2021-09-21 23:23:09 |
Dimitri John Ledkov |
bug |
|
|
added bug |
2021-09-21 23:26:12 |
Dimitri John Ledkov |
description |
[Impact]
* ca-certificates trusts the letsencrypt CA certificate "ISRG Root X1"
* ca-certificates also trusts the cross-gigned CA certificate "DST Root CA X3"
* "DST Root CA X3" is about to expire, however it has issued an update cross-signature to letsencrypt beyond the CA's expiry
* This causes issues with older implementations of openssl & gnutls that reject such chains when offered to clients by servers.
* We have provided fixes for openssl in xenial and gnutls in bionic/xenial, however trusty systems remain affected. Also any self built old copies of openssl/gnutls remain suspeptible to this expiry.
* One solution is to blacklist the "DST Root CA X3" from the ca-certificates package as described at https://blog.devgenius.io/rhel-centos-7-fix-for-lets-encrypt-change-8af2de587fe4 - connectivity to sites chained to "DST Root CA X3" will be unaffected, and servers that chain to both "ISRG Root X1" and "DST Root CA X3" should start to work unmodified.
[Test Plan]
* Install new ca-certificates package
* Test that connectivity to letsencrypt websites works under faketime 2021-10-01 for OpenSSL and gnutls clients i.e.
faketime 2021-10-01 gnutls-cli canonical.com
faketime '2021-10-01' wget -O /dev/null https://canonical.com
[Where problems could occur]
* Connectivity to "DST Root CA X3" websites only, even under faketime set to dates prior to 30th of September 2021 will not work, as "DST Root CA X3" certificate is no longer installed. users should locally install and enable that CA certificate, or allow dangerous unverified connectivity to websites using expired CA certs.
[Other Info]
* Related openssl and gnutls28 bugs are https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/1928989 and https://bugs.launchpad.net/ubuntu/+source/gnutls28/+bug/1928648 |
[Impact]
* ca-certificates trusts the letsencrypt CA certificate "ISRG Root X1"
* ca-certificates also trusts the CA certificate "DST Root CA X3" which cross-signs letencrypt CA
* "DST Root CA X3" is about to expire, however it has issued an update cross-signature to letsencrypt beyond the CA's expiry
* This causes issues with older implementations of openssl & gnutls that reject such chains when offered to clients by servers.
* We have provided fixes for openssl in xenial and gnutls in bionic/xenial, however trusty systems remain affected. Also any self built old copies of openssl/gnutls remain suspeptible to this expiry.
* One solution is to blacklist the "DST Root CA X3" from the ca-certificates package as described at https://blog.devgenius.io/rhel-centos-7-fix-for-lets-encrypt-change-8af2de587fe4 - connectivity to sites chained to "DST Root CA X3" will be unaffected, and servers that chain to both "ISRG Root X1" and "DST Root CA X3" should start to work unmodified.
[Test Plan]
* Install new ca-certificates package
* Test that connectivity to letsencrypt websites works under faketime 2021-10-01 for OpenSSL and gnutls clients i.e.
faketime 2021-10-01 gnutls-cli canonical.com
faketime '2021-10-01' wget -O /dev/null https://canonical.com
[Where problems could occur]
* Connectivity to "DST Root CA X3" websites only, even under faketime set to dates prior to 30th of September 2021 will not work, as "DST Root CA X3" certificate is no longer installed. users should locally install and enable that CA certificate, or allow dangerous unverified connectivity to websites using expired CA certs.
[Other Info]
* Related openssl and gnutls28 bugs are https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/1928989 and https://bugs.launchpad.net/ubuntu/+source/gnutls28/+bug/1928648 |
|
2021-09-21 23:26:27 |
Dimitri John Ledkov |
description |
[Impact]
* ca-certificates trusts the letsencrypt CA certificate "ISRG Root X1"
* ca-certificates also trusts the CA certificate "DST Root CA X3" which cross-signs letencrypt CA
* "DST Root CA X3" is about to expire, however it has issued an update cross-signature to letsencrypt beyond the CA's expiry
* This causes issues with older implementations of openssl & gnutls that reject such chains when offered to clients by servers.
* We have provided fixes for openssl in xenial and gnutls in bionic/xenial, however trusty systems remain affected. Also any self built old copies of openssl/gnutls remain suspeptible to this expiry.
