Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Acme adds out of date CA to cert manager

    Scheduled Pinned Locked Moved ACME
    10 Posts 6 Posters 1.8k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • J
      joelkolb
      last edited by

      I am running pfSense 2.6 and Acme 0.6.10_1. When acme renews my cert from LetsEncrypt, it is adding a version of ISRG Root X1 as a CA in the certificate manager that was issued by DST Root CA X3 whose certificate expired on September ‎30, ‎2021. At https://letsencrypt.org/certificates/ it shows that the active root is a different version of ISRG Root X1, issued by ISRG Root X1 that does not expire until 2035. I have deleted the CA's added by Acme and manually renewed several times and this incorrect CA keeps coming back. This appears to be a problem. Am I missing something? Why is Acme not installing the current CA? How can I fix this?

      johnpozJ 1 Reply Last reply Reply Quote 0
      • johnpozJ
        johnpoz LAYER 8 Global Moderator @joelkolb
        last edited by

        @joelkolb - did you ever delete it like was mentioned?

        https://forum.netgate.com/topic/166269/heads-up-dst-root-ca-x3-expiration-september-2021

        I had deleted mine back when that was mentioned, and sure don't see it back...

        An intelligent man is sometimes forced to be drunk to spend time with his fools
        If you get confused: Listen to the Music Play
        Please don't Chat/PM me for help, unless mod related
        SG-4860 24.11 | Lab VMs 2.7.2, 24.11

        J 1 Reply Last reply Reply Quote 0
        • J
          joelkolb @johnpoz
          last edited by

          @johnpoz Yes I did. But the older ISRG Root X1 that has DST Root CA X3 as its root keeps coming back.

          1 Reply Last reply Reply Quote 1
          • D
            dguerri
            last edited by

            Same issue here.
            This is getting in the way for my OpenVPN server setup, as clients cannot validate the certificate chain.

            The solution was to manually remove the ISRG Root X1 installed by ACME package and add the self-signed version to cert manager.

            See the attached screenshot. ISRG Root X1 installed by ACME package in cert manager is signed by DST Root CA X3, which is expired.

            Screen Shot 2022-06-27 at 16.38.10.png

            nonickN 1 Reply Last reply Reply Quote 0
            • nonickN
              nonick @dguerri
              last edited by nonick

              @dguerri You checked the box, that's why this problem is.
              included.png

              trust-store.png

              Netgate 6100

              D 3 Replies Last reply Reply Quote 0
              • D
                dguerri @nonick
                last edited by dguerri

                @nonick Yep, but I think this is needed to let openVPN client export generate the correct ca bundle when exporting client configuration.

                After the manual operation described above, everything works fine, and I can uncheck that box to avoid it from happening again.
                Nevertheless, the problem will come up again when/if certs are renewed/expired.

                EDIT: That box has no effect for my case (openVPN). I think the root cause is ACME package adding the wrong CA chain (as it ends with an expired cert)

                1 Reply Last reply Reply Quote 0
                • D
                  dguerri @nonick
                  last edited by

                  This post is deleted!
                  1 Reply Last reply Reply Quote 0
                  • D
                    dguerri @nonick
                    last edited by dguerri

                    @nonick dug into the code a bit :)

                    Apparently, the problem is the chain provided by Let's Encrypt!

                    ACME scripts get that URL from Let's encrypt, and they just import all the CAs in there into the cert manager.

                    My theory is that all the certificates created before DST Root CA X3 expiration (regardless of their expiration or date of renewal), are still getting the CA chain that was valid at the time.

                    Maybe the solution would be to drop and recreate the configuration for these certs in pfSense...

                    1 Reply Last reply Reply Quote 0
                    • P
                      paraffin
                      last edited by

                      We are getting this exact issue too.

                      I have tried a fresh PFSense install with fresh subdomain certificates and the same thing happens.

                      We get reported issues via SSLLabs and Nessus flagging that this additional chain, we do not need to support Android 7.

                      This can be recreated every single time so not sure how others have it working but hope there is a solution out there other than manually deleting the rogue CA.

                      1 Reply Last reply Reply Quote 0
                      • J
                        jezmbi
                        last edited by

                        Has anyone had any luck resolving this issue?

                        I'm also seeing this exact issue on 2.6.0 with the acme 0.7.1_1 package.

                        Deleting the CA doesn't seem to work as it just gets re-created.

                        1 Reply Last reply Reply Quote 0
                        • First post
                          Last post
                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.