Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Easylist update fails. Expired Cert

    Scheduled Pinned Locked Moved pfBlockerNG
    43 Posts 18 Posters 22.7k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • ?
      A Former User @Derelict
      last edited by

      @Derelict OK. Easylist needs to update their certs. Good to know were the fault is. That's helpful.

      The aggressive posture is, however, not helpful. If I could explain how downloading easylists has anything to do with Netgate's servers I would not have posted the question.

      DerelictD 1 Reply Last reply Reply Quote 0
      • RonpfSR
        RonpfS
        last edited by RonpfS

        The list downloaded with Flex State :

        [ EasyList_Adware ]		 Downloading update . cURL Error: 60
        
        [ ! ] Downgrading SSL settings (Flex) . 200 OK.
          ----------------------------------------------------------------------
          Orig.    Unique     # Dups     # White    # TOP1M    Final                
          ----------------------------------------------------------------------
          100      100        1          0          0          99                   
          ----------------------------------------------------------------------
        

        2.4.5-RELEASE-p1 (amd64)
        Intel Core2 Quad CPU Q8400 @ 2.66GHz 8GB
        Backup 0.5_5, Bandwidthd 0.7.4_4, Cron 0.3.7_5, pfBlockerNG-devel 3.0.0_16, Status_Traffic_Totals 2.3.1_1, System_Patches 1.2_5

        1 Reply Last reply Reply Quote 0
        • DerelictD
          Derelict LAYER 8 Netgate @A Former User
          last edited by

          @jwj Aggressive? Man. How about pointed and factual. I was asking because I personally have no idea how Easylist works or how you have your node/Aliases/pfBlocker configured.

          Chattanooga, Tennessee, USA
          A comprehensive network diagram is worth 10,000 words and 15 conference calls.
          DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
          Do Not Chat For Help! NO_WAN_EGRESS(TM)

          ? 1 Reply Last reply Reply Quote 0
          • ?
            A Former User @Derelict
            last edited by

            @Derelict Yup. And sarcastic. How about: "That's all server side, nothing you or we can do from this end." That would be pointed and factual. You asked because you knew damn well it had nothing to do with Netgate servers. Sorry if you found the question too stupid to answer as an adult. My bad for expecting an adult reply.

            1 Reply Last reply Reply Quote 0
            • DerelictD
              Derelict LAYER 8 Netgate
              last edited by Derelict

              I didn't know what servers were in question until @RonpfS answered with specifics. I had a pretty good idea it wasn't going to be a netgate server but I did not know for sure. Sorry I offended your delicate sensibilities by providing an immediate, factual diagnosis of the exact problem you were asking about. Please forgive me for asking for additional, specific details.

              Chattanooga, Tennessee, USA
              A comprehensive network diagram is worth 10,000 words and 15 conference calls.
              DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
              Do Not Chat For Help! NO_WAN_EGRESS(TM)

              1 Reply Last reply Reply Quote 1
              • C
                costanzo @A Former User
                last edited by costanzo

                @jwj Here's an easy way to see the issues with the EasyList SSL Cert chain: Just navigate to this site:

                5ac2a438-b380-4cf4-934f-6146f24ed1a1-image.png

                This is NOT a Netgate issue, but a problem with server hosting the EasyList txt files. EasyList cert has two CAs that expired today.

                970f0ebf-0cd2-4788-a5ff-cba5ce0755fa-image.png

                C 1 Reply Last reply Reply Quote 2
                • R
                  revengineer @RonpfS
                  last edited by

                  @RonpfS said in Easylist update fails. Expired Cert:

                  You could change the State of the URL to Flex until the cert issue is fixed.

                  Could you explain what a switch from ON to FLEX does? I could not find documentation on this. Thank you.

                  RonpfSR 1 Reply Last reply Reply Quote 0
                  • R
                    revengineer
                    last edited by

                    I am puzzled. When I go to https://easylist-downloads.adblockplus.org/easyprivacy.txt with my browser and then check the cert, I get an expiration date of 3/26/21, which is well into the future. Not sure why pfBlockerNG reports an expired certificate. Does the URL access by pfBlockerNG differ from the above?

