Checklist
Affected version
not relevant
Steps to reproduce the bug
- Add custom f-droid repo to f-droid client
- Update repositories in f-droid client (e.g. by swiping down)
Expected behavior
repository should be updated
Actual behavior
CertPathValidatorException
01-24 11:47:50.016 17196 17298 D o.f.d.HttpManager: [DefaultDispatcher-worker-9] GET https://archive.newpipe.net/fdroid/repo/entry.jar
01-24 11:47:50.082 17196 17298 I o.f.d.MirrorChooserImpl: [DefaultDispatcher-worker-9] Last mirror, rethrowing... (SSLHandshakeException)
01-24 11:47:50.086 17196 17298 E RepoUpdateManager: Error updating repository https://archive.newpipe.net/fdroid/repo
01-24 11:47:50.086 17196 17298 E RepoUpdateManager: javax.net.ssl.SSLHandshakeException: java.security.cert.CertPathValidatorException: Trust anchor for certification path not found.
01-24 11:47:50.086 17196 17298 E RepoUpdateManager: at com.android.org.conscrypt.SSLUtils.toSSLHandshakeException(SSLUtils.java:358)
01-24 11:47:50.086 17196 17298 E RepoUpdateManager: at com.android.org.conscrypt.ConscryptEngine.convertException(ConscryptEngine.java:1131)
01-24 11:47:50.086 17196 17298 E RepoUpdateManager: at com.android.org.conscrypt.ConscryptEngine.readPlaintextData(ConscryptEngine.java:1086)
01-24 11:47:50.086 17196 17298 E RepoUpdateManager: at com.android.org.conscrypt.ConscryptEngine.unwrap(ConscryptEngine.java:873)
01-24 11:47:50.086 17196 17298 E RepoUpdateManager: at com.android.org.conscrypt.ConscryptEngine.unwrap(ConscryptEngine.java:744)
01-24 11:47:50.086 17196 17298 E RepoUpdateManager: at com.android.org.conscrypt.ConscryptEngine.unwrap(ConscryptEngine.java:709)
01-24 11:47:50.086 17196 17298 E RepoUpdateManager: at com.android.org.conscrypt.ConscryptEngineSocket$SSLInputStream.processDataFromSocket(ConscryptEngineSocket.java:907)
01-24 11:47:50.086 17196 17298 E RepoUpdateManager: at com.android.org.conscrypt.ConscryptEngineSocket$SSLInputStream.-$$Nest$mprocessDataFromSocket(Unknown Source:0)
01-24 11:47:50.086 17196 17298 E RepoUpdateManager: at com.android.org.conscrypt.ConscryptEngineSocket.doHandshake(ConscryptEngineSocket.java:242)
01-24 11:47:50.086 17196 17298 E RepoUpdateManager: at com.android.org.conscrypt.ConscryptEngineSocket.startHandshake(ConscryptEngineSocket.java:224)
01-24 11:47:50.086 17196 17298 E RepoUpdateManager: at okhttp3.internal.connection.RealConnection.connectTls(RealConnection.kt:379)
01-24 11:47:50.086 17196 17298 E RepoUpdateManager: at okhttp3.internal.connection.RealConnection.establishProtocol(RealConnection.kt:337)
01-24 11:47:50.086 17196 17298 E RepoUpdateManager: at okhttp3.internal.connection.RealConnection.connect(RealConnection.kt:209)
01-24 11:47:50.086 17196 17298 E RepoUpdateManager: at okhttp3.internal.connection.ExchangeFinder.findConnection(ExchangeFinder.kt:226)
01-24 11:47:50.086 17196 17298 E RepoUpdateManager: at okhttp3.internal.connection.ExchangeFinder.findHealthyConnection(ExchangeFinder.kt:106)
01-24 11:47:50.086 17196 17298 E RepoUpdateManager: at okhttp3.internal.connection.ExchangeFinder.find(ExchangeFinder.kt:74)
01-24 11:47:50.086 17196 17298 E RepoUpdateManager: at okhttp3.internal.connection.RealCall.initExchange$okhttp(RealCall.kt:255)
01-24 11:47:50.086 17196 17298 E RepoUpdateManager: at okhttp3.internal.connection.ConnectInterceptor.intercept(ConnectInterceptor.kt:32)
01-24 11:47:50.086 17196 17298 E RepoUpdateManager: at okhttp3.internal.http.RealInterceptorChain.proceed(RealInterceptorChain.kt:109)
01-24 11:47:50.086 17196 17298 E RepoUpdateManager: at okhttp3.internal.cache.CacheInterceptor.intercept(CacheInterceptor.kt:95)
01-24 11:47:50.086 17196 17298 E RepoUpdateManager: at okhttp3.internal.http.RealInterceptorChain.proceed(RealInterceptorChain.kt:109)
01-24 11:47:50.086 17196 17298 E RepoUpdateManager: at okhttp3.internal.http.BridgeInterceptor.intercept(BridgeInterceptor.kt:83)
01-24 11:47:50.086 17196 17298 E RepoUpdateManager: at okhttp3.internal.http.RealInterceptorChain.proceed(RealInterceptorChain.kt:109)
01-24 11:47:50.086 17196 17298 E RepoUpdateManager: at okhttp3.internal.http.RetryAndFollowUpInterceptor.intercept(RetryAndFollowUpInterceptor.kt:76)
01-24 11:47:50.086 17196 17298 E RepoUpdateManager: at okhttp3.internal.http.RealInterceptorChain.proceed(RealInterceptorChain.kt:109)
01-24 11:47:50.086 17196 17298 E RepoUpdateManager: at okhttp3.internal.connection.RealCall.getResponseWithInterceptorChain$okhttp(RealCall.kt:201)
01-24 11:47:50.086 17196 17298 E RepoUpdateManager: at okhttp3.internal.connection.RealCall$AsyncCall.run(RealCall.kt:517)
01-24 11:47:50.086 17196 17298 E RepoUpdateManager: at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1154)
01-24 11:47:50.086 17196 17298 E RepoUpdateManager: at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:652)
01-24 11:47:50.086 17196 17298 E RepoUpdateManager: at java.lang.Thread.run(Thread.java:1563)
01-24 11:47:50.086 17196 17298 E RepoUpdateManager: Caused by: java.security.cert.CertificateException: java.security.cert.CertPathValidatorException: Trust anchor for certification path not found.
