Unable to login: Problem with provider (with sefsigned-cert)
After upgrading from 0.7 to 0.8, bitmask connects as usual automatically on startup to demo.bm, but doesn't log in automatically ("Unable to login: Problem with provider"):
--- git/couch20 » bitmask --debug 2015-02-06 21:36:35,421 - DEBUG - L#51 : leap:create_logger() - Console handler plugged! 2015-02-06 21:36:35,421 - DEBUG - L#58 : leap:create_logger() - Leap handler plugged! 2015-02-06 21:36:35,422 - DEBUG - L#53 : leap:write() - 2015-02-06 21:36:35+0100 [-] Log opened. 2015-02-06 21:36:35,429 - DEBUG - L#72 : leap.bitmask.util.requirement_checker:check_requirements() - Checking requirements... 2015-02-06 21:36:35,429 - DEBUG - L#100 : leap.bitmask.util.requirement_checker:check_requirements() - requests>=1.1.0 ... OK 2015-02-06 21:36:35,430 - DEBUG - L#100 : leap.bitmask.util.requirement_checker:check_requirements() - srp>=1.0.2 ... OK 2015-02-06 21:36:35,430 - DEBUG - L#100 : leap.bitmask.util.requirement_checker:check_requirements() - pyopenssl ... OK 2015-02-06 21:36:35,430 - DEBUG - L#100 : leap.bitmask.util.requirement_checker:check_requirements() - python-dateutil ... OK 2015-02-06 21:36:35,430 - DEBUG - L#100 : leap.bitmask.util.requirement_checker:check_requirements() - psutil ... OK 2015-02-06 21:36:35,430 - DEBUG - L#100 : leap.bitmask.util.requirement_checker:check_requirements() - ipaddr ... OK 2015-02-06 21:36:35,430 - DEBUG - L#100 : leap.bitmask.util.requirement_checker:check_requirements() - python-daemon # this should not be needed for Windows. ... OK 2015-02-06 21:36:35,430 - DEBUG - L#100 : leap.bitmask.util.requirement_checker:check_requirements() - keyring ... OK 2015-02-06 21:36:35,430 - DEBUG - L#100 : leap.bitmask.util.requirement_checker:check_requirements() - zope.proxy ... OK 2015-02-06 21:36:35,430 - DEBUG - L#100 : leap.bitmask.util.requirement_checker:check_requirements() - pyzmq ... OK 2015-02-06 21:36:35,431 - DEBUG - L#100 : leap.bitmask.util.requirement_checker:check_requirements() - leap.common>=0.3.7 ... OK 2015-02-06 21:36:35,431 - DEBUG - L#100 : leap.bitmask.util.requirement_checker:check_requirements() - leap.soledad.client>=0.6.0 ... OK 2015-02-06 21:36:35,431 - DEBUG - L#100 : leap.bitmask.util.requirement_checker:check_requirements() - leap.keymanager>=0.3.8 ... OK 2015-02-06 21:36:35,431 - DEBUG - L#100 : leap.bitmask.util.requirement_checker:check_requirements() - leap.mail>=0.3.9 ... OK 2015-02-06 21:36:35,431 - DEBUG - L#100 : leap.bitmask.util.requirement_checker:check_requirements() - oauth ... OK 2015-02-06 21:36:35,431 - DEBUG - L#102 : leap.bitmask.util.requirement_checker:check_requirements() - Done 2015-02-06 21:36:35,431 - INFO - L#174 : leap:start_app() - ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 2015-02-06 21:36:35,431 - INFO - L#175 : leap:start_app() - Bitmask version 0.8.0 2015-02-06 21:36:35,431 - INFO - L#176 : leap:start_app() - leap.mail version 0.3.11 2015-02-06 21:36:35,432 - INFO - L#177 : leap:start_app() - ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 2015-02-06 21:36:35,432 - INFO - L#179 : leap:start_app() - Starting app 2015-02-06 21:36:35,432 - DEBUG - L#59 : leap.bitmask.backend.backend_proxy:__init__() - Connecting to server... 2015-02-06 21:36:35,933 - CRITICAL - L#215 : leap.bitmask.backend.backend_proxy:_send_request() - Timeout error contacting backend. 