* One solution is to blacklist the "DST Root CA X3" from the ca-certificates package as described at https://blog.devgenius.io/rhel-centos-7-fix-for-lets-encrypt-change-8af2de587fe4 - connectivity to sites chained to "DST Root CA X3" will be unaffected, and servers that chain to both "ISRG Root X1" and "DST Root CA X3" should start to work unmodified.
[Test Plan]
* Install new ca-certificates package
* Test that connectivity to letsencrypt websites works under faketime 2021-10-01 for OpenSSL and gnutls clients i.e.
faketime 2021-10-01 gnutls-cli canonical.com
faketime '2021-10-01' wget -O /dev/null https://canonical.com
[Where problems could occur]
* Connectivity to "DST Root CA X3" websites only, even under faketime set to dates prior to 30th of September 2021 will not work, as "DST Root CA X3" certificate is no longer installed. users should locally install and enable that CA certificate, or allow dangerous unverified connectivity to websites using expired CA certs.
[Other Info]
* Related openssl and gnutls28 bugs are https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/1928989 and https://bugs.launchpad.net/ubuntu/+source/gnutls28/+bug/1928648 |
[Impact]
* ca-certificates trusts the letsencrypt CA certificate "ISRG Root X1"
* ca-certificates also trusts the CA certificate "DST Root CA X3" which cross-signs letencrypt CA
* "DST Root CA X3" is about to expire, however it has issued an updated cross-signature to letsencrypt beyond its own expiry
* This causes issues with older implementations of openssl & gnutls that reject such chains when offered to clients by servers.
* We have provided fixes for openssl in xenial and gnutls in bionic/xenial, however trusty systems remain affected. Also any self built old copies of openssl/gnutls remain suspeptible to this expiry.
* One solution is to blacklist the "DST Root CA X3" from the ca-certificates package as described at https://blog.devgenius.io/rhel-centos-7-fix-for-lets-encrypt-change-8af2de587fe4 - connectivity to sites chained to "DST Root CA X3" will be unaffected, and servers that chain to both "ISRG Root X1" and "DST Root CA X3" should start to work unmodified.
[Test Plan]
* Install new ca-certificates package
* Test that connectivity to letsencrypt websites works under faketime 2021-10-01 for OpenSSL and gnutls clients i.e.
faketime 2021-10-01 gnutls-cli canonical.com
faketime '2021-10-01' wget -O /dev/null https://canonical.com
[Where problems could occur]
* Connectivity to "DST Root CA X3" websites only, even under faketime set to dates prior to 30th of September 2021 will not work, as "DST Root CA X3" certificate is no longer installed. users should locally install and enable that CA certificate, or allow dangerous unverified connectivity to websites using expired CA certs.
[Other Info]
* Related openssl and gnutls28 bugs are https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/1928989 and https://bugs.launchpad.net/ubuntu/+source/gnutls28/+bug/1928648 |
|
2021-09-21 23:32:58 |
Dimitri John Ledkov |
description |
[Impact]
* ca-certificates trusts the letsencrypt CA certificate "ISRG Root X1"
* ca-certificates also trusts the CA certificate "DST Root CA X3" which cross-signs letencrypt CA
* "DST Root CA X3" is about to expire, however it has issued an updated cross-signature to letsencrypt beyond its own expiry
* This causes issues with older implementations of openssl & gnutls that reject such chains when offered to clients by servers.
* We have provided fixes for openssl in xenial and gnutls in bionic/xenial, however trusty systems remain affected. Also any self built old copies of openssl/gnutls remain suspeptible to this expiry.
* One solution is to blacklist the "DST Root CA X3" from the ca-certificates package as described at https://blog.devgenius.io/rhel-centos-7-fix-for-lets-encrypt-change-8af2de587fe4 - connectivity to sites chained to "DST Root CA X3" will be unaffected, and servers that chain to both "ISRG Root X1" and "DST Root CA X3" should start to work unmodified.
[Test Plan]
* Install new ca-certificates package
* Test that connectivity to letsencrypt websites works under faketime 2021-10-01 for OpenSSL and gnutls clients i.e.
faketime 2021-10-01 gnutls-cli canonical.com
faketime '2021-10-01' wget -O /dev/null https://canonical.com
[Where problems could occur]
* Connectivity to "DST Root CA X3" websites only, even under faketime set to dates prior to 30th of September 2021 will not work, as "DST Root CA X3" certificate is no longer installed. users should locally install and enable that CA certificate, or allow dangerous unverified connectivity to websites using expired CA certs.
