Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    HEADS UP: DST Root CA X3 Expiration (September 2021)

    Scheduled Pinned Locked Moved ACME
    31 Posts 12 Posters 10.5k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • JeGrJ
      JeGr LAYER 8 Moderator @VioletDragon
      last edited by

      @violetdragon Did you restart the services that used the certificate (chain)? If not, the service might still have the old intermediate loaded and cached. If everything is correct your browser, checks etc. should not see the old intermediate that will expire in a few days.

      Don't forget to upvote πŸ‘ those who kindly offered their time and brainpower to help you!

      If you're interested, I'm available to discuss details of German-speaking paid support (for companies) if needed.

      VioletDragonV 1 Reply Last reply Reply Quote 0
      • VioletDragonV
        VioletDragon @JeGr
        last edited by

        @jegr Hi, yeah I restarded haproxy and restarted the firewall and all certs for all domain are showing the same. Tested on another browser but the same. It's strange.

        JeGrJ 1 Reply Last reply Reply Quote 0
        • JeGrJ
          JeGr LAYER 8 Moderator @VioletDragon
          last edited by

          @violetdragon Then could you do me favor with the following steps:

          • Head over to the Cert Manager
          • Delete both LE CAs - the root and the newer R3 - the old R3 should be already gone
          • Renew the cert(s) in the acme package
          • Check the Cert Manager: the LE CAs should have been recreated as needed
          • Then restart the services as needed and check again if the new certificate chain is correct now

          Cheers
          \jens

          Don't forget to upvote πŸ‘ those who kindly offered their time and brainpower to help you!

          If you're interested, I'm available to discuss details of German-speaking paid support (for companies) if needed.

          VioletDragonV 2 Replies Last reply Reply Quote 1
          • S
            stepheng
            last edited by

            @jimp Thanks for the detailed instructions. I’d seen the expiry warning and wondered why my automatically renewing certificate was still using the old CA. All good now.

            1 Reply Last reply Reply Quote 1
            • VioletDragonV
              VioletDragon @JeGr
              last edited by VioletDragon

              @jegr Hi, Thanks for your reply. That is what i did the second time as i tested your guide with only one Cert for a different Domain I have and it did the same then i deleted both CAs as you mentioned above but the problem is still there I also restarted Haproxy and the Firewall.

              Interesting this is that Certificate Manager Shows it updated the new Cert is also updated as it has the date of creation on it.

              Thanks.

              Jack.

              1 Reply Last reply Reply Quote 0
              • VioletDragonV
                VioletDragon @JeGr
                last edited by VioletDragon

                @jegr Update, Just re-new a Cert and deleting both LE's and its still doing the same. Heres another Domain of mine. So not sure what is going.

                Screenshot from 2021-09-04 23-14-43.png Screenshot from 2021-09-04 23-14-54.png Screenshot from 2021-09-04 23-15-04.png Screenshot from 2021-09-04 23-15-30.png

                Update,

                The Certs are fine it seems to be a Firefox issue as Chrome/Brave Shows different I also checked it against https://decoder.link/sslchecker/ and checks out fine.

                Thank for your help guys :)

                JeGrJ 1 Reply Last reply Reply Quote 0
                • JeGrJ
                  JeGr LAYER 8 Moderator @VioletDragon
                  last edited by

                  @violetdragon Ah so more of a browser/caching thing - yeah that's a pain in the ass. Good to see it fixed anyway so you won't run into issues at the end of the month :)

                  Don't forget to upvote πŸ‘ those who kindly offered their time and brainpower to help you!

                  If you're interested, I'm available to discuss details of German-speaking paid support (for companies) if needed.

                  VioletDragonV 1 Reply Last reply Reply Quote 2
                  • VioletDragonV
                    VioletDragon @JeGr
                    last edited by

                    @jegr Firefox seems to handle it differently. I've noticed that it only happens when signed into a Firefox account so not sure if the account saves the cache but it's a strange one.

                    1 Reply Last reply Reply Quote 0
                    • M
                      marcosm Netgate
                      last edited by

                      The browsers / Windows have their own trusted root CAs. I expect that once the old ones expire/get removed/revoked from those built-in stores, the new chain will take precedence and show correctly.

                      1 Reply Last reply Reply Quote 0
                      • S
                        sergio.londono
                        last edited by

                        for testing while the SSL expire, We did:

                        Delete the expiring Root CA from the client browser.
                        image2021-9-19_12-25-44.png

                        Then, Open private browser:
                        image2021-9-19_12-26-3.png

                        VioletDragonV 1 Reply Last reply Reply Quote 2
                        • VioletDragonV
                          VioletDragon @sergio.londono
                          last edited by

                          @sergio-londono That's solved the problem, Cheers :)

                          1 Reply Last reply Reply Quote 1
                          • M
                            maverick_slo
                            last edited by

                            Hi all.
                            We use pfsense 2.4.4 version.
                            I did all the steps and all looks ok.

