Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Easylist update fails. Expired Cert

    Scheduled Pinned Locked Moved pfBlockerNG
    43 Posts 18 Posters 22.7k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • J
      jimmythedog
      last edited by

      Hi All,
      First time user, so please be gentle with me!

      I think this article describes the problem quite well - especially the Cross-signing section

      So, to fix it, I deleted the old CA from the /usr/local/share/certs/ca-root-nss.crt file (lines 423-512 in my version), as described in the What to do? section in that link above

      HTH

      fireodoF AlanesiA V 3 Replies Last reply Reply Quote 5
      • fireodoF
        fireodo @jimmythedog
        last edited by

        @jimmythedog said in Easylist update fails. Expired Cert:

        Hi All,
        First time user, so please be gentle with me!

        I think this article describes the problem quite well - especially the Cross-signing section

        So, to fix it, I deleted the old CA from the /usr/local/share/certs/ca-root-nss.crt file (lines 423-512 in my version), as described in the What to do? section in that link above

        HTH

        I have done what you purpose and I can confirm that it works!

        Thanks,
        fireodo

        Kettop Mi4300YL CPU: i5-4300Y @ 1.60GHz RAM: 8GB Ethernet Ports: 4
        SSD: SanDisk pSSD-S2 16GB (ZFS) WiFi: WLE200NX
        pfsense 2.8.0 CE
        Packages: Apcupsd, Cron, Iftop, Iperf, LCDproc, Nmap, pfBlockerNG, RRD_Summary, Shellcmd, Snort, Speedtest, System_Patches.

        C 1 Reply Last reply Reply Quote 0
        • C
          costanzo @fireodo
          last edited by

          @fireodo Unfortunately, the cert issue can only be addressed by the person who manages the server that houses the EasyList txt files.

          The person who manages their website needs to re-install the certs. Typically there are three files used to install a server cert: private key, signed cert, and CA bundle (contains root and intermediate certificates).

          In the case with EasyList, the CA bundle contains an expired cert.

          As a work around for us netgate users, we can change the source definitions to Flex. This will allow the downloads to continue, ignoring the SSL errors:

          ef210218-8a42-4ffc-9266-4a6c19c89fc7-image.png

          As of this morning, the SSL issue still hasn't been resolved:
          f2972c28-446f-43a5-8032-ac480a08b36c-image.png

          C fireodoF J 3 Replies Last reply Reply Quote 1
          • C
            costanzo @costanzo
            last edited by

            @costanzo Here's some additional info from the SSL issuer about the problem and what actions are need:

            https://sectigo.com/resource-library/sectigos-addtrust-root-is-soon-to-expire-what-you-need-to-know

            1 Reply Last reply Reply Quote 0
            • fireodoF
              fireodo @costanzo
              last edited by

              @costanzo said in Easylist update fails. Expired Cert:

              @fireodo Unfortunately, the cert issue can only be addressed by the person who manages the server that houses the EasyList txt files.

              The person who manages their website needs to re-install the certs. Typically there are three files used to install a server cert: private key, signed cert, and CA bundle (contains root and intermediate certificates).

              In the case with EasyList, the CA bundle contains an expired cert.

              As a work around for us netgate users, we can change the source definitions to Flex. This will allow the downloads to continue, ignoring the SSL errors:

              ef210218-8a42-4ffc-9266-4a6c19c89fc7-image.png

              As of this morning, the SSL issue still hasn't been resolved:
              f2972c28-446f-43a5-8032-ac480a08b36c-image.png

              Thats what I tough too but I thought to give the solution of @jimmythedog a try!

              Thank you for clarification,
              fireodo

              Kettop Mi4300YL CPU: i5-4300Y @ 1.60GHz RAM: 8GB Ethernet Ports: 4
              SSD: SanDisk pSSD-S2 16GB (ZFS) WiFi: WLE200NX
              pfsense 2.8.0 CE
              Packages: Apcupsd, Cron, Iftop, Iperf, LCDproc, Nmap, pfBlockerNG, RRD_Summary, Shellcmd, Snort, Speedtest, System_Patches.