[Other Info]
* Related openssl and gnutls28 bugs are https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/1928989 and https://bugs.launchpad.net/ubuntu/+source/gnutls28/+bug/1928648 |
[Impact]
* ca-certificates trusts the letsencrypt CA certificate "ISRG Root X1"
* ca-certificates also trusts the CA certificate "DST Root CA X3" which cross-signs letencrypt CA
* "DST Root CA X3" is about to expire, however it has issued an updated cross-signature to letsencrypt beyond its own expiry
* This causes issues with older implementations of openssl & gnutls that reject such chains when offered to clients by servers.
* We have provided fixes for openssl in xenial and gnutls in bionic/xenial, however trusty systems remain affected. Also any self built old copies of openssl/gnutls remain suspeptible to this expiry.
* One solution is to blacklist the "DST Root CA X3" from the ca-certificates package as described at https://blog.devgenius.io/rhel-centos-7-fix-for-lets-encrypt-change-8af2de587fe4 - connectivity to sites chained to "DST Root CA X3" will be unaffected, and servers that chain to both "ISRG Root X1" and "DST Root CA X3" should start to work unmodified.
[Test Plan]
* Install new ca-certificates package
* Test that connectivity to letsencrypt websites works under faketime 2021-10-01 for OpenSSL and gnutls clients i.e.
faketime 2021-10-01 gnutls-cli canonical.com
faketime 2021-10-01 openssl s_client -showcerts -connect canonical.com:443 < /dev/null
...
Verify return code: 0 (ok)
...
[Where problems could occur]
* Connectivity to "DST Root CA X3" websites only, even under faketime set to dates prior to 30th of September 2021 will not work, as "DST Root CA X3" certificate is no longer installed. users should locally install and enable that CA certificate, or allow dangerous unverified connectivity to websites using expired CA certs.
[Other Info]
* Related openssl and gnutls28 bugs are https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/1928989 and https://bugs.launchpad.net/ubuntu/+source/gnutls28/+bug/1928648 |
|
2021-09-21 23:58:19 |
Dimitri John Ledkov |
description |
[Impact]
* ca-certificates trusts the letsencrypt CA certificate "ISRG Root X1"
* ca-certificates also trusts the CA certificate "DST Root CA X3" which cross-signs letencrypt CA
* "DST Root CA X3" is about to expire, however it has issued an updated cross-signature to letsencrypt beyond its own expiry
* This causes issues with older implementations of openssl & gnutls that reject such chains when offered to clients by servers.
* We have provided fixes for openssl in xenial and gnutls in bionic/xenial, however trusty systems remain affected. Also any self built old copies of openssl/gnutls remain suspeptible to this expiry.
* One solution is to blacklist the "DST Root CA X3" from the ca-certificates package as described at https://blog.devgenius.io/rhel-centos-7-fix-for-lets-encrypt-change-8af2de587fe4 - connectivity to sites chained to "DST Root CA X3" will be unaffected, and servers that chain to both "ISRG Root X1" and "DST Root CA X3" should start to work unmodified.
[Test Plan]
* Install new ca-certificates package
* Test that connectivity to letsencrypt websites works under faketime 2021-10-01 for OpenSSL and gnutls clients i.e.
faketime 2021-10-01 gnutls-cli canonical.com
faketime 2021-10-01 openssl s_client -showcerts -connect canonical.com:443 < /dev/null
...
Verify return code: 0 (ok)
...
[Where problems could occur]
* Connectivity to "DST Root CA X3" websites only, even under faketime set to dates prior to 30th of September 2021 will not work, as "DST Root CA X3" certificate is no longer installed. users should locally install and enable that CA certificate, or allow dangerous unverified connectivity to websites using expired CA certs.
[Other Info]
* Related openssl and gnutls28 bugs are https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/1928989 and https://bugs.launchpad.net/ubuntu/+source/gnutls28/+bug/1928648 |
[Impact]
* ca-certificates trusts the letsencrypt CA certificate "ISRG Root X1"
* ca-certificates also trusts the CA certificate "DST Root CA X3" which cross-signs letencrypt CA
* "DST Root CA X3" is about to expire, however it has issued an updated cross-signature to letsencrypt beyond its own expiry
* This causes issues with older implementations of openssl & gnutls that reject such chains when offered to clients by servers.
* We have provided fixes for openssl in xenial and gnutls in bionic/xenial, however trusty systems remain affected. Also any self built old copies of openssl/gnutls remain suspeptible to this expiry.
* One solution is to blacklist the "DST Root CA X3" from the ca-certificates package as described at https://blog.devgenius.io/rhel-centos-7-fix-for-lets-encrypt-change-8af2de587fe4 - connectivity to sites chained to "DST Root CA X3" will be unaffected, and servers that chain to both "ISRG Root X1" and "DST Root CA X3" should start to work unmodified.
[Test Plan]
* Install old/current ca-certificates package, faketime, wget
# faketime 2021-10-01 wget https://pskov.surgut.co.uk
--2021-10-01 00:00:00-- https://pskov.surgut.co.uk/
Resolving pskov.surgut.co.uk (pskov.surgut.co.uk)... 2a01:4f8:c17:3dd8::1, 49.12.37.5
Connecting to pskov.surgut.co.uk (pskov.surgut.co.uk)|2a01:4f8:c17:3dd8::1|:443... connected.
ERROR: cannot verify pskov.surgut.co.uk's certificate, issued by '/C=US/O=Let\'s Encrypt/CN=R3':
Issued certificate has expired.
To connect to pskov.surgut.co.uk insecurely, use `--no-check-certificate'.
* Install new ca-certificates package
# faketime 2021-10-01 wget https://pskov.surgut.co.uk
--2021-10-01 00:00:00-- https://pskov.surgut.co.uk/
Resolving pskov.surgut.co.uk (pskov.surgut.co.uk)... 2a01:4f8:c17:3dd8::1, 49.12.37.5
Connecting to pskov.surgut.co.uk (pskov.surgut.co.uk)|2a01:4f8:c17:3dd8::1|:443... connected.
HTTP request sent, awaiting response... 200 OK
Length: 612 [text/html]
Saving to: 'index.html.3'
100%[====================================================>] 612 --.-K/s in 0s
2021-10-01 00:00:00 (71.7 MB/s) - 'index.html.3' saved [612/612]
Download is successful.
[Where problems could occur]
* Connectivity to "DST Root CA X3" websites only, even under faketime set to dates prior to 30th of September 2021 will not work, as "DST Root CA X3" certificate is no longer installed. users should locally install and enable that CA certificate, or allow dangerous unverified connectivity to websites using expired CA certs.
[Other Info]
* Related openssl and gnutls28 bugs are https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/1928989 and https://bugs.launchpad.net/ubuntu/+source/gnutls28/+bug/1928648 |
|
2021-09-21 23:58:51 |
Dimitri John Ledkov |
attachment added |
|
trusty.debdiff https://bugs.launchpad.net/ubuntu/+source/ca-certificates/+bug/1944481/+attachment/5526782/+files/trusty.debdiff |
|
2021-09-22 00:20:44 |
Dimitri John Ledkov |
description |
[Impact]
* ca-certificates trusts the letsencrypt CA certificate "ISRG Root X1"
* ca-certificates also trusts the CA certificate "DST Root CA X3" which cross-signs letencrypt CA
* "DST Root CA X3" is about to expire, however it has issued an updated cross-signature to letsencrypt beyond its own expiry
* This causes issues with older implementations of openssl & gnutls that reject such chains when offered to clients by servers.
* We have provided fixes for openssl in xenial and gnutls in bionic/xenial, however trusty systems remain affected. Also any self built old copies of openssl/gnutls remain suspeptible to this expiry.
* One solution is to blacklist the "DST Root CA X3" from the ca-certificates package as described at https://blog.devgenius.io/rhel-centos-7-fix-for-lets-encrypt-change-8af2de587fe4 - connectivity to sites chained to "DST Root CA X3" will be unaffected, and servers that chain to both "ISRG Root X1" and "DST Root CA X3" should start to work unmodified.
[Test Plan]
* Install old/current ca-certificates package, faketime, wget
# faketime 2021-10-01 wget https://pskov.surgut.co.uk
--2021-10-01 00:00:00-- https://pskov.surgut.co.uk/
Resolving pskov.surgut.co.uk (pskov.surgut.co.uk)... 2a01:4f8:c17:3dd8::1, 49.12.37.5
Connecting to pskov.surgut.co.uk (pskov.surgut.co.uk)|2a01:4f8:c17:3dd8::1|:443... connected.
ERROR: cannot verify pskov.surgut.co.uk's certificate, issued by '/C=US/O=Let\'s Encrypt/CN=R3':
Issued certificate has expired.
To connect to pskov.surgut.co.uk insecurely, use `--no-check-certificate'.
* Install new ca-certificates package
# faketime 2021-10-01 wget https://pskov.surgut.co.uk
--2021-10-01 00:00:00-- https://pskov.surgut.co.uk/
Resolving pskov.surgut.co.uk (pskov.surgut.co.uk)... 2a01:4f8:c17:3dd8::1, 49.12.37.5
Connecting to pskov.surgut.co.uk (pskov.surgut.co.uk)|2a01:4f8:c17:3dd8::1|:443... connected.
HTTP request sent, awaiting response... 200 OK
Length: 612 [text/html]
Saving to: 'index.html.3'
100%[====================================================>] 612 --.-K/s in 0s
2021-10-01 00:00:00 (71.7 MB/s) - 'index.html.3' saved [612/612]
Download is successful.
[Where problems could occur]
* Connectivity to "DST Root CA X3" websites only, even under faketime set to dates prior to 30th of September 2021 will not work, as "DST Root CA X3" certificate is no longer installed. users should locally install and enable that CA certificate, or allow dangerous unverified connectivity to websites using expired CA certs.
[Other Info]
* Related openssl and gnutls28 bugs are https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/1928989 and https://bugs.launchpad.net/ubuntu/+source/gnutls28/+bug/1928648 |
[Impact]
* ca-certificates trusts the letsencrypt CA certificate "ISRG Root X1"
* ca-certificates also trusts the CA certificate "DST Root CA X3" which cross-signs letencrypt CA
* "DST Root CA X3" is about to expire, however it has issued an updated cross-signature to letsencrypt beyond its own expiry
* This causes issues with older implementations of openssl & gnutls that reject such chains when offered to clients by servers.
* We have provided fixes for openssl in xenial and gnutls in bionic/xenial, however trusty systems remain affected. Also any self built old copies of openssl/gnutls remain suspeptible to this expiry.
* One solution is to blacklist the "DST Root CA X3" from the ca-certificates package as described at https://blog.devgenius.io/rhel-centos-7-fix-for-lets-encrypt-change-8af2de587fe4 - connectivity to sites chained to "DST Root CA X3" will be unaffected, and servers that chain to both "ISRG Root X1" and "DST Root CA X3" should start to work unmodified.
[Test Plan]
* Install old/current ca-certificates faketime wget curl libcurl3-gnutls
# faketime 2021-10-01 wget https://pskov.surgut.co.uk
--2021-10-01 00:00:00-- https://pskov.surgut.co.uk/
Resolving pskov.surgut.co.uk (pskov.surgut.co.uk)... 2a01:4f8:c17:3dd8::1, 49.12.37.5
Connecting to pskov.surgut.co.uk (pskov.surgut.co.uk)|2a01:4f8:c17:3dd8::1|:443... connected.
ERROR: cannot verify pskov.surgut.co.uk's certificate, issued by '/C=US/O=Let\'s Encrypt/CN=R3':
Issued certificate has expired.
To connect to pskov.surgut.co.uk insecurely, use `--no-check-certificate'.
# LD_PRELOAD=/usr/lib/x86_64-linux-gnu/libcurl-gnutls.so.4 faketime 2021-10-01 curl https://pskov.surgut.co.uk >/dev/null
% Total % Received % Xferd Average Speed Time Time Time Current
Dload Upload Total Spent Left Speed
0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0
curl: (60) SSL certificate problem: certificate has expired
* Install new ca-certificates package
# faketime 2021-10-01 wget https://pskov.surgut.co.uk
--2021-10-01 00:00:00-- https://pskov.surgut.co.uk/
Resolving pskov.surgut.co.uk (pskov.surgut.co.uk)... 2a01:4f8:c17:3dd8::1, 49.12.37.5
Connecting to pskov.surgut.co.uk (pskov.surgut.co.uk)|2a01:4f8:c17:3dd8::1|:443... connected.
HTTP request sent, awaiting response... 200 OK
Length: 612 [text/html]
Saving to: 'index.html.3'
100%[====================================================>] 612 --.-K/s in 0s
2021-10-01 00:00:00 (71.7 MB/s) - 'index.html.3' saved [612/612]
LD_PRELOAD=/usr/lib/x86_64-linux-gnu/libcurl-gnutls.so.4 faketime 2021-10-01 curl https://pskov.surgut.co.uk >/dev/null
% Total % Received % Xferd Average Speed Time Time Time Current
Dload Upload Total Spent Left Speed
100 612 100 612 0 0 5794 0 --:--:-- --:--:-- --:--:-- 5828
Download is successful.
[Where problems could occur]
* Connectivity to "DST Root CA X3" websites only, even under faketime set to dates prior to 30th of September 2021 will not work, as "DST Root CA X3" certificate is no longer installed. users should locally install and enable that CA certificate, or allow dangerous unverified connectivity to websites using expired CA certs.
[Other Info]
* Related openssl and gnutls28 bugs are https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/1928989 and https://bugs.launchpad.net/ubuntu/+source/gnutls28/+bug/1928648 |
|
2021-09-22 00:23:22 |
Dimitri John Ledkov |
description |
[Impact]
* ca-certificates trusts the letsencrypt CA certificate "ISRG Root X1"
* ca-certificates also trusts the CA certificate "DST Root CA X3" which cross-signs letencrypt CA
* "DST Root CA X3" is about to expire, however it has issued an updated cross-signature to letsencrypt beyond its own expiry
* This causes issues with older implementations of openssl & gnutls that reject such chains when offered to clients by servers.
* We have provided fixes for openssl in xenial and gnutls in bionic/xenial, however trusty systems remain affected. Also any self built old copies of openssl/gnutls remain suspeptible to this expiry.
* One solution is to blacklist the "DST Root CA X3" from the ca-certificates package as described at https://blog.devgenius.io/rhel-centos-7-fix-for-lets-encrypt-change-8af2de587fe4 - connectivity to sites chained to "DST Root CA X3" will be unaffected, and servers that chain to both "ISRG Root X1" and "DST Root CA X3" should start to work unmodified.
[Test Plan]
* Install old/current ca-certificates faketime wget curl libcurl3-gnutls
# faketime 2021-10-01 wget https://pskov.surgut.co.uk
--2021-10-01 00:00:00-- https://pskov.surgut.co.uk/
Resolving pskov.surgut.co.uk (pskov.surgut.co.uk)... 2a01:4f8:c17:3dd8::1, 49.12.37.5
Connecting to pskov.surgut.co.uk (pskov.surgut.co.uk)|2a01:4f8:c17:3dd8::1|:443... connected.
ERROR: cannot verify pskov.surgut.co.uk's certificate, issued by '/C=US/O=Let\'s Encrypt/CN=R3':
Issued certificate has expired.
To connect to pskov.surgut.co.uk insecurely, use `--no-check-certificate'.
# LD_PRELOAD=/usr/lib/x86_64-linux-gnu/libcurl-gnutls.so.4 faketime 2021-10-01 curl https://pskov.surgut.co.uk >/dev/null
% Total % Received % Xferd Average Speed Time Time Time Current
Dload Upload Total Spent Left Speed
0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0
curl: (60) SSL certificate problem: certificate has expired
* Install new ca-certificates package
# faketime 2021-10-01 wget https://pskov.surgut.co.uk
--2021-10-01 00:00:00-- https://pskov.surgut.co.uk/
Resolving pskov.surgut.co.uk (pskov.surgut.co.uk)... 2a01:4f8:c17:3dd8::1, 49.12.37.5
Connecting to pskov.surgut.co.uk (pskov.surgut.co.uk)|2a01:4f8:c17:3dd8::1|:443... connected.
HTTP request sent, awaiting response... 200 OK
Length: 612 [text/html]
Saving to: 'index.html.3'
100%[====================================================>] 612 --.-K/s in 0s
2021-10-01 00:00:00 (71.7 MB/s) - 'index.html.3' saved [612/612]
LD_PRELOAD=/usr/lib/x86_64-linux-gnu/libcurl-gnutls.so.4 faketime 2021-10-01 curl https://pskov.surgut.co.uk >/dev/null
% Total % Received % Xferd Average Speed Time Time Time Current
Dload Upload Total Spent Left Speed
100 612 100 612 0 0 5794 0 --:--:-- --:--:-- --:--:-- 5828
Download is successful.
[Where problems could occur]
* Connectivity to "DST Root CA X3" websites only, even under faketime set to dates prior to 30th of September 2021 will not work, as "DST Root CA X3" certificate is no longer installed. users should locally install and enable that CA certificate, or allow dangerous unverified connectivity to websites using expired CA certs.
[Other Info]
* Related openssl and gnutls28 bugs are https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/1928989 and https://bugs.launchpad.net/ubuntu/+source/gnutls28/+bug/1928648 |
[Impact]
* ca-certificates trusts the letsencrypt CA certificate "ISRG Root X1"
* ca-certificates also trusts the CA certificate "DST Root CA X3" which cross-signs letencrypt CA
* "DST Root CA X3" is about to expire, however it has issued an updated cross-signature to letsencrypt beyond its own expiry
* This causes issues with older implementations of openssl & gnutls that reject such chains when offered to clients by servers.
