Home
Help
Search
Login
Register
OPNsense Forum
»
Archive
»
21.7 Legacy Series
»
opnsense using wrong letsencrypt R3 intermediate certificate
« previous
next »
Print
Pages:
1
[
2
]
3
Author
Topic: opnsense using wrong letsencrypt R3 intermediate certificate (Read 21766 times)
Felix.
Newbie
Posts: 30
Karma: 4
Re: opnsense using wrong letsencrypt R3 intermediate certificate
«
Reply #15 on:
September 29, 2021, 09:44:29 pm »
Immediately after the old R3 expired, the browsers showed the new chains correctly.
I attached some examples. Also catched a site that still had the old trust chain in use, it breaks as expected.
Good luck y'all!
Logged
andrew
Newbie
Posts: 9
Karma: 0
Re: opnsense using wrong letsencrypt R3 intermediate certificate
«
Reply #16 on:
September 30, 2021, 04:11:42 pm »
Thank you mfedv and mimugmail! You saved my day!
EDIT: And Frank (see below) and franco and everyone else who helped fixing this!
«
Last Edit: September 30, 2021, 04:26:28 pm by andrew
»
Logged
franco
Administrator
Hero Member
Posts: 17656
Karma: 1611
Re: opnsense using wrong letsencrypt R3 intermediate certificate
«
Reply #17 on:
September 30, 2021, 04:13:17 pm »
FWIW, acme-client 3.2 is now available for update... special thanks to Frank on this one.
Cheers,
Franco
Logged
Felix.
Newbie
Posts: 30
Karma: 4
Re: opnsense using wrong letsencrypt R3 intermediate certificate
«
Reply #18 on:
September 30, 2021, 05:53:18 pm »
Nice work!
Looking forward to run the update.
Now that the old DST Root expired, too, I got a little problem trying to update.
I removed the expired R3 from System -> Trust -> Authorities but this could not fix this issue.
The pkg.opnsense.org page reports the new trustchain, though, IN THE BROWSER! (see openssl below)
OpenSSL (openssl s_client -showcerts -connect pkg.opnsense.org:443) tells me:
CONNECTED(00000003)
depth=3 O = Digital Signature Trust Co., CN = DST Root CA X3
verify error:num=10:certificate has expired
notAfter=Sep 30 14:01:15 2021 GMT
verify return:1
depth=3 O = Digital Signature Trust Co., CN = DST Root CA X3
notAfter=Sep 30 14:01:15 2021 GMT
verify return:1
depth=2 C = US, O = Internet Security Research Group, CN = ISRG Root X1
notAfter=Sep 30 18:14:03 2024 GMT
verify return:1
depth=1 C = US, O = Let's Encrypt, CN = R3
notAfter=Sep 15 16:00:00 2025 GMT
verify return:1
depth=0 CN = pkg.opnsense.org
notAfter=Dec 2 04:35:59 2021 GMT
verify return:1
---
Certificate chain
0 s:CN = pkg.opnsense.org
i:C = US, O = Let's Encrypt, CN = R3
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
1 s:C = US, O = Let's Encrypt, CN = R3
i:C = US, O = Internet Security Research Group, CN = ISRG Root X1
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
2 s:C = US, O = Internet Security Research Group, CN = ISRG Root X1
i:O = Digital Signature Trust Co., CN = DST Root CA X3
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
---
Server certificate
subject=CN = pkg.opnsense.org
issuer=C = US, O = Let's Encrypt, CN = R3
---
No client certificate CA names sent
Peer signing digest: SHA256
Peer signature type: RSA-PSS
Server Temp Key: X25519, 253 bits
---
SSL handshake has read 4683 bytes and written 405 bytes
Verification error: certificate has expired
---
New, TLSv1.2, Cipher is ECDHE-RSA-CHACHA20-POLY1305
Server public key is 2048 bit
Secure Renegotiation IS supported
Compression: NONE
Expansion: NONE
No ALPN negotiated
SSL-Session:
Protocol : TLSv1.2
Cipher : ECDHE-RSA-CHACHA20-POLY1305
Session-ID: CA62F24EAC5A00CEF8CB1CA04B986793D50D784591F2B4B5BDA66DC937388A06
Session-ID-ctx:
Master-Key: 1BF31F6E4565CA8B17AAE51E22B2189A724160464B685BB8232E0C2389CECE0252D357A46D3975179048D0A7A3E81BB8
PSK identity: None
PSK identity hint: None
SRP username: None
TLS session ticket lifetime hint: 300 (seconds)
TLS session ticket:
0000 - 48 3d 03 f0 5e e0 b5 3e-9a aa 90 8b a8 52 52 61 H=..^..>.....RRa
0010 - 08 cc 87 15 3e 2e 30 76-00 a5 a6 38 8a ea 9a ff ....>.0v...8....
