Report that: Common name: R3 Organization: Let's Encrypt Location: US Valid from October 7, 2020 to September 29, 2021 Serial Number: 400175048314a4c8218c84a90c16cddf Signature Algorithm: sha256WithRSAEncryption Issuer: DST Root CA X3
Thanks so much for your help.
------ my info --------------
My web server is (include version): kestrel self hosted.
The operating system my web server runs on is: ubuntu 20.04
My hosting provider, if applicable, is: AliCloud
I can login to a root shell on my machine: YES
I'm using a control panel to manage my site: self made CMS.
The version of my client is: Certes.
----- end ---------------
I checked the source of the library I am using and in deed, I found out some hard coded root certificates. They are "isrg-root-x1.pem", "fake-le-root-x1.pem", "dst-root-ca-x3.pem".
I do not know why it need to hard code those, how should I do this? can I get the latest pem file to update?
You really shouldn't be hard-coding the chain. [it can change at any time] Certes should be providing the current chain.
If you can't find it, you can get it online several ways.
One way is using: crt.sh | example.com
Then click the link "Issuer:" (in the "Certificate:" section).
That will show you all the certs issued by that issuer.
Then click the first certificate number.
Then download the "PEM" file version of that cert (bottom left link)