Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Expired Let's Encrypt CA when using it as a client

    Scheduled Pinned Locked Moved General pfSense Questions
    16 Posts 7 Posters 1.5k Views 3 Watching
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • GertjanG Offline
      Gertjan @securvark
      last edited by

      @securvark said in HEADS UP: DST Root CA X3 Expiration (September 2021):

      in other words, I think the /etc/ssl files are outdated ...

      Yep, the "DST Root" it's there :
      Symlinked from :/usr/local/share/certs/ca-root-nns.cert :

                  44:af:b0:80:d6:a3:27:ba:89:30:39:86:2e:f8:40:6b
              Signature Algorithm: sha1WithRSAEncryption
              Issuer: O = Digital Signature Trust Co., CN = DST Root CA X3
              Validity
                  Not Before: Sep 30 21:12:19 2000 GMT
                  Not After : Sep 30 14:01:15 2021 GMT
              Subject: O = Digital Signature Trust Co., CN = DST Root CA X3
              Subject Public Key Info:
      

      But, as it's expired, it isn't used any more.
      And you shouldn't use it neither ;)

      If your "gitlab.our.domain.org" makes use of "DST Root CA X3" then openssl on pfSense will yell.
      If it uses a non expired one, all will be well.

      My turn to test :

      openssl s_client -connect test-domaine.fr:443 -servername test-domaine.fr
      CONNECTED(00000003)
      depth=2 C = US, O = Internet Security Research Group, CN = ISRG Root X1
      verify return:1
      depth=1 C = US, O = Let's Encrypt, CN = R3
      verify return:1
      depth=0 CN = test-domaine.fr
      verify return:1
      ---
      Certificate chain
       0 s:CN = test-domaine.fr
         i:C = US, O = Let's Encrypt, CN = R3
       1 s:C = US, O = Let's Encrypt, CN = R3
         i:C = US, O = Internet Security Research Group, CN = ISRG Root X1
       2 s:C = US, O = Internet Security Research Group, CN = ISRG Root X1
         i:O = Digital Signature Trust Co., CN = DST Root CA X3
      ---
      ......
          Timeout   : 7200 (sec)
          Verify return code: 0 (ok)
          Extended master secret: no
      ---
      read:errno=0
      

      My Letencrypt certs (test-domaine.fr) use the newer "ISRG Root X1" so all is ok.

      Nice detail : The cert test-domaine.fr was created 23 August, so "DST Root" was still valid back then.
      But, a newer one is also included in the cert chain "just to be sure" so my certs stays valid even after 30/09

      No "help me" PM's please. Use the forum, the community will thank you.
      Edit : and where are the logs ??

      S 1 Reply Last reply Reply Quote 0
      • S Offline
        securvark @Gertjan
        last edited by

        @gertjan

        Thanks!

        Maybe I misunderstand you, or I haven't explained myself very well.

        Either way, our gitlab cert is new and uses the new lets encrypt ca.

        Our pfsense on the other hand does not have this new lets encrypt ca, so it cannot verify the gitlab certificate, hence openssl and git push will throw an error.

        I need to update /etc/ssl on pfsense, so that it has the new lets encrypt ca to validate certs that use that new chain.

        johnpozJ 1 Reply Last reply Reply Quote 0
        • johnpozJ Online
          johnpoz LAYER 8 Global Moderator @securvark
          last edited by johnpoz

          @securvark said in HEADS UP: DST Root CA X3 Expiration (September 2021):

          Our pfsense on the other hand does not have this new lets encrypt ca

          And what version of pfsense are you running? As @Gertjan shows the current CA is there. The old CA still being there is not a problem.

          An intelligent man is sometimes forced to be drunk to spend time with his fools
          If you get confused: Listen to the Music Play
          Please don't Chat/PM me for help, unless mod related
          SG-4860 25.07 | Lab VMs 2.8, 25.07

          S 1 Reply Last reply Reply Quote 0
          • S Offline
            securvark @johnpoz
            last edited by

            @johnpoz

            Its 2.4.5-RELEASE-p1.

