• Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login
Netgate Discussion Forum
  • Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login

Acme adds out of date CA to cert manager

ACME
6
10
1.8k
Loading More Posts
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • J
    joelkolb
    last edited by Feb 20, 2022, 7:23 PM

    I am running pfSense 2.6 and Acme 0.6.10_1. When acme renews my cert from LetsEncrypt, it is adding a version of ISRG Root X1 as a CA in the certificate manager that was issued by DST Root CA X3 whose certificate expired on September ‎30, ‎2021. At https://letsencrypt.org/certificates/ it shows that the active root is a different version of ISRG Root X1, issued by ISRG Root X1 that does not expire until 2035. I have deleted the CA's added by Acme and manually renewed several times and this incorrect CA keeps coming back. This appears to be a problem. Am I missing something? Why is Acme not installing the current CA? How can I fix this?

    J 1 Reply Last reply Feb 20, 2022, 8:12 PM Reply Quote 0
    • J
      johnpoz LAYER 8 Global Moderator @joelkolb
      last edited by Feb 20, 2022, 8:12 PM

      @joelkolb - did you ever delete it like was mentioned?

      https://forum.netgate.com/topic/166269/heads-up-dst-root-ca-x3-expiration-september-2021

      I had deleted mine back when that was mentioned, and sure don't see it back...

      An intelligent man is sometimes forced to be drunk to spend time with his fools
      If you get confused: Listen to the Music Play
      Please don't Chat/PM me for help, unless mod related
      SG-4860 24.11 | Lab VMs 2.7.2, 24.11

      J 1 Reply Last reply Feb 20, 2022, 11:58 PM Reply Quote 0
      • J
        joelkolb @johnpoz
        last edited by Feb 20, 2022, 11:58 PM

        @johnpoz Yes I did. But the older ISRG Root X1 that has DST Root CA X3 as its root keeps coming back.

        1 Reply Last reply Reply Quote 1
        • D
          dguerri
          last edited by Jun 27, 2022, 6:07 PM

          Same issue here.
          This is getting in the way for my OpenVPN server setup, as clients cannot validate the certificate chain.

          The solution was to manually remove the ISRG Root X1 installed by ACME package and add the self-signed version to cert manager.

          See the attached screenshot. ISRG Root X1 installed by ACME package in cert manager is signed by DST Root CA X3, which is expired.

          login-to-view

          N 1 Reply Last reply Jun 27, 2022, 6:16 PM Reply Quote 0
          • N
            nonick @dguerri
            last edited by nonick Jun 27, 2022, 6:17 PM Jun 27, 2022, 6:16 PM

            @dguerri You checked the box, that's why this problem is.
            login-to-view

            login-to-view

            Netgate 6100

            D 3 Replies Last reply Jun 27, 2022, 6:28 PM Reply Quote 0
            • D
              dguerri @nonick
              last edited by dguerri Jun 27, 2022, 6:34 PM Jun 27, 2022, 6:28 PM

              @nonick Yep, but I think this is needed to let openVPN client export generate the correct ca bundle when exporting client configuration.

              After the manual operation described above, everything works fine, and I can uncheck that box to avoid it from happening again.
              Nevertheless, the problem will come up again when/if certs are renewed/expired.

              EDIT: That box has no effect for my case (openVPN). I think the root cause is ACME package adding the wrong CA chain (as it ends with an expired cert)

              1 Reply Last reply Reply Quote 0
              • D
                dguerri @nonick
                last edited by Jun 27, 2022, 6:31 PM

                This post is deleted!
                1 Reply Last reply Reply Quote 0
                • D
                  dguerri @nonick
                  last edited by dguerri Jun 27, 2022, 7:33 PM Jun 27, 2022, 7:32 PM

                  @nonick dug into the code a bit :)

                  Apparently, the problem is the chain provided by Let's Encrypt!

                  ACME scripts get that URL from Let's encrypt, and they just import all the CAs in there into the cert manager.

                  My theory is that all the certificates created before DST Root CA X3 expiration (regardless of their expiration or date of renewal), are still getting the CA chain that was valid at the time.

                  Maybe the solution would be to drop and recreate the configuration for these certs in pfSense...

                  1 Reply Last reply Reply Quote 0
                  • P
                    paraffin
                    last edited by Jul 4, 2022, 4:06 PM

                    We are getting this exact issue too.

                    I have tried a fresh PFSense install with fresh subdomain certificates and the same thing happens.

                    We get reported issues via SSLLabs and Nessus flagging that this additional chain, we do not need to support Android 7.

                    This can be recreated every single time so not sure how others have it working but hope there is a solution out there other than manually deleting the rogue CA.

                    1 Reply Last reply Reply Quote 0
                    • J
                      jezmbi
                      last edited by Sep 22, 2022, 4:54 PM

                      Has anyone had any luck resolving this issue?

                      I'm also seeing this exact issue on 2.6.0 with the acme 0.7.1_1 package.

                      Deleting the CA doesn't seem to work as it just gets re-created.

                      1 Reply Last reply Reply Quote 0
                      • First post
                        Last post
                      Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.