2015-02-06 21:36:35,934 - DEBUG - L#182 : leap:start_app() - Backend online: False 2015-02-06 21:36:35,944 - DEBUG - L#49 : leap.bitmask.backend.signaler:__init__() - Connecting to signaling server... 2015-02-06 21:36:36,181 - DEBUG - L#59 : leap.bitmask.backend.backend_proxy:__init__() - Connecting to server... 2015-02-06 21:36:36,183 - DEBUG - L#66 : leap.bitmask.backend.signaler_qt:_run() - Running SignalerQt loop 2015-02-06 21:36:36,194 - DEBUG - L#55 : leap.bitmask.util.keyring_helpers:_get_keyring_with_fallback() - Selected keyring: 2015-02-06 21:36:36,203 - DEBUG - L#55 : leap.bitmask.util.keyring_helpers:_get_keyring_with_fallback() - Selected keyring: 2015-02-06 21:36:36,257 - DEBUG - L#71 : leap.bitmask.platform_init.initializers:init_platform() - Running initializer for Linux 2015-02-06 21:36:36,413 - DEBUG - L#111 : leap.bitmask.services.eip.conductor:start_eip_machine() - eip machine started 2015-02-06 21:36:36,413 - DEBUG - L#241 : leap.bitmask.services.mail.conductor:start_mail_machine() - Starting mail state machine... 2015-02-06 21:36:36,422 - DEBUG - L#55 : leap.bitmask.util.keyring_helpers:_get_keyring_with_fallback() - Selected keyring: 2015-02-06 21:36:36,423 - DEBUG - L#55 : leap.bitmask.util.keyring_helpers:_get_keyring_with_fallback() - Selected keyring: 2015-02-06 21:36:36,442 - DEBUG - L#55 : leap.bitmask.util.keyring_helpers:_get_keyring_with_fallback() - Selected keyring: 2015-02-06 21:36:36,442 - DEBUG - L#55 : leap.bitmask.util.keyring_helpers:_get_keyring_with_fallback() - Selected keyring: 2015-02-06 21:36:36,479 - DEBUG - L#59 : leap.bitmask.gui.statemachines:onEntry() - State Encrypted Internet::off entered. Emitting signal ... 2015-02-06 21:36:36,480 - DEBUG - L#59 : leap.bitmask.gui.statemachines:onEntry() - State Mail::off entered. Emitting signal ... 2015-02-06 21:36:36,480 - DEBUG - L#59 : leap.bitmask.gui.statemachines:onEntry() - State IMAP::off entered. Emitting signal ... 2015-02-06 21:36:36,480 - DEBUG - L#59 : leap.bitmask.gui.statemachines:onEntry() - State IMAP::off entered. Emitting signal ... 2015-02-06 21:36:36,494 - DEBUG - L#53 : leap:write() - 2015-02-06 21:36:36+0100 [-] Setting up provider unstable.bitmask.net... 2015-02-06 21:36:36,494 - DEBUG - L#120 : leap.bitmask.provider.providerbootstrapper:_check_name_resolution() - Checking name resolution for u'unstable.bitmask.net' 2015-02-06 21:36:36,550 - DEBUG - L#134 : leap.bitmask.provider.providerbootstrapper:_check_https() - Checking https for u'unstable.bitmask.net' 2015-02-06 21:36:36,640 - DEBUG - L#333 : leap.bitmask.gui.eip_status:enable_eip_start() - Showing EIP start button 2015-02-06 21:36:36,641 - DEBUG - L#368 : leap.bitmask.gui.eip_status:set_eip_status() - 2015-02-06 21:36:36,641 - DEBUG - L#333 : leap.bitmask.gui.eip_status:enable_eip_start() - Showing EIP start button 2015-02-06 21:36:36,641 - DEBUG - L#368 : leap.bitmask.gui.eip_status:set_eip_status() - Starting... 2015-02-06 21:36:36,679 - DEBUG - L#66 : leap.bitmask.services.eip.eipbootstrapper:_download_config() - Downloading EIP config for demo.bitmask.net 2015-02-06 21:36:36,679 - DEBUG - L#127 : leap.bitmask.services:download_service_config() - Downloading EIP config from: https://api.demo.bitmask.net:4430/1/config/eip-service.json 2015-02-06 21:36:36,680 - DEBUG - L#202 : leap.bitmask.config.providerconfig:get_ca_cert_path() - Going to verify SSL against /home/varac/.config/leap/providers/demo.bitmask.net/keys/ca/cacert.pem bitmask-root: done 2015-02-06 21:36:36,984 - DEBUG - L#53 : leap:write() - 2015-02-06 21:36:36+0100 [-] Unhandled Error 2015-02-06 21:36:36,984 - DEBUG - L#53 : leap:write() - Traceback (most recent call last): 2015-02-06 21:36:36,985 - DEBUG - L#53 : leap:write() - File "/usr/lib/python2.7/threading.py", line 783, in __bootstrap 2015-02-06 21:36:36,985 - DEBUG - L#53 : leap:write() - self.