At this point, if I had to guess…
I would say that your system is negotiating via one of the WEAK TLSv1.2 ciphers.
Which means it is unable to do: TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ( 0xc02f )
Please confirm if your system supports that cipher.
[yes, the server cipher ordering could be improved]
There is no way (that I know of) to drop a specific cipher in Chrome anymore; the "--cipher-suite-blacklist" is no longer available and/or you cannot block "whatever you want" (see https://bugs.chromium.org/p/chromium/issues/detail?id=58831). Starting Chrome with "open /Applications/Google\ Chrome.app --args --cipher-suite-blacklist=0x1302" did not work (0x1302 = TLS_AES_256_GCM_SHA384).
Tested on fn.is having working LE certificates, and set TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 as the only cipher on the server (same as being selected on www.finn.no, that does not work). I also set the same ECHD curve (prime256v1) as www.finn.no.
According to ssllabs.com they are now equal;
www.finn.no: TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ( 0xc02f ) ECDH secp256r1 (eq. 3072 bits RSA) FS 128
fn.is: TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ( 0xc02f ) ECDH secp256r1 (eq. 3072 bits RSA) FS 128
However, Chrome detects them as different (even though ssllabs.com identifies them as equal);
www.finn.no: TLS 1.2, ECDHE_RSA, and AES_128_GCM.
fn.is: TLS 1.2, ECDHE_RSA with P-256, and AES_128_GCM.
fn.is works just fine after the changes (but www.finn.no does not).
(I tested with www.finn.no because it’s running TLSv1.2, and not 1.3 as letsencrypt.org does, to get equal testing parameters).
OK, started looking at random websites using LE, and found a site that Chrome uses the same ciphers as letsencrypt.org, that works without issues (in both Chrome and Safari);
Does Safari or something show the Certificate Transparency information for the certificates? To be precise, the two embedded SCTs?
Some or all of the newer certificates you’ve mentioned have embedded SCTs from a newer log – coincidentally, the Oak log run by Let’s Encrypt.
Oak has only been Usable in Google Chrome since version 80, which was released in February, so Let’s Encrypt only started embedding SCTs from it recently.
(Let’s Encrypt uses a number of CT logs. Different certificates may have SCTs from different ones, even if they were issued around the same time.)
However, it has apparently been Usable in Apple’s CT implementation since December 2.
And I believe enforcement is designed to fail open – even if macOS somehow fails to update the list of supported logs for months, I believe it will disable enforcement, not reject good certificates.
I’m proposing this as a theory, but it should not be possible for it to go wrong.
Is there any documentation of what that error message means…?
Let’s Encrypt certificates have two SCTs, unless there is a bug or misconfiguration with the CA software. (The details vary, but browsers and OSes require websites use at least two.)
They will both have timestamps that are about the same – probably milliseconds apart, but Firefox apparently doesn’t show that precision – because Let’s Encrypt gets them simultaneously while issuing the certificate.
It seems suspicious that your Firefox installation shows the name of the second log (Google Xenon) but not the name of the Let’s Encrypt Oak log, suggesting that it doesn’t recognize it.
Edit: Your Safari is also showing the Oak log without a name, but I don’t know if that’s normal.
I checked the certificates on the “working” vs “not working” list I made above, and you are right; every one that fails, has the Oak log.
The question is; why does it work for the certificates that does not have the Oak log? They are also only showing up with one of the SCTs when inspecting the certificate (same as the non-working ones from Oak).
Presumably because the browsers that are not recognising the certificate do not trust Oak as a qualified log for the purposes of satisfying the requirement that all certificates have at least two valid SCTs in order to be considered trusted.
Maybe the January update accidentally reverted to a pre-December version of the CT list? If I remember correctly, that has sometimes happened to other things.
Latest update did not solve it after all. It apparently works for some time after a reboot, and then stops working. I’m not alone anymore either; macOS + Safari certificate weirdness