The operating system my web server runs on is (include version): ubuntu 20.04.6 LTS
I can login to a root shell on my machine (yes or no, or I don't know): yes
I'm using a control panel to manage my site (no, or provide the name and version of the control panel): no
The version of my client is (e.g. output of certbot --version or certbot-auto --version if you're using Certbot): 2.6.0
I'm running telegraf to monitor the validity-time of my certificate. Since a while telegraf complains the certificate is not valid anymore. On the telegraf-forum I was told that the expired X3 root was the cause.
This is what telegraf logs :
A chain-checker also reports the legacy chain is used.
I searched to try to remove that X3 root, but I can't find where to configure this. All I find is that nothing has to be done. But still that X3 root appears, the cert is renewed yesterday.
Any help ?
Thanks.
Thanks,
your links enabled me to set the preferred chain to ISRG Root X1. Now I don't see complaints in the log of telegraf anymore.
But can I also conclude from my readings that telegraf is being holier than the pope ?
There is nothing wrong with the long chain that includes DST Root CA X3. In fact this forum uses a cert chain which includes that as do numerous other sites given that it is the default chain.
I got a reply that's not seen here, so I will explain what I did :
In /etc/letsencrypt/renewal/mailbox.de-brouwerij.be.conf (the config-file for my certificate) I added a line after the [renewalparams] : preferred_chain = ISRG Root X1
Well, it is probably not worth the trouble as the chain with DST Root CA X3 will be going away next year anyway so you have just made the change early.
And, plenty of other sites run with the alternate "short chain" like you do now.
The Telegraf problem is they don't recognize that the default "long chain" has two possible paths to a known CA root on your system.
Most modern clients will walk the chain, see the link to ISRG Root X1 and stop as that leads to a known root.
Other clients, like older Android, do not recognize the X1 so look at the next which is link to the DST ... X3 root. These older Android also do not check the expiry so consider this secure. There were a very large number (hundreds of millions I think) of such devices which is why Let's Encrypt provided a solution for them.
Given Let's Encrypt issues around 3 million certs per day and that this longer chain is the default I am surprised Telegraf doesn't handle it better.
But, as I noted in my lead, it's probably not worth the bother trying to improve on their messaging.
SSL Labs shows what I described above well. Path #1 is trusted by any system that knows X1. Path #2 only by clients such as older Android.