__bootstrap_inner() 2015-02-06 21:36:36,986 - DEBUG - L#53 : leap:write() - File "/usr/lib/python2.7/threading.py", line 810, in __bootstrap_inner 2015-02-06 21:36:36,986 - DEBUG - L#53 : leap:write() - self.run() 2015-02-06 21:36:36,986 - ERROR - L#453 : leap.bitmask.gui.login:_provider_setup_intermediate() - Provider does not support HTTPS 2015-02-06 21:36:36,986 - DEBUG - L#53 : leap:write() - File "/usr/lib/python2.7/threading.py", line 763, in run 2015-02-06 21:36:36,987 - DEBUG - L#53 : leap:write() - self.__target(*self.__args, **self.__kwargs) 2015-02-06 21:36:36,987 - DEBUG - L#53 : leap:write() - --- --- 2015-02-06 21:36:36,987 - DEBUG - L#53 : leap:write() - File "/usr/lib/python2.7/dist-packages/twisted/python/threadpool.py", line 196, in _worker 2015-02-06 21:36:36,987 - DEBUG - L#53 : leap:write() - result = context.call(ctx, function, *args, **kwargs) 2015-02-06 21:36:36,987 - DEBUG - L#53 : leap:write() - File "/usr/lib/python2.7/dist-packages/twisted/python/context.py", line 118, in callWithContext 2015-02-06 21:36:36,988 - DEBUG - L#53 : leap:write() - return self.currentContext().callWithContext(ctx, func, *args, **kw) 2015-02-06 21:36:36,988 - DEBUG - L#53 : leap:write() - File "/usr/lib/python2.7/dist-packages/twisted/python/context.py", line 81, in callWithContext 2015-02-06 21:36:36,988 - DEBUG - L#55 : leap.bitmask.util.keyring_helpers:_get_keyring_with_fallback() - Selected keyring: 2015-02-06 21:36:36,988 - DEBUG - L#53 : leap:write() - return func(*args,**kw) 2015-02-06 21:36:36,988 - DEBUG - L#53 : leap:write() - File "/usr/lib/python2.7/dist-packages/leap/bitmask/provider/providerbootstrapper.py", line 148, in _check_https 2015-02-06 21:36:36,988 - DEBUG - L#53 : leap:write() - timeout=REQUEST_TIMEOUT) 2015-02-06 21:36:36,989 - DEBUG - L#53 : leap:write() - File "/usr/local/lib/python2.7/dist-packages/requests-2.5.0-py2.7.egg/requests/sessions.py", line 473, in get 2015-02-06 21:36:36,989 - DEBUG - L#53 : leap:write() - return self.request('GET', url, **kwargs) 2015-02-06 21:36:36,989 - DEBUG - L#53 : leap:write() - File "/usr/local/lib/python2.7/dist-packages/requests-2.5.0-py2.7.egg/requests/sessions.py", line 461, in request 2015-02-06 21:36:36,989 - DEBUG - L#53 : leap:write() - resp = self.send(prep, **send_kwargs) 2015-02-06 21:36:36,989 - DEBUG - L#53 : leap:write() - File "/usr/local/lib/python2.7/dist-packages/requests-2.5.0-py2.7.egg/requests/sessions.py", line 573, in send 2015-02-06 21:36:36,990 - DEBUG - L#53 : leap:write() - r = adapter.send(request, **kwargs) 2015-02-06 21:36:36,990 - DEBUG - L#53 : leap:write() - File "/usr/local/lib/python2.7/dist-packages/requests-2.5.0-py2.7.egg/requests/adapters.py", line 370, in send 2015-02-06 21:36:36,990 - DEBUG - L#53 : leap:write() - timeout=timeout 2015-02-06 21:36:36,990 - DEBUG - L#53 : leap:write() - File "/usr/local/lib/python2.7/dist-packages/requests-2.5.0-py2.7.egg/requests/packages/urllib3/connectionpool.py", line 