            When i run that command it gives this:

            [2.4.5-RELEASE][root@hostname.org]/etc/ssl: openssl s_client -connect  gitlab.our.domain.org:443 -servername gitlab.our.domain.org
            CONNECTED(00000003)
            depth=3 O = Digital Signature Trust Co., CN = DST Root CA X3
            verify error:num=10:certificate has expired
            notAfter=Sep 30 14:01:15 2021 GMT
            ---
            Certificate chain
             0 s:/CN=*.our.domain.org
               i:/C=US/O=Let's Encrypt/CN=R3
             1 s:/C=US/O=Let's Encrypt/CN=R3
               i:/C=US/O=Internet Security Research Group/CN=ISRG Root X1
             2 s:/C=US/O=Internet Security Research Group/CN=ISRG Root X1
               i:/O=Digital Signature Trust Co./CN=DST Root CA X3
            .....
                Start Time: 1633695560
                Timeout   : 300 (sec)
                Verify return code: 10 (certificate has expired)
            
            1 Reply Last reply Reply Quote 0
            • jimpJ Offline
              jimp Rebel Alliance Developer Netgate
              last edited by

              This has nothing to do with the original thread where it was posted, so I forked it and moved it.

              You need to upgrade or you need to manually replace the root certificate list on your firewall because it's out of date. But the easiest way to do that is to upgrade to a supported version.

              Remember: Upvote with the 👍 button for any user/post you find to be helpful, informative, or deserving of recognition!

              Need help fast? Netgate Global Support!

              Do not Chat/PM for help!

              S johnpozJ 2 Replies Last reply Reply Quote 1
              • S Offline
                securvark @jimp
                last edited by

                @jimp Alright, will do (upgrade is planned) but for the time being I will update them manually from another already updated pfsense.

                Thanks @jimp!

                1 Reply Last reply Reply Quote 0
                • johnpozJ Online
                  johnpoz LAYER 8 Global Moderator @jimp
                  last edited by

                  @jimp said in Expired Let's Encrypt CA when using it as a client:

                  But the easiest way to do that is to upgrade to a supported version.

                  Just playing devils advocate here.. And I am the first one to advocate being current.. But when you say supported version.. From here - 2.4.5p1 is still supported ;)

                  https://docs.netgate.com/pfsense/en/latest/releases/versions.html
                  support.jpg

                  Such a case I think is more of a one-off sort of thing, pfsense as a client to something using acme prob not a lot of use cases?

                  Is there a easy way for such users to update the certs on pfsense without having to manually do it? Some sort of pkg upgrade or something that doesn't actually update the version of pfsense, but would update that cert.pem file to current?

                  I am all for updating to current version, but in this time of covid and company locations being closed, etc. It might not always be possible or prudent to update at this time. I have a couple of boxes that are behind for sure..

                  An intelligent man is sometimes forced to be drunk to spend time with his fools
                  If you get confused: Listen to the Music Play
                  Please don't Chat/PM me for help, unless mod related
                  SG-4860 25.07 | Lab VMs 2.8, 25.07

                  jimpJ 1 Reply Last reply Reply Quote 0
                  • jimpJ Offline
                    jimp Rebel Alliance Developer Netgate @johnpoz
                    last edited by

                    @johnpoz said in Expired Let's Encrypt CA when using it as a client:

                    Such a case I think is more of a one-off sort of thing, pfsense as a client to something using acme prob not a lot of use cases?

                    Hard to say. There are a few different ways something on the firewall may reach out to a system which could be using an ACME chain, like URL table aliases, pfBlockerNG lists, etc.

                    Is there a easy way for such users to update the certs on pfsense without having to manually do it? Some sort of pkg upgrade or something that doesn't actually update the version of pfsense, but would update that cert.pem file to current?

                    Not unless we were to update the ca_root_nss package which we wouldn't do for older versions.

                    I mentioned it in another thread recently but you can copy the file in that package, /usr/local/share/certs/ca-root-nss.crt, from a new system to the old one. Or hand edit that file and replace the expired CA with the new one.