* We have provided fixes for openssl in xenial and gnutls in bionic/xenial, however trusty systems remain affected. Also any self built old copies of openssl/gnutls remain suspeptible to this expiry.
* One solution is to blacklist the "DST Root CA X3" from the ca-certificates package as described at https://blog.devgenius.io/rhel-centos-7-fix-for-lets-encrypt-change-8af2de587fe4 - connectivity to sites chained to "DST Root CA X3" will be unaffected, and servers that chain to both "ISRG Root X1" and "DST Root CA X3" should start to work unmodified.
* This is similar to how this was handled for AddTrust before
"* mozilla/blacklist.txt: blacklist expired AddTrust External Root CA."
[Test Plan]
* Install old/current ca-certificates faketime wget curl libcurl3-gnutls
# faketime 2021-10-01 wget https://pskov.surgut.co.uk
--2021-10-01 00:00:00-- https://pskov.surgut.co.uk/
Resolving pskov.surgut.co.uk (pskov.surgut.co.uk)... 2a01:4f8:c17:3dd8::1, 49.12.37.5
Connecting to pskov.surgut.co.uk (pskov.surgut.co.uk)|2a01:4f8:c17:3dd8::1|:443... connected.
ERROR: cannot verify pskov.surgut.co.uk's certificate, issued by '/C=US/O=Let\'s Encrypt/CN=R3':
Issued certificate has expired.
To connect to pskov.surgut.co.uk insecurely, use `--no-check-certificate'.
# LD_PRELOAD=/usr/lib/x86_64-linux-gnu/libcurl-gnutls.so.4 faketime 2021-10-01 curl https://pskov.surgut.co.uk >/dev/null
% Total % Received % Xferd Average Speed Time Time Time Current
Dload Upload Total Spent Left Speed
0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0
curl: (60) SSL certificate problem: certificate has expired
* Install new ca-certificates package
# faketime 2021-10-01 wget https://pskov.surgut.co.uk
--2021-10-01 00:00:00-- https://pskov.surgut.co.uk/
Resolving pskov.surgut.co.uk (pskov.surgut.co.uk)... 2a01:4f8:c17:3dd8::1, 49.12.37.5
Connecting to pskov.surgut.co.uk (pskov.surgut.co.uk)|2a01:4f8:c17:3dd8::1|:443... connected.
HTTP request sent, awaiting response... 200 OK
Length: 612 [text/html]
Saving to: 'index.html.3'
100%[====================================================>] 612 --.-K/s in 0s
2021-10-01 00:00:00 (71.7 MB/s) - 'index.html.3' saved [612/612]
LD_PRELOAD=/usr/lib/x86_64-linux-gnu/libcurl-gnutls.so.4 faketime 2021-10-01 curl https://pskov.surgut.co.uk >/dev/null
% Total % Received % Xferd Average Speed Time Time Time Current
Dload Upload Total Spent Left Speed
100 612 100 612 0 0 5794 0 --:--:-- --:--:-- --:--:-- 5828
Download is successful.
[Where problems could occur]
* Connectivity to "DST Root CA X3" websites only, even under faketime set to dates prior to 30th of September 2021 will not work, as "DST Root CA X3" certificate is no longer installed. users should locally install and enable that CA certificate, or allow dangerous unverified connectivity to websites using expired CA certs.
[Other Info]
* Related openssl and gnutls28 bugs are https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/1928989 and https://bugs.launchpad.net/ubuntu/+source/gnutls28/+bug/1928648 |
|
2021-09-22 00:27:12 |
Dimitri John Ledkov |
attachment added |
|
trusty-esm.debdiff https://bugs.launchpad.net/ubuntu/+source/ca-certificates/+bug/1944481/+attachment/5526783/+files/trusty-esm.debdiff |
|
2021-09-22 00:28:18 |
Dimitri John Ledkov |
nominated for series |
|
Ubuntu Trusty |
|
2021-09-22 00:28:18 |
Dimitri John Ledkov |
bug task added |
|
ca-certificates (Ubuntu Trusty) |
|
2021-09-23 09:53:45 |
Dimitri John Ledkov |
bug |
|
|
added subscriber The Canonical Sysadmins |
2021-09-23 10:56:06 |
Marc Deslauriers |
information type |
Private Security |
Public Security |
|
2021-09-23 10:56:24 |
Marc Deslauriers |
nominated for series |
|
Ubuntu Impish |
|
2021-09-23 10:56:24 |
Marc Deslauriers |
bug task added |
|
ca-certificates (Ubuntu Impish) |
|
2021-09-23 10:56:24 |
Marc Deslauriers |
nominated for series |
|
Ubuntu Bionic |
|
2021-09-23 10:56:24 |
Marc Deslauriers |
bug task added |
|
ca-certificates (Ubuntu Bionic) |
|
2021-09-23 10:56:24 |
Marc Deslauriers |
nominated for series |
|
Ubuntu Hirsute |
|
2021-09-23 10:56:24 |
Marc Deslauriers |
bug task added |
|
ca-certificates (Ubuntu Hirsute) |
|
2021-09-23 10:56:24 |
Marc Deslauriers |
nominated for series |
|
Ubuntu Xenial |
|
2021-09-23 10:56:24 |
Marc Deslauriers |
bug task added |
|
ca-certificates (Ubuntu Xenial) |
|
2021-09-23 10:56:24 |
Marc Deslauriers |
nominated for series |
|
Ubuntu Focal |
|
2021-09-23 10:56:24 |
Marc Deslauriers |
bug task added |
|
ca-certificates (Ubuntu Focal) |
|
2021-09-23 10:56:32 |
Marc Deslauriers |
ca-certificates (Ubuntu Bionic): assignee |
|
Marc Deslauriers (mdeslaur) |
|
2021-09-23 10:56:36 |
Marc Deslauriers |
ca-certificates (Ubuntu Focal): assignee |
|
Marc Deslauriers (mdeslaur) |
|
2021-09-23 10:56:39 |
Marc Deslauriers |
ca-certificates (Ubuntu Hirsute): assignee |
|
Marc Deslauriers (mdeslaur) |
|
2021-09-23 10:56:42 |
Marc Deslauriers |
ca-certificates (Ubuntu Impish): assignee |
|
Marc Deslauriers (mdeslaur) |
|
2021-09-23 11:41:22 |
Launchpad Janitor |
ca-certificates (Ubuntu Focal): status |
New |
Fix Released |
|
2021-09-23 11:41:24 |
Launchpad Janitor |
ca-certificates (Ubuntu Bionic): status |
New |
Fix Released |
|
2021-09-23 11:48:47 |
Launchpad Janitor |
ca-certificates (Ubuntu Hirsute): status |
New |
Fix Released |
|
2021-09-23 12:29:53 |
Ubuntu Foundations Team Bug Bot |
tags |
|
patch |
|
2021-09-23 13:30:56 |
Marc Deslauriers |
ca-certificates (Ubuntu Impish): status |
New |
Fix Committed |
|
2021-09-23 13:31:15 |
Marc Deslauriers |
ca-certificates (Ubuntu Trusty): status |
New |
Fix Released |
|
2021-09-23 13:31:19 |
Marc Deslauriers |
ca-certificates (Ubuntu Xenial): status |
New |
Fix Released |
|
2021-09-23 15:47:29 |
Romain Couturat |
information type |
Public Security |
Private Security |
|
2021-09-23 15:50:46 |
Romain Couturat |
removed subscriber The Canonical Sysadmins |
|
|
|
2021-09-23 15:54:16 |
Romain Couturat |
information type |
Private Security |
Public |
|
2021-09-23 15:54:47 |
Romain Couturat |
information type |
Public |
Public Security |
|
2021-09-27 08:15:02 |
Romain Couturat |
bug |
|
|
added subscriber Romain Couturat |
2021-09-28 10:41:47 |
Fabiano Nunes |
bug |
|
|
added subscriber Fabiano Nunes |
2021-09-30 23:51:24 |
Launchpad Janitor |
ca-certificates (Ubuntu Impish): status |
Fix Committed |
Fix Released |
|
2021-10-09 13:51:45 |
Jeremy Bícha |
bug watch added |
|
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=995432 |
|
2021-10-09 13:51:45 |
Jeremy Bícha |
bug task added |
|
ca-certificates (Fluxbuntu) |
|
2021-10-09 14:25:24 |
Jeremy Bícha |
bug task deleted |
ca-certificates (Fluxbuntu) |
|
|
2021-10-09 14:25:45 |
Jeremy Bícha |
bug task added |
|
ca-certificates (Debian) |
|
2021-10-09 16:02:31 |
Bug Watch Updater |
ca-certificates (Debian): status |
Unknown |
Fix Released |
|