518, in urlopen 2015-02-06 21:36:36,990 - DEBUG - L#53 : leap:write() - body=body, headers=headers) 2015-02-06 21:36:36,991 - DEBUG - L#53 : leap:write() - File "/usr/local/lib/python2.7/dist-packages/requests-2.5.0-py2.7.egg/requests/packages/urllib3/connectionpool.py", line 325, in _make_request 2015-02-06 21:36:36,991 - DEBUG - L#53 : leap:write() - self._raise_timeout(err=e, url=url, timeout_value=conn.timeout) 2015-02-06 21:36:36,991 - DEBUG - L#53 : leap:write() - File "/usr/local/lib/python2.7/dist-packages/requests-2.5.0-py2.7.egg/requests/packages/urllib3/connectionpool.py", line 295, in _raise_timeout 2015-02-06 21:36:36,991 - DEBUG - L#53 : leap:write() - if 'timed out' in str(err) or 'did not complete (read)' in str(err): # Python 2.6 2015-02-06 21:36:36,991 - DEBUG - L#53 : leap:write() - exceptions.TypeError: __str__ returned non-string (type Error) 2015-02-06 21:36:37,806 - DEBUG - L#160 : leap.bitmask.services:download_service_config() - EIP definition has not been modified 2015-02-06 21:36:37,813 - DEBUG - L#83 : leap.bitmask.services.eip.eipbootstrapper:_download_client_certificates() - Downloading EIP client certificate for demo.bitmask.net 2015-02-06 21:36:37,853 - DEBUG - L#59 : leap.bitmask.gui.statemachines:onEntry() - State Encrypted Internet::connecting entered. Emitting signal ... 2015-02-06 21:36:38,108 - DEBUG - L#177 : leap.bitmask.services.eip.vpnprocess:start() - VPN: start 2015-02-06 21:36:38,146 - DEBUG - L#139 : leap.bitmask.services.eip.vpnlauncher:get_gateways() - Using gateways ips: 46.165.242.169, 198.252.153.84 bitmask-root: done 2015-02-06 21:36:38,309 - DEBUG - L#139 : leap.bitmask.services.eip.vpnlauncher:get_gateways() - Using gateways ips: 46.165.242.169, 198.252.153.84 2015-02-06 21:36:38,310 - DEBUG - L#323 : leap.bitmask.services.eip.eipconfig:get_client_cert_path() - Using OpenVPN cert /home/varac/.config/leap/providers/demo.bitmask.net/keys/client/openvpn.pem 2015-02-06 21:36:38,310 - DEBUG - L#323 : leap.bitmask.services.eip.eipconfig:get_client_cert_path() - Using OpenVPN cert /home/varac/.config/leap/providers/demo.bitmask.net/keys/client/openvpn.pem 2015-02-06 21:36:38,310 - DEBUG - L#202 : leap.bitmask.config.providerconfig:get_ca_cert_path() - Going to verify SSL against /home/varac/.config/leap/providers/demo.bitmask.net/keys/ca/cacert.pem 2015-02-06 21:36:38,622 - DEBUG - L#954 : leap.bitmask.services.eip.vpnprocess:getCommand() - Running VPN with command: 2015-02-06 21:36:38,622 - DEBUG - L#955 : leap.bitmask.services.eip.vpnprocess:getCommand() - /usr/bin/pkexec /usr/sbin/bitmask-root openvpn start /usr/sbin/openvpn --setenv LEAPOPENVPN 1 --nobind --remote 46.165.242.169 1194 udp --remote 198.252.153.84 1194 udp --client --dev tun --persist-key --tls-client --remote-cert-tls server --tls-cipher DHE-RSA-AES128-SHA --cipher AES-128-CBC --auth SHA1 --management-client-user varac --management-signal --management /tmp/leap-tmpqol6rk/openvpn.socket unix --script-security 2 --cert /home/varac/.config/leap/providers/demo.bitmask.net/keys/client/openvpn.pem --key /home/varac/.config/leap/providers/demo.bitmask.net/keys/client/openvpn.pem --ca /home/varac/.config/leap/providers/demo.bitmask.net/keys/ca/cacert.pem --ping 10 --ping-restart 30 2015-02-06 21:36:38,625 - DEBUG - L#598 : leap.bitmask.services.eip.vpnprocess:try_to_connect_to_management() - trying to connect to management 2015-02-06 21:36:38,626 - WARNING - L#531 : leap.bitmask.services.eip.vpnprocess:_connect_management() - Could not connect to OpenVPN yet: MissingSocketError() 2015-02-06 21:36:38,626 - DEBUG - L#543 : leap.bitmask.services.eip.vpnprocess:_connectCb() - Cannot connect to management... 