0020 - 8c e1 92 f9 0c e0 32 93-c1 f9 1c 4c 2e 83 1e 3d ......2....L...=
0030 - 9a 47 ab fe ae 5d 91 f9-47 d7 07 5a 4e 2a 6e 28 .G...]..G..ZN*n(
0040 - 20 79 6c 2e 94 b9 5d f3-76 b8 a1 e2 f7 be e6 8f yl...].v.......
0050 - b2 70 28 d1 d8 be dc 94-4e 05 ab 3a 50 e5 2a 71 .p(.....N..
.*q
0060 - 83 bc fa f7 80 f4 68 98-cd 39 9c 84 c8 cf 12 74 ......h..9.....t
0070 - 10 73 7d ed 06 fb 14 fe-24 10 bb 7a ff 05 2a 20 .s}.....$..z..*
0080 - f7 d9 9b 18 4c 66 21 3d-0f 6c 62 3e 40 fb b3 dc ....Lf!=.lb>@...
0090 - 82 41 cb 55 9e 94 12 c0-ec e7 60 9b 83 c7 26 d9 .A.U......`...&.
00a0 - 7a 34 d0 07 d2 74 f2 e9-bf a0 10 ed 2d 3a 07 cc z4...t......-:..
00b0 - 3a e8 eb 17 4f 94 f0 89-39 36 e1 e3 1f 01 81 05 :...O...96......
00c0 - 21 af 52 3a 16 8f dc 79-67 4d e8 ef fa 82 dc bf !.R:...ygM......
Start Time: 1633017373
Timeout : 7200 (sec)
Verify return code: 10 (certificate has expired)
Extended master secret: yes
---
Full Log from Package Updater:
***GOT REQUEST TO CHECK FOR UPDATES***
Currently running OPNsense 21.7.3_1 (amd64/OpenSSL) at Thu Sep 30 17:51:37 CEST 2021
Fetching changelog information, please wait... Certificate verification failed for /O=Digital Signature Trust Co./CN=DST Root CA X3
5472367599616:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:/usr/src/crypto/openssl/ssl/statem/statem_clnt.c:1915:
fetch:
https://pkg.opnsense.org/FreeBSD:12:amd64/21.7/sets/changelog.txz.sig
: Authentication error
Updating OPNsense repository catalogue...
