



          • Asking for help, clarification, or responding to other answers.

          • Making statements based on opinion; back them up with references or personal experience.


          To learn more, see our tips on writing great answers.




          draft saved


          draft discarded














          StackExchange.ready(
          function () {
          StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2faskubuntu.com%2fquestions%2f1113761%2fhow-do-i-connect-my-nextcloud-account-to-ubuntu-using-a-self-signed-certificate%23new-answer', 'question_page');
          }
          );

          Post as a guest















          Required, but never shown





















































          Required, but never shown














          Required, but never shown












          Required, but never shown







          Required, but never shown

































          Required, but never shown














          Required, but never shown












          Required, but never shown







          Required, but never shown







          Popular posts from this blog

          Human spaceflight

          Can not write log (Is /dev/pts mounted?) - openpty in Ubuntu-on-Windows?

          File:DeusFollowingSea.jpg