              1 Reply Last reply Reply Quote 0
              • J
                jimmythedog @costanzo
                last edited by

                @costanzo I don't think you're actually correct about the CA cert being issued with the server cert bundle - intermediate certs, yes, but not the CA cert
                The CA cert is usually held in the browser or OS, in their trust stores - that is one of the ways you can trust a cert bundle, because the last intermediate cert in the chain must link to the issuer CA cert in your trust store (there's a clue with the term trust store)

                Now, the problem with the Sectico certs is that the CA cert in the trust store has expired - not the one in the server cert or the intermediate certs
                That is why I deleted the one from the OS trust store, as it is not longer valid and, indeed, should not be used - this needs to be done by the OS package provider too, and I would expect an update to be available fairly soon to get around this problem
                By deleting it, the library will attempt to validate the server cert chain by using the alternative chain, which will end up at the valid Sectico CA cert in the trust store

                Personally, I do not see any risk whatsoever in what I have done, but I do see a potential risk in changing the source definition state to Flex
                I do agree that the site admin needs to install an updated cert, but this fix will get around the problem with no risk (that I can see)

                HTH, and I am willing to be corrected on the above
                Jimmy

                D DerelictD 2 Replies Last reply Reply Quote 0
                • D
                  drewsaur @jimmythedog
                  last edited by

                  @jimmythedog This was all very good sleuthing and reporting. Thanks for the tip.

                  1 Reply Last reply Reply Quote 0
                  • R
                    RubberPike
                    last edited by

                    @jimmythedog Thanks! Good find on that Sophos link.

                    1 Reply Last reply Reply Quote 0
                    • DerelictD
                      Derelict LAYER 8 Netgate @jimmythedog
                      last edited by Derelict

                      @jimmythedog That is both correct and incorrect.

                      The problem is that none of the chains presented by the server will end up chaining to the expired AddTrust cert UNLESS that is what is presented by the server. Server administrators SHOULD NOT be including the CA certificates that SHOULD be being pulled from the clients trusted root store in the first place. They should only be pushing as much of the chain as necessary to get the client chained into and pulling from its own trusted CA store.

                      Some clients (macOS, Windows) ignore superfluous certificates from the server and use their own store as soon as they have a match up the chain so they continue to validate even when the server admin makes a mistake.

                      Some (like OpenSSL in FreeBSD and CentOS at least) try to use what is pushed to them by the server. Those fail.

                      Chattanooga, Tennessee, USA
                      A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                      DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                      Do Not Chat For Help! NO_WAN_EGRESS(TM)

                      1 Reply Last reply Reply Quote 0
                      • D
                        drewsaur
                        last edited by

                        Well, now that I have made the modifications, Arpwatch now sends me these alerts:

                        X-Cron-Env: <SHELL=/bin/sh>
                        X-Cron-Env: <PATH=/sbin:/bin:/usr/sbin:/usr/bin:/usr/local/sbin:/usr/local/bin>
                        X-Cron-Env: <HOME=/root>
                        X-Cron-Env: <LOGNAME=root>
                        X-Cron-Env: <USER=root>
                        
                        Certificate verification failed for /C=SE/O=AddTrust AB/OU=AddTrust External TTP Network/CN=AddTrust External CA Root
                        34374270280:error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed:/build/ce-crossbuild-245/sources/FreeBSD-src/crypto/openssl/ssl/s3_clnt.c:1269:
                        fetch: https://files.pfsense.org/lists/fullbogons-ipv4.txt: Authentication error
                        Certificate verification failed for /C=SE/O=AddTrust AB/OU=AddTrust External TTP Network/CN=AddTrust External CA Root
                        
                        
                        {many more of these}
                        
                        
                        1 Reply Last reply Reply Quote 0
                        • J
                          jsylvia007
                          last edited by jsylvia007

                          @drewsaur said in Easylist update fails. Expired Cert:

                          Well, now that I have made the modifications, Arpwatch now sends me these alerts:

                          X-Cron-Env: <SHELL=/bin/sh>
                          X-Cron-Env: <PATH=/sbin:/bin:/usr/sbin:/usr/bin:/usr/local/sbin:/usr/local/bin>
                          X-Cron-Env: <HOME=/root>
                          X-Cron-Env: <LOGNAME=root>
                          X-Cron-Env: <USER=root>
                          
                          Certificate verification failed for /C=SE/O=AddTrust AB/OU=AddTrust External TTP Network/CN=AddTrust External CA Root
                          34374270280:error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed:/build/ce-crossbuild-245/sources/FreeBSD-src/crypto/openssl/ssl/s3_clnt.c:1269:
                          fetch: https://files.pfsense.org/lists/fullbogons-ipv4.txt: Authentication error
                          Certificate verification failed for /C=SE/O=AddTrust AB/OU=AddTrust External TTP Network/CN=AddTrust External CA Root
                          
                          
                          {many more of these}
                          
                          

                          I'm also having this issue too. Looks like there's one more server that needs to be updated on pfSense's side?

                          dennis_sD 1 Reply Last reply Reply Quote 0
                          • dennis_sD
                            dennis_s @jsylvia007
                            last edited by

                            @jsylvia007 This is something our IT team is aware of and they are working to resolve.