Certificate verification failed for /O=Digital Signature Trust Co./CN=DST Root CA X3
3858323083264:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:/usr/src/crypto/openssl/ssl/statem/statem_clnt.c:1915:
Certificate verification failed for /O=Digital Signature Trust Co./CN=DST Root CA X3
3858323083264:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:/usr/src/crypto/openssl/ssl/statem/statem_clnt.c:1915:
Certificate verification failed for /O=Digital Signature Trust Co./CN=DST Root CA X3
3858323083264:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:/usr/src/crypto/openssl/ssl/statem/statem_clnt.c:1915:
Certificate verification failed for /O=Digital Signature Trust Co./CN=DST Root CA X3
3858323083264:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:/usr/src/crypto/openssl/ssl/statem/statem_clnt.c:1915:
Certificate verification failed for /O=Digital Signature Trust Co./CN=DST Root CA X3
3858323083264:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:/usr/src/crypto/openssl/ssl/statem/statem_clnt.c:1915:
Certificate verification failed for /O=Digital Signature Trust Co./CN=DST Root CA X3
3858323083264:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:/usr/src/crypto/openssl/ssl/statem/statem_clnt.c:1915:
pkg:
https://pkg.opnsense.org/FreeBSD:12:amd64/21.7/latest/meta.txz
: Authentication error
repository OPNsense has no meta file, using default settings
Certificate verification failed for /O=Digital Signature Trust Co./CN=DST Root CA X3
3858323083264:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:/usr/src/crypto/openssl/ssl/statem/statem_clnt.c:1915:
Certificate verification failed for /O=Digital Signature Trust Co./CN=DST Root CA X3
3858323083264:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:/usr/src/crypto/openssl/ssl/statem/statem_clnt.c:1915:
Certificate verification failed for /O=Digital Signature Trust Co./CN=DST Root CA X3
3858323083264:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:/usr/src/crypto/openssl/ssl/statem/statem_clnt.c:1915:
pkg:
https://pkg.opnsense.org/FreeBSD:12:amd64/21.7/latest/packagesite.txz
: Authentication error
Unable to update repository OPNsense
Error updating repositories!
pkg: Repository OPNsense cannot be opened. 'pkg update' required
Checking integrity... done (0 conflicting)
Your packages are up to date.
***DONE***
«
Last Edit: September 30, 2021, 05:57:18 pm by Felix.
»
Logged
Felix.
Newbie
Posts: 30
Karma: 4
Re: opnsense using wrong letsencrypt R3 intermediate certificate
«
Reply #19 on:
September 30, 2021, 06:10:16 pm »
For my services that are hit by this issue, I built the following chain that gets delivered by nginx (should work with apache/haproxy etc. too):
wget
https://letsencrypt.org/certs/isrgrootx1.pem
wget
https://letsencrypt.org/certs/lets-encrypt-r3.pem
cat myCert.pem lets-encrypt-r3.pem isrgrootx1.pem > fullchain.pem
This excludes the old DST root from the chain and clients like openssl / pkg / apt will stop complaining.
The browsers seem to be more tolerant at this point, though.
Logged
Tupsi
Newbie
Posts: 23
Karma: 0
Re: opnsense using wrong letsencrypt R3 intermediate certificate
«
Reply #20 on:
September 30, 2021, 08:08:55 pm »
how would I fix my opnsense installation if pkg update already stopped working because if the issue? I do not seem to have the LE plugin installed (if its not in the base system I do not have it installed myself), so from what I get from this thread I can't just delete the old cert and let the plugin catch the new one, right?
Felix posted someting in his last post which seems to get me the correct cert chain, put where do I have to put this in order to get a pkg update running again?
Logged
Tupsi
Newbie
Posts: 23
Karma: 0
Re: opnsense using wrong letsencrypt R3 intermediate certificate
«
Reply #21 on:
September 30, 2021, 08:30:37 pm »
nm, figured it out myself. Used Felix wget on another computer and cat together the two (without a 3rd own) and imported that under Authorities as new trusted authrorities.
After that a pkg update worked again, so thanks for the pointers @Felix!
Logged
Felix.
Newbie
Posts: 30
Karma: 4
Re: opnsense using wrong letsencrypt R3 intermediate certificate
«
Reply #22 on:
September 30, 2021, 08:49:16 pm »
Great catch, Tupsi!
Works for me, too!
How to get package updates to work:
- Remove the Let's Encrypt's R3 cert from System -> Trust -> Authorities.
- Add a new Authority Certificate and paste both R3 and ISRG Root X1 into the "Certificate data" field.