01-24 11:47:50.086 17196 17298 E RepoUpdateManager: at com.android.org.conscrypt.TrustManagerImpl.verifyChain(TrustManagerImpl.java:665)
01-24 11:47:50.086 17196 17298 E RepoUpdateManager: at com.android.org.conscrypt.TrustManagerImpl.checkTrustedRecursive(TrustManagerImpl.java:542)
01-24 11:47:50.086 17196 17298 E RepoUpdateManager: at com.android.org.conscrypt.TrustManagerImpl.checkTrusted(TrustManagerImpl.java:498)
01-24 11:47:50.086 17196 17298 E RepoUpdateManager: at com.android.org.conscrypt.TrustManagerImpl.checkTrusted(TrustManagerImpl.java:418)
01-24 11:47:50.086 17196 17298 E RepoUpdateManager: at com.android.org.conscrypt.TrustManagerImpl.getTrustedChainForServer(TrustManagerImpl.java:346)
01-24 11:47:50.086 17196 17298 E RepoUpdateManager: at android.security.net.config.NetworkSecurityTrustManager.checkServerTrusted(NetworkSecurityTrustManager.java:95)
01-24 11:47:50.086 17196 17298 E RepoUpdateManager: at android.security.net.config.RootTrustManager.checkServerTrusted(RootTrustManager.java:90)
01-24 11:47:50.086 17196 17298 E RepoUpdateManager: at com.android.org.conscrypt.ConscryptEngineSocket$2.checkServerTrusted(ConscryptEngineSocket.java:169)
01-24 11:47:50.086 17196 17298 E RepoUpdateManager: at com.android.org.conscrypt.Platform.checkServerTrusted(Platform.java:286)
01-24 11:47:50.086 17196 17298 E RepoUpdateManager: at com.android.org.conscrypt.ConscryptEngine.verifyCertificateChain(ConscryptEngine.java:1635)
01-24 11:47:50.086 17196 17298 E RepoUpdateManager: at com.android.org.conscrypt.NativeCrypto.ENGINE_SSL_read_direct(Native Method)
01-24 11:47:50.086 17196 17298 E RepoUpdateManager: at com.android.org.conscrypt.NativeSsl.readDirectByteBuffer(NativeSsl.java:571)
01-24 11:47:50.086 17196 17298 E RepoUpdateManager: at com.android.org.conscrypt.ConscryptEngine.readPlaintextDataDirect(ConscryptEngine.java:1092)
01-24 11:47:50.086 17196 17298 E RepoUpdateManager: at com.android.org.conscrypt.ConscryptEngine.readPlaintextData(ConscryptEngine.java:1076)
01-24 11:47:50.086 17196 17298 E RepoUpdateManager: ... 27 more
01-24 11:47:50.086 17196 17298 E RepoUpdateManager: Caused by: java.security.cert.CertPathValidatorException: Trust anchor for certification path not found.
01-24 11:47:50.086 17196 17298 E RepoUpdateManager: ... 41 more
Screenshots/Screen recordings
No response
Logs
No response
Affected Android/Custom ROM version
GrapheneOS
Affected device model
Google Pixel 6
Additional information
Maybe related to TeamNewPipe/website#420
The issue is closed but the website still cannot be reached. DNS resolution is still failing with major DNS resolvers (cloudflare, google).
Checklist
Affected version
not relevant
Steps to reproduce the bug
Expected behavior
repository should be updated
Actual behavior
CertPathValidatorException
Screenshots/Screen recordings
No response
Logs
No response
Affected Android/Custom ROM version
GrapheneOS
Affected device model
Google Pixel 6
Additional information
Maybe related to TeamNewPipe/website#420
The issue is closed but the website still cannot be reached. DNS resolution is still failing with major DNS resolvers (cloudflare, google).