                            1 Reply Last reply Reply Quote 2
                            • C
                              costanzo @costanzo
                              last edited by

                              @costanzo Quick update: Got a response from @AdblockPlus via twitter. They let their filter team know.

                              1 Reply Last reply Reply Quote 1
                              • AlanesiA
                                Alanesi @jimmythedog
                                last edited by Alanesi

                                @jimmythedog Great, it works for me too. but you have to be careful while doing that I recommend to take a backup of this file before starting this process.

                                Steps here if someone wants to follow:

                                After you access the file /usr/local/share/certs/ca-root-nss.crt focus on this "Not After : Jan 1 00:00:00 2020 GMT" check the month and year if expired delete from "Certificate:" until "-----END CERTIFICATE-----". In my case, I found two then save and run update.

                                J 1 Reply Last reply Reply Quote 0
                                • J
                                  jimmythedog @Alanesi
                                  last edited by

                                  @Alanesi I totally agree about backing up the file first

                                  1 Reply Last reply Reply Quote 0
                                  • RicoR
                                    Rico LAYER 8 Rebel Alliance
                                    last edited by Rico

                                    Seems like they have fixed their Cert.
                                    I don't see any errors using the pfBlockerNG default settings for EasyList.

                                    -Rico

                                    J 1 Reply Last reply Reply Quote 1
                                    • J
                                      jsylvia007 @Rico
                                      last edited by

                                      @Rico said in Easylist update fails. Expired Cert:

                                      Seems like they have fixed their Cert.
                                      I don't see any errors using the pfBlockerNG default settings for EasyList.

                                      -Rico

                                      Concur. Same here.

                                      1 Reply Last reply Reply Quote 1
                                      • RicoR
                                        Rico LAYER 8 Rebel Alliance
                                        last edited by Rico

                                        Fixed between 06/12/20 19:15:00 and 06/12/20 20:15:00 (UTC+1)

                                        [ EasyList ]			 Downloading update . cURL Error: 60
                                        SSL certificate problem: certificate has expired Retry in 5 seconds...
                                        . cURL Error: 60
                                        SSL certificate problem: certificate has expired Retry in 5 seconds...
                                        . cURL Error: 60
                                        SSL certificate problem: certificate has expired Retry in 5 seconds...
                                        .. unknown http status code | 0
                                        
                                         [ DNSBL_EasyList - EasyList ] Download FAIL [ 06/12/20 19:15:28 ]
                                        
                                        [ EasyList ]			 Downloading update .. 200 OK.
                                          ----------------------------------------------------------------------
                                          Orig.    Unique     # Dups     # White    # TOP1M    Final                
                                          ----------------------------------------------------------------------
                                          2491     2452       5          0          0          2447                 
                                          ----------------------------------------------------------------------
                                        
                                        [ EasyPrivacy ]			 Downloading update [ 06/12/20 20:15:17 ] .. 200 OK.
                                        

                                        -Rico

                                        1 Reply Last reply Reply Quote 1
                                        • V
                                          Vatreni @jimmythedog
                                          last edited by Vatreni

                                          @jimmythedog said in Easylist update fails. Expired Cert:

                                          Hi All,
                                          First time user, so please be gentle with me!

                                          I think this article describes the problem quite well - especially the Cross-signing section

                                          So, to fix it, I deleted the old CA from the /usr/local/share/certs/ca-root-nss.crt file (lines 423-512 in my version), as described in the What to do? section in that link above

                                          HTH

                                          Old thread but still relevant and found in google. I have an older pfsense install that I can't update for now. The CA file referred to above in mine has dozens of certs now out of date.

                                          I have removed some that had "not after" prior to today, and it let the update of easylist work, so many thanks.

                                          There are plenty to still remove, and while I'm sure the official solution is "update pfsense ffs", is there a place to just download an up-to-date valid ca-root-nss.crt
                                          that will work?

                                          And thanks for your update - v helpful

                                          GertjanG 1 Reply Last reply Reply Quote 0
                                          • GertjanG
                                            Gertjan @Vatreni
                                            last edited by Gertjan

                                            @Vatreni

                                            Just thinking out loud : what about getting an ISO from 'whatever' open source project ? FreeBSD or Debian etc.
                                            Copy what you find under /etc/ssl/.

                                            edit : forgot about the most obvious one : get the latest pfSense !!!!!
                                            ( as you need it even when you don't install it !!)

                                            and get the latest ca-root certs out of it.

                                            Btw: having troubles with expired certs if the top of the ice-berg(problem).

                                            No "help me" PM's please. Use the forum, the community will thank you.
                                            Edit : and where are the logs ??

                                            1 Reply Last reply Reply Quote 1
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.