2015-02-06 21:36:38,627 - DEBUG - L#454 : leap.bitmask.backend.components:start() - EIP: no errors 2015-02-06 21:36:38,684 - INFO - L#887 : leap.openvpn:outReceived() - Fri Feb 6 21:36:38 2015 OpenVPN 2.3.2 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [eurephia] [MH] [IPv6] built on Dec 1 2014 2015-02-06 21:36:38,684 - INFO - L#887 : leap.openvpn:outReceived() - Fri Feb 6 21:36:38 2015 WARNING: you are using user/group/chroot/setcon without persist-tun -- this may cause restarts to fail Fri Feb 6 21:36:38 2015 WARNING: you are using user/group/chroot/setcon without persist-key -- this may cause restarts to fail 2015-02-06 21:36:38,685 - INFO - L#887 : leap.openvpn:outReceived() - Fri Feb 6 21:36:38 2015 Deprecated TLS cipher name 'DHE-RSA-AES128-SHA', please use IANA name 'TLS-DHE-RSA-WITH-AES-128-CBC-SHA' 2015-02-06 21:36:38,685 - INFO - L#887 : leap.openvpn:outReceived() - Fri Feb 6 21:36:38 2015 NOTE: UID/GID downgrade will be delayed because of --client, --pull, or --up-delay Fri Feb 6 21:36:38 2015 UDPv4 link local: [undef] Fri Feb 6 21:36:38 2015 UDPv4 link remote: [AF_INET]46.165.242.169:1194 2015-02-06 21:36:39,523 - INFO - L#887 : leap.openvpn:outReceived() - Fri Feb 6 21:36:39 2015 [otter.demo.bitmask.net] Peer Connection Initiated with [AF_INET]46.165.242.169:1194 2015-02-06 21:36:39,626 - DEBUG - L#598 : leap.bitmask.services.eip.vpnprocess:try_to_connect_to_management() - trying to connect to management 2015-02-06 21:36:39,627 - INFO - L#541 : leap.bitmask.services.eip.vpnprocess:_connectCb() - Connected to management 2015-02-06 21:36:39,656 - DEBUG - L#368 : leap.bitmask.gui.eip_status:set_eip_status() - Authenticating... 2015-02-06 21:36:40,629 - DEBUG - L#598 : leap.bitmask.services.eip.vpnprocess:try_to_connect_to_management() - trying to connect to management 2015-02-06 21:36:40,643 - DEBUG - L#368 : leap.bitmask.gui.eip_status:set_eip_status() - Retrieving configuration... 2015-02-06 21:36:41,659 - INFO - L#887 : leap.openvpn:outReceived() - Fri Feb 6 21:36:41 2015 TUN/TAP device tun0 opened Fri Feb 6 21:36:41 2015 do_ifconfig, tt->ipv6=1, tt->did_ifconfig_ipv6_setup=1 Fri Feb 6 21:36:41 2015 /sbin/ip link set dev tun0 up mtu 1500 2015-02-06 21:36:41,662 - INFO - L#887 : leap.openvpn:outReceived() - Fri Feb 6 21:36:41 2015 /sbin/ip addr add dev tun0 10.42.0.4/21 broadcast 10.42.7.255 2015-02-06 21:36:41,665 - INFO - L#887 : leap.openvpn:outReceived() - Fri Feb 6 21:36:41 2015 /sbin/ip -6 addr add 2001:db8:123::1002/64 dev tun0 2015-02-06 21:36:41,669 - INFO - L#887 : leap.openvpn:outReceived() - Fri Feb 6 21:36:41 2015 ERROR: Linux route add command failed: external program exited with error status: 2 2015-02-06 21:36:41,673 - INFO - L#887 : leap.openvpn:outReceived() - Fri Feb 6 21:36:41 2015 add_route_ipv6(2000::/3 -> 2001:db8:123::1 metric -1) dev tun0 2015-02-06 21:36:41,675 - INFO - L#887 : leap.openvpn:outReceived() - Fri Feb 6 21:36:41 2015 GID set to nogroup Fri Feb 6 21:36:41 2015 UID set to nobody Fri Feb 6 21:36:41 2015 Initialization Sequence Completed 2015-02-06 21:36:41,676 - DEBUG - L#95 : leap.bitmask.services.eip.vpnprocess:watch() - pattern matched! Initialization Sequence Completed 2015-02-06 21:36:42,665 - DEBUG - L#1305 : leap.bitmask.gui.mainwindow:_maybe_run_soledad_setup_checks() - Provider does not offer MX, but it is enabled. 