without R3 (ACME Client), haproxy throws 503s again - so I'm back to the state where I select both CAs
without R3 (ACME Client), haproxy throws 503s again
A0:53:37:5B:FE:84:E8:B7:48:78:2C:7C:EE:15:82:7A:6A:F5:A4:05
openssl x509 -in <PATH-TO-R3-CERT>.crt -noout -fingerprint
openssl x509 -in R3_AcmeClient.crt -noout -fingerprintSHA1 Fingerprint=A0:53:37:5B:FE:84:E8:B7:48:78:2C:7C:EE:15:82:7A:6A:F5:A4:05
I have, as you suggested, imported https://letsencrypt.org/certs/isrgrootx1.pem /w alias "LE - ISRG Root X1" (it shows up as "self-signed") - immediately afterwards the existing R3 (ACME Client) would show issuer = LE - ISRG Root X1.
openssl x509 -in ca.pem -noout -fingerprintSHA1 Fingerprint=A0:53:37:5B:FE:84:E8:B7:48:78:2C:7C:EE:15:82:7A:6A:F5:A4:05
openssl s_client -connect <backend ip>:443 -servername <servername>
openssl s_client -connect <REDACTED>:443CONNECTED(00000003)depth=0 CN = <REDACTED>verify error:num=20:unable to get local issuer certificateverify return:1depth=0 CN = <REDACTED>verify error:num=21:unable to verify the first certificateverify return:1---Certificate chain 0 s:CN = <REDACTED> i:C = US, O = Let's Encrypt, CN = R3---Server certificate-----BEGIN CERTIFICATE-----<REDACTED>-----END CERTIFICATE-----subject=CN = <REDACTED>issuer=C = US, O = Let's Encrypt, CN = R3---No client certificate CA names sentPeer signing digest: SHA256Peer signature type: RSA-PSSServer Temp Key: X25519, 253 bits---SSL handshake has read 2482 bytes and written 407 bytesVerification error: unable to verify the first certificate---New, TLSv1.2, Cipher is ECDHE-RSA-AES256-GCM-SHA384Server public key is 4096 bitSecure Renegotiation IS supportedCompression: NONEExpansion: NONENo ALPN negotiatedSSL-Session: Protocol : TLSv1.2 Cipher : ECDHE-RSA-AES256-GCM-SHA384 Session-ID: <REDACTED> Session-ID-ctx: Master-Key: <REDACTED> PSK identity: None PSK identity hint: None SRP username: None TLS session ticket lifetime hint: 300 (seconds) TLS session ticket: <REDACTED> Start Time: 1637571166 Timeout : 7200 (sec) Verify return code: 21 (unable to verify the first certificate) Extended master secret: yes---
depth=0 CN = <REDACTED>verify error:num=20:unable to get local issuer certificateverify return:1depth=0 CN = <REDACTED>verify error:num=21:unable to verify the first certificateverify return:1---Certificate chain 0 s:CN = <REDACTED> i:C = US, O = Let's Encrypt, CN = R3---
looks like it is. nginx not sending certs chain. leaf cert only. so haproxy needs this CAs certs in ca-file