                            However reading about openssl, will acme (or any other thing) have issues when renewing certs? Like acme accessing le api which use le cert naturally?

                            If so, is there a way to fix it as we are unable to upgrade.

                            Thanks.

                            VioletDragonV 1 Reply Last reply Reply Quote 0
                            • VioletDragonV
                              VioletDragon @maverick_slo
                              last edited by

                              @maverick_slo why such a old version of pfsense? I would recommend updating.

                              johnpozJ 1 Reply Last reply Reply Quote 0
                              • johnpozJ
                                johnpoz LAYER 8 Global Moderator @VioletDragon
                                last edited by

                                @violetdragon said in HEADS UP: DST Root CA X3 Expiration (September 2021):

                                I would recommend updating.

                                While I would too - but I also have some units still on 2.4.4p3 - covid being the reason, with nobody on site.. And I can not go in - can not risk it. They might have to stay on that version until things really get back to normal. And I can be onside for update, and other remote sites have people there that can be my smart hands if things go belly up. Things normally go fine - but just not something can risk at this time. Maybe he is in the same sort of boat.. I hope he meant p3, this was the latest version before covid became a factor..

                                An intelligent man is sometimes forced to be drunk to spend time with his fools
                                If you get confused: Listen to the Music Play
                                Please don't Chat/PM me for help, unless mod related
                                SG-4860 24.11 | Lab VMs 2.7.2, 24.11

                                VioletDragonV 1 Reply Last reply Reply Quote 1
                                • VioletDragonV
                                  VioletDragon @johnpoz
                                  last edited by

                                  @johnpoz that makes sense. I have worked with people that neglects updating or just too lazy to do updates. Certs should be fine providing you have done the fix in this thread. Openssl has been updated since. You can try doing a dry run to see if it fetched a fake Cert if it does then you will be fine until you can update.

                                  johnpozJ 1 Reply Last reply Reply Quote 0
                                  • johnpozJ
                                    johnpoz LAYER 8 Global Moderator @VioletDragon
                                    last edited by

                                    @violetdragon I hear ya - you should always be current completely agree 110% Its kind of eating at me that they are not current ;)

                                    But these are different times for sure.. Before this I would of pulled the trigger on a sunday evening from home on the update, even if version just came out on saturday ;) Because I knew I could just go in bit early monday if it went belly up..

                                    So I am currently more willing to give some people slack on the update.. But yeah stay current I am with ya.

                                    An intelligent man is sometimes forced to be drunk to spend time with his fools
                                    If you get confused: Listen to the Music Play
                                    Please don't Chat/PM me for help, unless mod related
                                    SG-4860 24.11 | Lab VMs 2.7.2, 24.11

                                    VioletDragonV 1 Reply Last reply Reply Quote 0
                                    • VioletDragonV
                                      VioletDragon @johnpoz
                                      last edited by

                                      Just thought i'd put this out there, you can verify your SSL Cert by using the following.

                                      Tests using TLS 1.3
                                      openssl s_client -connect yourdomain.com:443 -tls1_3  
                                      
                                      Tests using TLS 1.2
                                      openssl s_client -connect yourdomain.com:443 -tls1_2 
                                      
                                      
                                      1 Reply Last reply Reply Quote 0
                                      • M
                                        maverick_slo
                                        last edited by

                                        My certs are fine πŸ™‚
                                        My question was actually if acme will have issues obtaining NEW certs from today onwards.

                                        GertjanG JeGrJ 2 Replies Last reply Reply Quote 0
                                        • GertjanG
                                          Gertjan @maverick_slo
                                          last edited by

                                          @maverick_slo

                                          Noop.
                                          Letenscrypt uses the new intermediate and root certificate to sign yours.
                                          'We' have to do ... nothing.

                                          No "help me" PM's please. Use the forum, the community will thank you.
                                          Edit : and where are the logs ??

                                          1 Reply Last reply Reply Quote 0
                                          • jimpJ
                                            jimp Rebel Alliance Developer Netgate
                                            last edited by

                                            @maverick_slo said in HEADS UP: DST Root CA X3 Expiration (September 2021):

                                            My certs are fine πŸ™‚
                                            My question was actually if acme will have issues obtaining NEW certs from today onwards.

                                            As long as the ACME package is renewing certs with ACME v2 you're fine. Not all of the older versions of the ACME package support that, but if that was a problem, it would have been failing for the last few months already. That's unrelated to this intermediate expiring.

                                            I've even copied (edited) ACME package files from a current package version back to a 2.3.x install and it renewed a cert fine there with ACME v2 and got the correct intermediate after I cleared out the old one.

                                            Remember: Upvote with the πŸ‘ button for any user/post you find to be helpful, informative, or deserving of recognition!

                                            Need help fast? Netgate Global Support!

                                            Do not Chat/PM for help!

                                            1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.