2015-02-06 21:36:42,665 - DEBUG - L#59 : leap.bitmask.gui.statemachines:onEntry() - State Encrypted Internet::on entered. Emitting signal ... 2015-02-06 21:36:42,721 - DEBUG - L#716 : leap.bitmask.backend.components:check_ok() - DNS check OK 2015-02-06 21:37:36,642 - DEBUG - L#1305 : leap.bitmask.gui.mainwindow:_maybe_run_soledad_setup_checks() - Provider does not offer MX, but it is enabled.
as you can see on the screenshot, demo.bimask.net is configured, but when i click on "log in", it chokes again, strangly trying to connect to unstable.bitmask.net:
2015-02-06 21:41:08,570 - WARNING - L#46 : leap.bitmask.gui.signaltracker:connect_and_track() - Signal already connected. 2015-02-06 21:41:08,570 - WARNING - L#46 : leap.bitmask.gui.signaltracker:connect_and_track() - Signal already connected. 2015-02-06 21:41:08,570 - WARNING - L#46 : leap.bitmask.gui.signaltracker:connect_and_track() - Signal already connected. 2015-02-06 21:41:08,570 - WARNING - L#46 : leap.bitmask.gui.signaltracker:connect_and_track() - Signal already connected. 2015-02-06 21:41:08,571 - WARNING - L#46 : leap.bitmask.gui.signaltracker:connect_and_track() - Signal already connected. 2015-02-06 21:41:08,571 - WARNING - L#46 : leap.bitmask.gui.signaltracker:connect_and_track() - Signal already connected. 2015-02-06 21:41:08,571 - WARNING - L#46 : leap.bitmask.gui.signaltracker:connect_and_track() - Signal already connected. 2015-02-06 21:41:08,571 - WARNING - L#46 : leap.bitmask.gui.signaltracker:connect_and_track() - Signal already connected. 2015-02-06 21:41:08,573 - DEBUG - L#55 : leap.bitmask.util.keyring_helpers:_get_keyring_with_fallback() - Selected keyring: 2015-02-06 21:41:08,573 - DEBUG - L#55 : leap.bitmask.util.keyring_helpers:_get_keyring_with_fallback() - Selected keyring: 2015-02-06 21:41:08,649 - DEBUG - L#53 : leap:write() - 2015-02-06 21:41:08+0100 [-] Setting up provider unstable.bitmask.net... 2015-02-06 21:41:08,650 - DEBUG - L#120 : leap.bitmask.provider.providerbootstrapper:_check_name_resolution() - Checking name resolution for u'unstable.bitmask.net' 2015-02-06 21:41:08,692 - DEBUG - L#134 : leap.bitmask.provider.providerbootstrapper:_check_https() - Checking https for u'unstable.bitmask.net' 2015-02-06 21:41:09,006 - DEBUG - L#53 : leap:write() - 2015-02-06 21:41:09+0100 [-] Unhandled Error 2015-02-06 21:41:09,007 - DEBUG - L#53 : leap:write() - Traceback (most recent call last): 2015-02-06 21:41:09,007 - DEBUG - L#53 : leap:write() - File "/usr/lib/python2.7/threading.py", line 783, in __bootstrap 2015-02-06 21:41:09,008 - DEBUG - L#53 : leap:write() - self.__bootstrap_inner() 2015-02-06 21:41:09,008 - DEBUG - L#53 : leap:write() - File "/usr/lib/python2.7/threading.py", line 810, in __bootstrap_inner 2015-02-06 21:41:09,008 - DEBUG - L#53 : leap:write() - self.run() 2015-02-06 21:41:09,009 - DEBUG - L#53 : leap:write() - File "/usr/lib/python2.7/threading.py", line 763, in run 2015-02-06 21:41:09,009 - DEBUG - L#53 : leap:write() - self.__target(*self.__args, **self.