-
-
Notifications
You must be signed in to change notification settings - Fork 25
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Wrong Let's Encrypt CA chain presented by your server #1792
Comments
I don't really see the behaviour described here:
So, what is the DNS records and IP address(es) you are connecting to? |
Nor with SNI:
|
Neither there's anything wrong at the SSLLabs: https://www.ssllabs.com/ssltest/analyze.html?d=packages.sury.org There's trusted Certification Paths listed for every client. |
Nevertheless, I opened the ticket with @BunnyWay to remove the cruft being sent as part of the certificate chain. However, if the validation fails on your side, it means you are missing: ISRG Root X1 Self-signed in the trust store. |
But perhaps it's intentional - if you read the link that you sent yourself:
I don't really care about the Android devices, but other CDN users might. |
Let's encyrpt has changed CA chain
In this example, we are using LE with a unique and good CA chain path. This is the recommanded solution |
@oerdnj is correct, it's intentional, this is the cross-signed chain that servers should serve up so that (older) Android doesn't get lost (with that said, how many Androiders are going to be pulling the repo). Submitter must be missing the ISRG root, which they can get here... |
@lastuptodate What's your
|
@lastuptodate Well, you are wrong. The very material you provided disputes what you are saying. There's nothing wrong with the certificate chain sent from the server. Thanks @sleemanj for confirming my hypothesis. |
Have a look at CA Chain, they are both using Let's Encrypt: |
|
Thank for your help and your time, I think sadly that i will not convince you so I will resolved this problem using this sad and worst solution:
|
The hardenize.com report is plain wrong, it shows just the second chain. I've sent you the ssllabs.com report that you chose to ignore that shows both certificate paths. It's your choice to ignore the facts and advice what's wrong with your system, so don't put it on me. |
If you remove the expired X3 root from your system, and have the valid ISRG root on your system, then I expect it might verify. You just need one of them to verify, if as you say your tools are picking the X3, then you want to convince them to pick the ISRG, since the X3 is no use to you on your system (but is to old Androiders on their system). I think, from vague recollection, that's what I did back last year, on my ancient 14.04 (not for pulling this repo obviously, but to shut up some other stuff). Indeed, looking in /etc/ca-certificates.conf on that 14.04 system I have the X3 cert disabled. |
I'd still like to add, that your local certificate store is old and/or badly maintained. There's zero problems with clean Buster docker image using the instructions in README.txt, which installs latest |
I can't also reproduce on a fresh Buster but I can on old Buster install. And the winner is:
Upgrading this 2 packages solved my problem. |
I have fixed it this way #1729 (comment) |
Frequently asked questions
Describe the bug
packages.sury.org web server is presenting wrong CA chain
see: https://letsencrypt.org/docs/dst-root-ca-x3-expiration-september-2021/
To Reproduce
Steps to reproduce the behavior:
Expected behavior
The certicate must be recreated with the right CA chain, see: https://letsencrypt.org/docs/dst-root-ca-x3-expiration-september-2021/
This is generaly the case when you are using an outdated certbot provided by Debian rather than certbot by https://certbot.eff.org/. In some cases, you have to delete+create cert rather than renew. Also, --prefered-chain may also help you.
Distribution (please complete the following information):
The text was updated successfully, but these errors were encountered: