libest icon indicating copy to clipboard operation
libest copied to clipboard

Certificate of https://testrfc7030.com is expired.

Open jerryfu823 opened this issue 6 years ago • 13 comments

Openssl shows the certificate is expired, which causes any https connection failed. Can you please take a look at it? Thanks. jerry@jerry-linux:~/est$ openssl s_client -connect testrfc7030.com:8443 CONNECTED(00000003) depth=2 O = Digital Signature Trust Co., CN = DST Root CA X3 verify return:1 depth=1 C = US, O = Let's Encrypt, CN = Let's Encrypt Authority X3 verify return:1 depth=0 CN = testrfc7030.com verify error:num=10:certificate has expired notAfter=Dec 13 21:51:36 2018 GMT verify return:1 depth=0 CN = testrfc7030.com notAfter=Dec 13 21:51:36 2018 GMT verify return:1

jerryfu823 avatar Dec 14 '18 18:12 jerryfu823

Thanks. Overnight jenkins job found it and it was updated earlier today. Should be using the renewed cert now.

Thanks again,

rpb5bnc avatar Dec 14 '18 18:12 rpb5bnc

where can I found the updated jenkins job, and the renewed cert?

riyee avatar Apr 26 '19 08:04 riyee

How to solve the problem of the EST server cert has expired? image

riyee avatar Apr 26 '19 15:04 riyee

The certificate has expired again (expired back in mid-March). Can this please get renewed?

garantir-km avatar Jun 23 '19 22:06 garantir-km

_curl: (60) SSL certificate problem: CA signature digest algorithm too weak More details here: https://curl.haxx.se/docs/sslcerts.html

curl failed to verify the legitimacy of the server and therefore could not establish a secure connection to it. To learn more about this situation and how to fix it, please visit the web page mentioned above._

Hey, is this a client-side issue?

Cheers Rob

robmillchem avatar Jul 13 '20 23:07 robmillchem

just noticed that the certificate for testrfc7030.pem expired again.

root@ub18-04:~/est# echo -n | openssl x509 -text -in testrfc7030.pem
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 5 (0x5)
        Signature Algorithm: ecdsa-with-SHA1
        Issuer: CN = estExampleCA
        Validity
            Not Before: Aug 13 16:34:57 2019 GMT
            Not After : Aug 12 16:34:57 2020 GMT
        Subject: CN = testrfc7030.com

Any chance for a fix?

grindsa avatar Aug 19 '20 06:08 grindsa

@grindsa this is fixed now. Try it out. Thank you for bringing it up. We forgot to renew it again.

It does not matter but I am curious. How are you using the testrfc7030 server? As a test, PoC, to get certs for your application in production?

csosto-pk avatar Aug 19 '20 14:08 csosto-pk

Thank you for fixing. I did test and can confirm that the problem is solved.

One other small remark: I see that the certificate has a CN=testrfc7030.com but is missing an SubjectAltName for testrfc7030.com. This will sooner or later cause issues as RFC2118 mandates the presence of subjectAltNames for identity checking (my python library already complains on it) . Maybe its a good idea to renew the cert again and replace the certificate with one having a proper SAN.

to answer your 2nd question: I am developing an acme-proxy which allows acme clients to connect to various enterprise CAs. I have a generic CA-handler for EST protocol and use testrfc7030.com to test certificate enrolments as part of release regression.

grindsa avatar Aug 19 '20 14:08 grindsa

Thanks for the details @grindsa . Understood.

One other small remark: I see that the certificate has a CN=testrfc7030.com but is missing an SubjectAltName for testrfc7030.com. This will sooner or later cause issues as RFC2118 mandates the presence of subjectAltNames for identity checking (my python library already complains on it) . Maybe its a good idea to renew the cert again and replace the certificate with one having a proper SAN.

We could change the CA config to include a SAN, but from RFC2818 [...] Although the use of the Common Name is existing practice, it is deprecated and Certification Authorities are encouraged to use the dNSName instead.