"certificate data" should look like this:
-----BEGIN CERTIFICATE-----
MIIFFjCCAv6gAwIBAgIRAJErCErPDBinU/bWLiWnX1owDQYJKoZIhvcNAQELBQAw
TzELMAkGA1UEBhMCVVMxKTAnBgNVBAoTIEludGVybmV0IFNlY3VyaXR5IFJlc2Vh
cmNoIEdyb3VwMRUwEwYDVQQDEwxJU1JHIFJvb3QgWDEwHhcNMjAwOTA0MDAwMDAw
WhcNMjUwOTE1MTYwMDAwWjAyMQswCQYDVQQGEwJVUzEWMBQGA1UEChMNTGV0J3Mg
RW5jcnlwdDELMAkGA1UEAxMCUjMwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEK
AoIBAQC7AhUozPaglNMPEuyNVZLD+ILxmaZ6QoinXSaqtSu5xUyxr45r+XXIo9cP
R5QUVTVXjJ6oojkZ9YI8QqlObvU7wy7bjcCwXPNZOOftz2nwWgsbvsCUJCWH+jdx
sxPnHKzhm+/b5DtFUkWWqcFTzjTIUu61ru2P3mBw4qVUq7ZtDpelQDRrK9O8Zutm
NHz6a4uPVymZ+DAXXbpyb/uBxa3Shlg9F8fnCbvxK/eG3MHacV3URuPMrSXBiLxg
Z3Vms/EY96Jc5lP/Ooi2R6X/ExjqmAl3P51T+c8B5fWmcBcUr2Ok/5mzk53cU6cG
/kiFHaFpriV1uxPMUgP17VGhi9sVAgMBAAGjggEIMIIBBDAOBgNVHQ8BAf8EBAMC
AYYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMBMBIGA1UdEwEB/wQIMAYB
Af8CAQAwHQYDVR0OBBYEFBQusxe3WFbLrlAJQOYfr52LFMLGMB8GA1UdIwQYMBaA
FHm0WeZ7tuXkAXOACIjIGlj26ZtuMDIGCCsGAQUFBwEBBCYwJDAiBggrBgEFBQcw
AoYWaHR0cDovL3gxLmkubGVuY3Iub3JnLzAnBgNVHR8EIDAeMBygGqAYhhZodHRw
Oi8veDEuYy5sZW5jci5vcmcvMCIGA1UdIAQbMBkwCAYGZ4EMAQIBMA0GCysGAQQB
gt8TAQEBMA0GCSqGSIb3DQEBCwUAA4ICAQCFyk5HPqP3hUSFvNVneLKYY611TR6W
PTNlclQtgaDqw+34IL9fzLdwALduO/ZelN7kIJ+m74uyA+eitRY8kc607TkC53wl
ikfmZW4/RvTZ8M6UK+5UzhK8jCdLuMGYL6KvzXGRSgi3yLgjewQtCPkIVz6D2QQz
CkcheAmCJ8MqyJu5zlzyZMjAvnnAT45tRAxekrsu94sQ4egdRCnbWSDtY7kh+BIm
lJNXoB1lBMEKIq4QDUOXoRgffuDghje1WrG9ML+Hbisq/yFOGwXD9RiX8F6sw6W4
avAuvDszue5L3sz85K+EC4Y/wFVDNvZo4TYXao6Z0f+lQKc0t8DQYzk1OXVu8rp2
yJMC6alLbBfODALZvYH7n7do1AZls4I9d1P4jnkDrQoxB3UqQ9hVl3LEKQ73xF1O
yK5GhDDX8oVfGKF5u+decIsH4YaTw7mP3GFxJSqv3+0lUFJoi5Lc5da149p90Ids
hCExroL1+7mryIkXPeFM5TgO9r0rvZaBFOvV2z0gp35Z0+L4WPlbuEjN/lxPFin+
HlUjr8gRsI3qfJOQFy/9rKIJR0Y/8Omwt/8oTWgy1mdeHmmjk7j1nYsvC9JSQ6Zv
MldlTTKB3zhThV1+XWYp6rjd5JW1zbVWEkLNxE7GJThEUG3szgBVGP7pSWTUTsqX
nLRbwHOoq7hHwg==
-----END CERTIFICATE-----
-----BEGIN CERTIFICATE-----
MIIFazCCA1OgAwIBAgIRAIIQz7DSQONZRGPgu2OCiwAwDQYJKoZIhvcNAQELBQAw