                    1 Reply Last reply Reply Quote 0
                    • RonpfSR
                      RonpfS @revengineer
                      last edited by

                      @revengineer Did you click on the

                      Flex: Downgrade the SSL Connection (Not Recommended)

                      2.4.5-RELEASE-p1 (amd64)
                      Intel Core2 Quad CPU Q8400 @ 2.66GHz 8GB
                      Backup 0.5_5, Bandwidthd 0.7.4_4, Cron 0.3.7_5, pfBlockerNG-devel 3.0.0_16, Status_Traffic_Totals 2.3.1_1, System_Patches 1.2_5

                      R 1 Reply Last reply Reply Quote 0
                      • R
                        revengineer @RonpfS
                        last edited by revengineer

                        @RonpfS said in Easylist update fails. Expired Cert:

                        @revengineer Did you click on the

                        Flex: Downgrade the SSL Connection (Not Recommended)

                        Thanks for the explanation. Fortunately, a forced reload seems to have fixed the issue now.

                        EDIT: Not sure what led be to believe this is fixed. It is not, the issue remains. I understand nothing the pfsense team or package developer can do about.

                        1 Reply Last reply Reply Quote 0
                        • C
                          costanzo @costanzo
                          last edited by

                          @costanzo I tried emailing and contacting them via twitter about their cert issue.

                          Haven't heard back... Does anyone know how to reach them?

                          For twitter I used: @AdblockPlus
                          For email I used: info@eyeo.com

                          C 1 Reply Last reply Reply Quote 0
                          • J
                            jimmythedog
                            last edited by

                            Hi All,
                            First time user, so please be gentle with me!

                            I think this article describes the problem quite well - especially the Cross-signing section

                            So, to fix it, I deleted the old CA from the /usr/local/share/certs/ca-root-nss.crt file (lines 423-512 in my version), as described in the What to do? section in that link above

                            HTH

                            fireodoF AlanesiA V 3 Replies Last reply Reply Quote 5
                            • fireodoF
                              fireodo @jimmythedog
                              last edited by

                              @jimmythedog said in Easylist update fails. Expired Cert:

                              Hi All,
                              First time user, so please be gentle with me!

                              I think this article describes the problem quite well - especially the Cross-signing section

                              So, to fix it, I deleted the old CA from the /usr/local/share/certs/ca-root-nss.crt file (lines 423-512 in my version), as described in the What to do? section in that link above

                              HTH

                              I have done what you purpose and I can confirm that it works!

                              Thanks,
                              fireodo

                              Kettop Mi4300YL CPU: i5-4300Y @ 1.60GHz RAM: 8GB Ethernet Ports: 4
                              SSD: SanDisk pSSD-S2 16GB (ZFS) WiFi: WLE200NX
                              pfsense 2.8.0 CE
                              Packages: Apcupsd, Cron, Iftop, Iperf, LCDproc, Nmap, pfBlockerNG, RRD_Summary, Shellcmd, Snort, Speedtest, System_Patches.

                              C 1 Reply Last reply Reply Quote 0
                              • C
                                costanzo @fireodo
                                last edited by

                                @fireodo Unfortunately, the cert issue can only be addressed by the person who manages the server that houses the EasyList txt files.

                                The person who manages their website needs to re-install the certs. Typically there are three files used to install a server cert: private key, signed cert, and CA bundle (contains root and intermediate certificates).

                                In the case with EasyList, the CA bundle contains an expired cert.

                                As a work around for us netgate users, we can change the source definitions to Flex. This will allow the downloads to continue, ignoring the SSL errors:

                                ef210218-8a42-4ffc-9266-4a6c19c89fc7-image.png

                                As of this morning, the SSL issue still hasn't been resolved:
                                f2972c28-446f-43a5-8032-ac480a08b36c-image.png

                                C fireodoF J 3 Replies Last reply Reply Quote 1
                                • C
                                  costanzo @costanzo
                                  last edited by

                                  @costanzo Here's some additional info from the SSL issuer about the problem and what actions are need:

                                  https://sectigo.com/resource-library/sectigos-addtrust-root-is-soon-to-expire-what-you-need-to-know

                                  1 Reply Last reply Reply Quote 0
                                  • fireodoF
                                    fireodo @costanzo
                                    last edited by

                                    @costanzo said in Easylist update fails. Expired Cert:

                                    @fireodo Unfortunately, the cert issue can only be addressed by the person who manages the server that houses the EasyList txt files.