__kwargs) 2015-02-06 21:41:09,009 - DEBUG - L#53 : leap:write() - --- --- 2015-02-06 21:41:09,010 - DEBUG - L#53 : leap:write() - File "/usr/lib/python2.7/dist-packages/twisted/python/threadpool.py", line 196, in _worker 2015-02-06 21:41:09,010 - DEBUG - L#53 : leap:write() - result = context.call(ctx, function, *args, **kwargs) 2015-02-06 21:41:09,010 - DEBUG - L#53 : leap:write() - File "/usr/lib/python2.7/dist-packages/twisted/python/context.py", line 118, in callWithContext 2015-02-06 21:41:09,010 - DEBUG - L#53 : leap:write() - return self.currentContext().callWithContext(ctx, func, *args, **kw) 2015-02-06 21:41:09,011 - DEBUG - L#53 : leap:write() - File "/usr/lib/python2.7/dist-packages/twisted/python/context.py", line 81, in callWithContext 2015-02-06 21:41:09,011 - DEBUG - L#53 : leap:write() - return func(*args,**kw) 2015-02-06 21:41:09,011 - DEBUG - L#53 : leap:write() - File "/usr/lib/python2.7/dist-packages/leap/bitmask/provider/providerbootstrapper.py", line 148, in _check_https 2015-02-06 21:41:09,011 - DEBUG - L#53 : leap:write() - timeout=REQUEST_TIMEOUT) 2015-02-06 21:41:09,012 - DEBUG - L#53 : leap:write() - File "/usr/local/lib/python2.7/dist-packages/requests-2.5.0-py2.7.egg/requests/sessions.py", line 473, in get 2015-02-06 21:41:09,012 - DEBUG - L#53 : leap:write() - return self.request('GET', url, **kwargs) 2015-02-06 21:41:09,012 - DEBUG - L#53 : leap:write() - File "/usr/local/lib/python2.7/dist-packages/requests-2.5.0-py2.7.egg/requests/sessions.py", line 461, in request 2015-02-06 21:41:09,012 - DEBUG - L#53 : leap:write() - resp = self.send(prep, **send_kwargs) 2015-02-06 21:41:09,013 - DEBUG - L#53 : leap:write() - File "/usr/local/lib/python2.7/dist-packages/requests-2.5.0-py2.7.egg/requests/sessions.py", line 573, in send 2015-02-06 21:41:09,013 - DEBUG - L#53 : leap:write() - r = adapter.send(request, **kwargs) 2015-02-06 21:41:09,013 - DEBUG - L#53 : leap:write() - File "/usr/local/lib/python2.7/dist-packages/requests-2.5.0-py2.7.egg/requests/adapters.py", line 370, in send 2015-02-06 21:41:09,013 - DEBUG - L#53 : leap:write() - timeout=timeout 2015-02-06 21:41:09,014 - DEBUG - L#53 : leap:write() - File "/usr/local/lib/python2.7/dist-packages/requests-2.5.0-py2.7.egg/requests/packages/urllib3/connectionpool.py", line 518, in urlopen 2015-02-06 21:41:09,014 - DEBUG - L#53 : leap:write() - body=body, headers=headers) 2015-02-06 21:41:09,014 - DEBUG - L#53 : leap:write() - File "/usr/local/lib/python2.7/dist-packages/requests-2.5.0-py2.7.egg/requests/packages/urllib3/connectionpool.py", line 325, in _make_request 2015-02-06 21:41:09,014 - DEBUG - L#53 : leap:write() - self._raise_timeout(err=e, url=url, timeout_value=conn.timeout) 2015-02-06 21:41:09,015 - DEBUG - L#53 : leap:write() - File "/usr/local/lib/python2.7/dist-packages/requests-2.5.0-py2.7.egg/requests/packages/urllib3/connectionpool.py", line 295, in _raise_timeout 2015-02-06 21:41:09,015 - DEBUG - L#53 : leap:write() - if 'timed out' in str(err) or 'did not complete (read)' in str(err): # Python 2.6 2015-02-06 21:41:09,015 - DEBUG - L#53 : leap:write() - exceptions.TypeError: __str__ returned non-string (type Error) 2015-02-06 21:41:09,017 - ERROR - L#453 : leap.bitmask.gui.login:_provider_setup_intermediate() - Provider does not support HTTPS 2015-02-06 21:41:09,019 - DEBUG - L#55 : leap.bitmask.util.keyring_helpers:_get_keyring_with_fallback() - Selected keyring:
(from redmine: created on 2015-02-06, relates #6654 (closed))