TzELMAkGA1UEBhMCVVMxKTAnBgNVBAoTIEludGVybmV0IFNlY3VyaXR5IFJlc2Vh
cmNoIEdyb3VwMRUwEwYDVQQDEwxJU1JHIFJvb3QgWDEwHhcNMTUwNjA0MTEwNDM4
WhcNMzUwNjA0MTEwNDM4WjBPMQswCQYDVQQGEwJVUzEpMCcGA1UEChMgSW50ZXJu
ZXQgU2VjdXJpdHkgUmVzZWFyY2ggR3JvdXAxFTATBgNVBAMTDElTUkcgUm9vdCBY
MTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAK3oJHP0FDfzm54rVygc
h77ct984kIxuPOZXoHj3dcKi/vVqbvYATyjb3miGbESTtrFj/RQSa78f0uoxmyF+
0TM8ukj13Xnfs7j/EvEhmkvBioZxaUpmZmyPfjxwv60pIgbz5MDmgK7iS4+3mX6U
A5/TR5d8mUgjU+g4rk8Kb4Mu0UlXjIB0ttov0DiNewNwIRt18jA8+o+u3dpjq+sW
T8KOEUt+zwvo/7V3LvSye0rgTBIlDHCNAymg4VMk7BPZ7hm/ELNKjD+Jo2FR3qyH
B5T0Y3HsLuJvW5iB4YlcNHlsdu87kGJ55tukmi8mxdAQ4Q7e2RCOFvu396j3x+UC
B5iPNgiV5+I3lg02dZ77DnKxHZu8A/lJBdiB3QW0KtZB6awBdpUKD9jf1b0SHzUv
KBds0pjBqAlkd25HN7rOrFleaJ1/ctaJxQZBKT5ZPt0m9STJEadao0xAH0ahmbWn
OlFuhjuefXKnEgV4We0+UXgVCwOPjdAvBbI+e0ocS3MFEvzG6uBQE3xDk3SzynTn
jh8BCNAw1FtxNrQHusEwMFxIt4I7mKZ9YIqioymCzLq9gwQbooMDQaHWBfEbwrbw
qHyGO0aoSCqI3Haadr8faqU9GY/rOPNk3sgrDQoo//fb4hVC1CLQJ13hef4Y53CI
rU7m2Ys6xt0nUW7/vGT1M0NPAgMBAAGjQjBAMA4GA1UdDwEB/wQEAwIBBjAPBgNV
HRMBAf8EBTADAQH/MB0GA1UdDgQWBBR5tFnme7bl5AFzgAiIyBpY9umbbjANBgkq
hkiG9w0BAQsFAAOCAgEAVR9YqbyyqFDQDLHYGmkgJykIrGF1XIpu+ILlaS/V9lZL
ubhzEFnTIZd+50xx+7LSYK05qAvqFyFWhfFQDlnrzuBZ6brJFe+GnY+EgPbk6ZGQ
3BebYhtF8GaV0nxvwuo77x/Py9auJ/GpsMiu/X1+mvoiBOv/2X/qkSsisRcOj/KK
NFtY2PwByVS5uCbMiogziUwthDyC3+6WVwW6LLv3xLfHTjuCvjHIInNzktHCgKQ5
ORAzI4JMPJ+GslWYHb4phowim57iaztXOoJwTdwJx4nLCgdNbOhdjsnvzqvHu7Ur
TkXWStAmzOVyyghqpZXjFaH3pO3JLF+l+/+sKAIuvtd7u+Nxe5AW0wdeRlN8NwdC
jNPElpzVmbUq4JUagEiuTDkHzsxHpFKVK7q4+63SM1N95R1NbdWhscdCb+ZAJzVc
oyi3B43njTOQ5yOf+1CceWxG1bQVs5ZufpsMljq4Ui0/1lvh+wjChP4kqKOJ2qxq
4RgqsahDYVvTH9w7jXbyLeiNdd8XM2w9U/t7y0Ff/9yi0GE44Za4rF2LN9d11TPA
mRGunUHBcnWEvgJBQl9nJEiU0Zsnvgc/ubhPgXRR4Xq37Z0j4r7g1SgEEzwxA57d
emyPxgcYxn/eR44/KJ4EBs+lVDR3veyJm+kXQ99b21/+jh5Xos1AnX5iItreGCc=
-----END CERTIFICATE-----
Or download them directly from the Let's Encrypt links that I pasted above.
