Hello,
Information needed
openssl version: 1.0.1t
certbot 1.9.0
I have a concern since the expiration regarding DST Root CA X3.
When the SSL certificate is renewed, this is what one of our users has about the certificate for our domain "domain.com" as a message.
When I look at the chain.pem (see content below) and fullchain.pem files, I have since DST Root CA X3 expired two different entries in these files. The first one must be the default chain I suppose and the other the alternative chain according to https://medium.com/geekculture/will-you-be-impacted-by-letsencrypt-dst-root-ca-x3- expiration-d54a018df257 or Production Chain Changes.
Contents of my chain.pem file:
-----BEGIN CERTIFICATE-----
MIIFFjCCAv
...
nLRbwHOoq7hHwg==
-----END CERTIFICATE-----
-----BEGIN CERTIFICATE-----
MIIFYDCCB
...
tPAQw4dy753ec5
-----END CERTIFICATE-----
If I delete the second chain from the chain.pem and fullchain.pem files then it is no longer a problem as we can see below
However if I understood correctly, the first chain is the default chain which contains (Default chain: End-entity certificate ā R3 ā ISRG Root X1 ā DST Root CA X3) and the second is the alternative chain which contains (Alternate chain : End-entity certificate ā R3 ā ISRG Root X1) so by removing the second string, the user should still get the message right? There is something that I did not understand!
Is there a way to know for sure that it is the default chain and the alternate chain in chain.pem and fullchain.pem files?
This is what the command gives after removing the second chain from chain.pem and fullchain.pem files:
openssl s_client -servername domain.com -showcerts -connect domain.com:443
CONNECTED(00000003)
depth=2 C = US, O = Internet Security Research Group, CN = ISRG Root X1
verify return:1
depth=1 C = US, O = Let's Encrypt, CN = R3
verify return:1
depth=0 CN = domain.com
verify return:1
Certificate chain
0 s:/CN=domain.com
i:/C=US/O=Let's Encrypt/CN=R3
-----BEGIN CERTIFICATE-----
ktQ1laBnNwl8o7g==
-----END CERTIFICATE-----
1 s:/CN=domain.com
i:/C=US/O=Let's Encrypt/CN=R3
-----BEGIN CERTIFICATE-----
ktQ1laBnNwl8o7g==
-----END CERTIFICATE-----
2 s:/C=US/O=Let's Encrypt/CN=R3
i:/C=US/O=Internet Security Research Group/CN=ISRG Root X1
-----BEGIN CERTIFICATE-----
nLRbwHOoq7hHwg==
-----END CERTIFICATE-----
Server certificate
subject=/CN=domain.com
issuer=/C=US/O=Let's Encrypt/CN=R3
No client certificate CA names sent
SSL handshake has read 4463 bytes and written 447 bytes
New, TLSv1/SSLv3, Cipher is ECDHE-RSA-AES128-GCM-SHA256
Server public key is 2048 bit
Secure Renegotiation IS supported
Compression: NONE
Expansion: NONE
SSL-Session:
Protocol : TLSv1.2
Cipher : ECDHE-RSA-AES128-GCM-SHA256
Session-ID:
Session-ID-ctx:
Master-Key: 584D837005A1D1B76A20154CC6B2C75AFE7D4392212DB2
Key-Arg : None
PSK identity: None
PSK identity hint: None
SRP username: None
Start Time: 1640614264
Timeout : 300 (sec)
Verify return code: 0 (ok)
Thanks for your help.