                                    The person who manages their website needs to re-install the certs. Typically there are three files used to install a server cert: private key, signed cert, and CA bundle (contains root and intermediate certificates).

                                    In the case with EasyList, the CA bundle contains an expired cert.

                                    As a work around for us netgate users, we can change the source definitions to Flex. This will allow the downloads to continue, ignoring the SSL errors:

                                    ef210218-8a42-4ffc-9266-4a6c19c89fc7-image.png

                                    As of this morning, the SSL issue still hasn't been resolved:
                                    f2972c28-446f-43a5-8032-ac480a08b36c-image.png

                                    Thats what I tough too but I thought to give the solution of @jimmythedog a try!

                                    Thank you for clarification,
                                    fireodo

                                    Kettop Mi4300YL CPU: i5-4300Y @ 1.60GHz RAM: 8GB Ethernet Ports: 4
                                    SSD: SanDisk pSSD-S2 16GB (ZFS) WiFi: WLE200NX
                                    pfsense 2.8.0 CE
                                    Packages: Apcupsd, Cron, Iftop, Iperf, LCDproc, Nmap, pfBlockerNG, RRD_Summary, Shellcmd, Snort, Speedtest, System_Patches.

                                    1 Reply Last reply Reply Quote 0
                                    • J
                                      jimmythedog @costanzo
                                      last edited by

                                      @costanzo I don't think you're actually correct about the CA cert being issued with the server cert bundle - intermediate certs, yes, but not the CA cert
                                      The CA cert is usually held in the browser or OS, in their trust stores - that is one of the ways you can trust a cert bundle, because the last intermediate cert in the chain must link to the issuer CA cert in your trust store (there's a clue with the term trust store)

                                      Now, the problem with the Sectico certs is that the CA cert in the trust store has expired - not the one in the server cert or the intermediate certs
                                      That is why I deleted the one from the OS trust store, as it is not longer valid and, indeed, should not be used - this needs to be done by the OS package provider too, and I would expect an update to be available fairly soon to get around this problem
                                      By deleting it, the library will attempt to validate the server cert chain by using the alternative chain, which will end up at the valid Sectico CA cert in the trust store

                                      Personally, I do not see any risk whatsoever in what I have done, but I do see a potential risk in changing the source definition state to Flex
                                      I do agree that the site admin needs to install an updated cert, but this fix will get around the problem with no risk (that I can see)

                                      HTH, and I am willing to be corrected on the above
                                      Jimmy

                                      D DerelictD 2 Replies Last reply Reply Quote 0
                                      • D
                                        drewsaur @jimmythedog
                                        last edited by

                                        @jimmythedog This was all very good sleuthing and reporting. Thanks for the tip.

                                        1 Reply Last reply Reply Quote 0
                                        • R
                                          RubberPike
                                          last edited by

                                          @jimmythedog Thanks! Good find on that Sophos link.

                                          1 Reply Last reply Reply Quote 0
                                          • DerelictD
                                            Derelict LAYER 8 Netgate @jimmythedog
                                            last edited by Derelict

                                            @jimmythedog That is both correct and incorrect.

                                            The problem is that none of the chains presented by the server will end up chaining to the expired AddTrust cert UNLESS that is what is presented by the server. Server administrators SHOULD NOT be including the CA certificates that SHOULD be being pulled from the clients trusted root store in the first place. They should only be pushing as much of the chain as necessary to get the client chained into and pulling from its own trusted CA store.

                                            Some clients (macOS, Windows) ignore superfluous certificates from the server and use their own store as soon as they have a match up the chain so they continue to validate even when the server admin makes a mistake.

                                            Some (like OpenSSL in FreeBSD and CentOS at least) try to use what is pushed to them by the server. Those fail.

                                            Chattanooga, Tennessee, USA
                                            A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                                            DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                                            Do Not Chat For Help! NO_WAN_EGRESS(TM)

                                            1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.