After you updated, re-issue any of your LE certificates (or all of them, to fix your services like HAproxy).
This will load the correct Authority from LE again and replace your just added custom Authority and the system should be good to go again.
«
Last Edit: September 30, 2021, 08:58:47 pm by Felix.
»
Logged
razamatan
Newbie
Posts: 10
Karma: 0
Re: opnsense using wrong letsencrypt R3 intermediate certificate
«
Reply #23 on:
September 30, 2021, 09:14:02 pm »
even after getting the new R3 cert in as a cert authority, i still get tls issues when trying to check for updates in the webui... how do you fix that?
Logged
KHE
Full Member
Posts: 229
Karma: 18
Re: opnsense using wrong letsencrypt R3 intermediate certificate
«
Reply #24 on:
September 30, 2021, 10:05:36 pm »
Did you delete the old R3 cert?
I had to repeat the process of deleting the LE CA cert and reissue them again in order to get my update and DoT working again.
After the reissue of the first LA cert with the ACME Client the LE CA cert was added again and from then on everything started to work again.
KH
Logged
razamatan
Newbie
Posts: 10
Karma: 0
Re: opnsense using wrong letsencrypt R3 intermediate certificate
«
Reply #25 on:
September 30, 2021, 10:50:54 pm »
yea, i deleted the old R3 cert.
Logged
ThyOnlySandman
Jr. Member
Posts: 85
Karma: 4
Re: opnsense using wrong letsencrypt R3 intermediate certificate
«
Reply #26 on:
October 01, 2021, 06:32:13 am »
I'm confused...
I updated via http without 3rd party repos. Got Acme import.
Deleted old + new R3.
Renew all certs.
Run Acme import on all certs - verify R3 CA cert has total # of associated certs.
Set cert in settings administration. Reboot webui.
Opnsense now authenticates https mirrors.
Set NGINX / NTOPNG certs.
All certs / chains in use are happy.
Reboot Opnsense and won't authenticate against upate mirrors again. All certs / NGINX chains are fine, including Opnsense GUI cert.
I've done this twice now. What am I missing?
Thank you.
Logged
RamSense
Hero Member
Posts: 594
Karma: 10
Re: opnsense using wrong letsencrypt R3 intermediate certificate
«
Reply #27 on:
October 01, 2021, 08:20:15 am »
@Felix.
Thanks! That fixed it for me also!
Logged
GreenMatter
Full Member
Posts: 166
Karma: 1
Re: opnsense using wrong letsencrypt R3 intermediate certificate
«
Reply #28 on:
October 01, 2021, 08:52:57 am »
I had two R3 certs in the system. After deleting old one, updates didn't work. When I deleted second R3 (Acme client) cert. I was able to update the system...
Logged
OPNsense on:
Intel(R) Xeon(R) E-2278G CPU @ 3.40GHz (4 cores)
8 GB RAM
50 GB HDD
and plenty of vlans ;-)
ThyOnlySandman
Jr. Member
Posts: 85
Karma: 4
Re: opnsense using wrong letsencrypt R3 intermediate certificate
«
Reply #29 on:
October 01, 2021, 08:55:18 am »
Does it continue to update for you following a reboot?
Logged
Print
Pages:
1
[
2
]
3
« previous
next »
OPNsense Forum
»
Archive
»
21.7 Legacy Series
»
opnsense using wrong letsencrypt R3 intermediate certificate