                    I am all for updating to current version, but in this time of covid and company locations being closed, etc. It might not always be possible or prudent to update at this time. I have a couple of boxes that are behind for sure..

                    I get that to some extent, but at some point the benefits outweigh the risks.

                    Remember: Upvote with the 👍 button for any user/post you find to be helpful, informative, or deserving of recognition!

                    Need help fast? Netgate Global Support!

                    Do not Chat/PM for help!

                    johnpozJ 1 Reply Last reply Reply Quote 0
                    • johnpozJ Online
                      johnpoz LAYER 8 Global Moderator @jimp
                      last edited by

                      @jimp said in Expired Let's Encrypt CA when using it as a client:

                      I get that to some extent, but at some point the benefits outweigh the risks.

                      very true..

                      firewall may reach out to a system which could be using an ACME chain, like URL table aliases, pfBlockerNG

                      Quite true! These are very good examples of where users might run into an issue that I didn't think off the top of my head..

                      I wonder if some sort of blog post, or sticky thread with specific instructions on how to update might be in order? With maybe link to download current file, or instructions on how to edit the specific CA in the pem might very helpful.

                      Not everyone might have access or ability to fire up a current version of pfsense where they could obtain the current version of the file.

                      An intelligent man is sometimes forced to be drunk to spend time with his fools
                      If you get confused: Listen to the Music Play
                      Please don't Chat/PM me for help, unless mod related
                      SG-4860 25.07 | Lab VMs 2.8, 25.07

                      1 Reply Last reply Reply Quote 0
                      • jimpJ Offline
                        jimp Rebel Alliance Developer Netgate
                        last edited by

                        I don't see us doing a blog post or docs entry for it since it's really a non-issue for most users, and the only official answer we'll give is "upgrade".

                        If someone wants to keep using older versions they have to take on the responsibility of handling the problems that come with that choice.

                        Remember: Upvote with the 👍 button for any user/post you find to be helpful, informative, or deserving of recognition!

                        Need help fast? Netgate Global Support!

                        Do not Chat/PM for help!

                        johnpozJ 1 Reply Last reply Reply Quote 0
                        • johnpozJ Online
                          johnpoz LAYER 8 Global Moderator @jimp
                          last edited by

                          @jimp all true, all true!

                          An intelligent man is sometimes forced to be drunk to spend time with his fools
                          If you get confused: Listen to the Music Play
                          Please don't Chat/PM me for help, unless mod related
                          SG-4860 25.07 | Lab VMs 2.8, 25.07

                          1 Reply Last reply Reply Quote 0
                          • J Offline
                            jimmychoosshoes @VioletDragon
                            last edited by jimmychoosshoes

                            For me, I wasnt using ACME but my /etc/ssl/cert.pem or /usr/local/share/certs/ca-root-nss.crt was out of date due to me using 2.4.5

                            If anyone else needs a pointer on updating 2.4.5 this is what I did: I updated the ca-root-nss.crt manually from nss package but also needed to remove the old DST Root CA X3 from ca-root-nss.crt after this openssl retrieved the correct cert CA from the external website.

                            1 Reply Last reply Reply Quote 0
                            • bingo600B Offline
                              bingo600
                              last edited by

                              I couldn't update bogons on my 2.4.5-p1 , due to fetch using the expired certificate.

                              I spend quite some time to solve it here , due to my FreeBSD inexperience.
                              https://forum.netgate.com/topic/167276/solved-can-t-update-bogons-on-a-2-4-5-p1-cert-expired

                              Success in the end.

                              /Bingo

                              If you find my answer useful - Please give the post a 👍 - "thumbs up"

                              pfSense+ 23.05.1 (ZFS)

                              QOTOM-Q355G4 Quad Lan.
                              CPU  : Core i5 5250U, Ram : 8GB Kingston DDR3LV 1600
                              LAN  : 4 x Intel 211, Disk  : 240G SAMSUNG MZ7L3240HCHQ SSD

                              1 Reply Last reply Reply Quote 0
                              • First post
                                Last post
                              Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.