[Eisfair] curl returnd with 60

Marcus Röckrath marcus.roeckrath at gmx.de
Di Okt 19 09:37:42 CEST 2021


Hallo Olaf,

Olaf Jaehrling wrote:

>   curl -v https://acme-v02.api.letsencrypt.org/directory
> *   Trying 2606:4700:60:0:f53d:5624:85c7:3a2c:443...
> * Connected to acme-v02.api.letsencrypt.org
> (2606:4700:60:0:f53d:5624:85c7:3a2c) port 443 (#0)
> * ALPN, offering h2
> * ALPN, offering http/1.1
> * TLSv1.3 (OUT), TLS handshake, Client hello (1):
> * TLSv1.3 (IN), TLS handshake, Server hello (2):
> * TLSv1.3 (IN), TLS handshake, Encrypted Extensions (8):
> * TLSv1.3 (IN), TLS handshake, Certificate (11):
> * TLSv1.3 (OUT), TLS alert, certificate expired (557):
> * SSL certificate problem: certificate has expired
> * Closing connection 0
> curl: (60) SSL certificate problem: certificate has expired

Da das Zertifikat des entfernten Servers bestimmt nicht abgelaufen ist, kann
es sich IMHO nur um eines in der Kette handeln.

Das base-certificate-Paket bringt u. a.

lrwxrwxrwx 1 root   root       16 Oct  5 20:52 4042bcee.0 ->
isrg_root_x1.pem

lrwxrwxrwx 1 root   root       16 Oct  5 20:52 6187b673.0 ->
isrg_root_x1.pem

-rw-r--r-- 1 root   root     1939 Sep 18 17:00 isrg_root_x1.pem

mit.

Ob es sich beim isrg root x1 umd das neue Root-Zertifikat handelt zeigt:

eis # /var/install/bin/certs-show-chain --nogui isrg_root_x1.pem 
Show certificate chain (run as 'root')
*
| certificate : isrg_root_x1.pem (4042bcee)
| subject     : C = US O = Internet Security Research Group CN = ISRG Root
X1
| issuer      : C = US O = Internet Security Research Group CN = ISRG Root
X1
| MD5 f-print : 0C:D2:F9:E0:DA:17:73:E9:ED:86:4D:A5:E3:70:E7:4E
| SHA1 f-print: CA:BD:2A:79:A1:07:6A:31:F2:1D:25:36:35:CB:03:9D:43:29:A5:E8
|
+-> end of chain!

Wenn hier noch am Ende das DST Root-Zertifikat erscheint, ist es das alte
isrg root x1. Altes und neues Zertifikat haben den gleichen Hash!

In der Kette eines letyencrypt-Zertifikates taucht auch das r3 auf:

lrwxrwxrwx 1 root   root        6 Oct  5 20:52 8d33f237.0 -> r3.pem

lrwxrwxrwx 1 root   root        6 Oct  5 20:52 dec71a0b.0 -> r3.pem

-rw-r--r-- 1 root   root     6395 Sep 18 17:00 r3.pem

Dessen Kette:

eis # /var/install/bin/certs-show-chain --nogui r3.pem
Show certificate chain (run as 'root')
*
| certificate : r3.pem (8d33f237)
| subject     : C = US O = Lets Encrypt CN = R3
| issuer      : C = US O = Internet Security Research Group CN = ISRG Root
X1
| MD5 f-print : E8:29:E6:5D:7C:43:07:D6:FB:C1:3C:17:9E:03:7A:36
| SHA1 f-print: A0:53:37:5B:FE:84:E8:B7:48:78:2C:7C:EE:15:82:7A:6A:F5:A4:05
|
+->| certificate : isrg_root_x1.pem (4042bcee)
   | subject     : C = US O = Internet Security Research Group CN = ISRG
Root X1
   | issuer      : C = US O = Internet Security Research Group CN = ISRG
Root X1
   | MD5 f-print : 0C:D2:F9:E0:DA:17:73:E9:ED:86:4D:A5:E3:70:E7:4E
   | SHA1 f-print:
CA:BD:2A:79:A1:07:6A:31:F2:1D:25:36:35:CB:03:9D:43:29:A5:E8
   |
   +-> end of chain!

Hast du nicht ein eigenes letsencrypt-Zertifikat? Wie sieht dess Chain aus?

-- 
Gruß Marcus
[eisfair-Team]


Mehr Informationen über die Mailingliste Eisfair