So, it is not a mandatory thing. It is encouraged in the RFC, but it is normative language (MUST, MUST NOT, SHOULD, SHOULD NOT etc). urllib might still complain, but they should not hard fail on it.

csosto-pk avatar Aug 20 '20 03:08 csosto-pk

The above statement rather refers to CN tan to SAN. I read it in a way that you have to have a SAN but there is no need to set an CN. This btw would be inline with the behavior of urllib.

grindsa avatar Aug 20 '20 05:08 grindsa

BTW: if you are replacing the certificate an you please also sign it with ecdsa-with-sha256 instead of ecdsa-with-sha1. This will stop clients complaining about weak signature digest algorithm.

curl https://testrfc7030.com:8443/.well-known/est/cacerts -o /tmp/cacerts.p7 --cacert /tmp/dstcax3.pem
  % Total    % Received % Xferd  Average Speed   Time    Time     Time  Current
                                 Dload  Upload   Total   Spent    Left  Speed
  0     0    0     0    0     0      0      0 --:--:-- --:--:-- --:--:--     0
curl: (60) SSL certificate problem: CA signature digest algorithm too weak
More details here: https://curl.haxx.se/docs/sslcerts.html

grindsa avatar Aug 20 '20 14:08 grindsa

Oh yes please. Think that was the problem I had. Rob

Many thanks Rob


From: grindsa [email protected] Sent: Thursday, August 20, 2020 3:49:47 PM To: cisco/libest [email protected] Cc: Milchem, Rob [email protected]; Comment [email protected] Subject: Re: [cisco/libest] Certificate of https://testrfc7030.com is expired. (#67)

Caution! External email. Do not open attachments or click links, unless this email comes from a known sender and you know the content is safe.

BTW: if you are replacing the certificate an you please also sign it with ecdsa-with-sha256 instead of ecdsa-with-sha1. This will stop clients complaining about weak signature digest algorithm.

curl https://testrfc7030.com:8443/.well-known/est/cacerts -o /tmp/cacerts.p7 --cacert /tmp/dstcax3.pem % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 curl: (60) SSL certificate problem: CA signature digest algorithm too weak More details here: https://curl.haxx.se/docs/sslcerts.html

— You are receiving this because you commented. Reply to this email directly, view it on GitHubhttps://eur01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgithub.com%2Fcisco%2Flibest%2Fissues%2F67%23issuecomment-677712481&data=02%7C01%7Crobert.milchem%40atos.net%7Cace32ad235e540a6c16c08d845185dac%7C33440fc6b7c7412cbb730e70b0198d5a%7C0%7C0%7C637335318236260347&sdata=ahXiYQQNJMkwbH836mBvjCV7guQgb8MnkcelnJ33NnY%3D&reserved=0, or unsubscribehttps://eur01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgithub.com%2Fnotifications%2Funsubscribe-auth%2FAQIXZSS26KHYCYOMX5CLUJTSBUZYXANCNFSM4GKP6SJQ&data=02%7C01%7Crobert.milchem%40atos.net%7Cace32ad235e540a6c16c08d845185dac%7C33440fc6b7c7412cbb730e70b0198d5a%7C0%7C0%7C637335318236260347&sdata=tnYqBIJj3hMyhYSOUQINc2s8qM%2FUJHWHXq5boX3eh7E%3D&reserved=0.

robmillchem avatar Aug 20 '20 14:08 robmillchem

BTW: if you are replacing the certificate an you please also sign it with ecdsa-with-sha256 instead of ecdsa-with-sha1. This will stop clients complaining about weak signature digest algorithm.

curl https://testrfc7030.com:8443/.well-known/est/cacerts -o /tmp/cacerts.p7 --cacert /tmp/dstcax3.pem
  % Total    % Received % Xferd  Average Speed   Time    Time     Time  Current
                                 Dload  Upload   Total   Spent    Left  Speed
  0     0    0     0    0     0      0      0 --:--:-- --:--:-- --:--:--     0
curl: (60) SSL certificate problem: CA signature digest algorithm too weak
More details here: https://curl.haxx.se/docs/sslcerts.html

This is addressed now. The new testrfc7030 cert has a SAN and also uses ecdsa-with-sha256.

It will also issue certs with sha256 as the message digest now instead of sha1.

Closing this git issue now.

csosto-pk avatar Aug 31 '20 15:08 csosto-pk