My domain is: broker.avasmartgardens.com
I ran this command:
openssl s_client -connect broker.avasmartgardens.com:8883 -servername broker.avasmartgardens.com
It produced this output:
CONNECTED(00000003)
depth=2 C = US, O = Internet Security Research Group, CN = ISRG Root X1
verify return:1
depth=1 C = US, O = Let's Encrypt, CN = R3
verify return:1
depth=0 CN = broker.avasmartgardens.com
verify return:1
---
Certificate chain
0 s:CN = broker.avasmartgardens.com
i:C = US, O = Let's Encrypt, CN = R3
1 s:C = US, O = Let's Encrypt, CN = R3
i:C = US, O = Internet Security Research Group, CN = ISRG Root X1
2 s:C = US, O = Internet Security Research Group, CN = ISRG Root X1
i:O = Digital Signature Trust Co., CN = DST Root CA X3
---
Server certificate
-----BEGIN CERTIFICATE-----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==
-----END CERTIFICATE-----
subject=CN = broker.avasmartgardens.com
issuer=C = US, O = Let's Encrypt, CN = R3
---
No client certificate CA names sent
Peer signing digest: SHA512
Peer signature type: RSA
Server Temp Key: ECDH, P-256, 256 bits
---
SSL handshake has read 4720 bytes and written 444 bytes
Verification: OK
---
New, TLSv1.2, Cipher is ECDHE-RSA-AES256-GCM-SHA384
Server public key is 2048 bit
Secure Renegotiation IS supported
Compression: NONE
Expansion: NONE
No ALPN negotiated
SSL-Session:
Protocol : TLSv1.2
Cipher : ECDHE-RSA-AES256-GCM-SHA384
Session-ID: 59D8F8827A405D5520283F2F92A6B05CCB295BD15E7CFC1F74F2C128B03C551A
Session-ID-ctx:
Master-Key: 2F477317B348CC123E20E35A9809A3A2C54AF54053C5B54A7AE6EBDDF58DA60A957E934EEB0E7491437AD28979CEFBD1
PSK identity: None
PSK identity hint: None
SRP username: None
TLS session ticket lifetime hint: 300 (seconds)
TLS session ticket:
0000 - 00 40 87 85 cd 61 87 fa-14 81 2a 87 7d 79 d6 58 .@...a....*.}y.X
0010 - 55 2c b8 67 f7 7a 52 89-bf 6e 3b 69 97 72 10 c3 U,.g.zR..n;i.r..
0020 - ca 16 bd 78 69 6a 17 49-53 e2 35 d1 cd 33 0e 2b ...xij.IS.5..3.+
0030 - db 39 42 15 23 32 48 23-27 d0 48 03 26 ee eb 15 .9B.#2H#'.H.&...
0040 - 24 cd ec 83 e6 cb 5f f4-8a 0e ba c9 61 bc f6 c2 $....._.....a...
0050 - b0 2c 72 fb 18 be 29 60-79 22 68 44 93 0d b8 49 .,r...)`y"hD...I
0060 - c9 68 60 d9 e8 18 ec 5b-99 ee b3 7f 7b 03 da c5 .h`....[....{...
0070 - 07 d6 73 65 b3 bf 32 ae-01 23 56 44 04 95 d5 15 ..se..2..#VD....
0080 - 56 68 78 50 98 17 d8 08-36 cb 76 74 c3 b1 d9 b4 VhxP....6.vt....
0090 - 27 5b 0d 89 b9 1c 23 5e-d4 39 c2 93 e0 4b ca 70 '[....#^.9...K.p
00a0 - 0b 9d ce c5 48 56 9b 72-6b 0b 97 06 f3 5b 8a fc ....HV.rk....[..
00b0 - ce 2b 3d 0f 42 9a ab 68-1d 39 61 47 e6 c8 24 44 .+=.B..h.9aG..$D
Start Time: 1634171952
Timeout : 7200 (sec)
Verify return code: 0 (ok)
Extended master secret: no
---
closed
The operating system my web server runs on is (include version): Ubuntu 16.04
My hosting provider, if applicable, is: AWS EC2
I can login to a root shell on my machine: yes
I'm using a control panel to manage my site: no
The version of my client is (e.g. output of certbot --version
or certbot-auto --version
if you're using Certbot): 0.33
Hello, we are running an mosquitto MQTT broker service at broker.avasmartgardens.com running on port 8883 that was setup by a dev that is no longer with us. It was recently brought to our attention that communication went down and it was due to the DST Root CA X3 cert expiring. I've looked in our mosquitto config file and have found the .pem files that it is using for tls. I've attempted to renew the certificates using certbot, but am still getting the same errors regarding the certificate being expired.
I've attempted to remove the last certificate in the fullchain.pem file that is referenced by the mosquitto conf per this: post but when running the same above command I get an unknown ca error.
The openssl version running on the server is 1.0.2g-1ubuntu4.20
Any ideas of what I can try to do to fix this issue?
Thank you
Error logs from the mosquitto service:
1634172930: New connection from 73.53.67.25 on port 8883.
1634172930: OpenSSL Error: error:14094415:SSL routines:ssl3_read_bytes:sslv3 alert certificate expired
1634172930: OpenSSL Error: error:140940E5:SSL routines:ssl3_read_bytes:ssl handshake failure
Resources: