Guest User!

You are not Sophos Staff.

This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

Let's Encrypt Root Zertifikat gültig bis 30.09.2021 (alte R3 / X3 Zertifikatskette)

Auf einigen UTMs werden immer noch neue Let's Encrypt Zertifikate erneuert / neu ausgestellt mit der alten R3 / X3 Root Zertifikatskette.

Das heißt diese sind ab morgen nicht mehr gültig.

Deaktivieren und aktivieren von Let's Encrypt hilft hier nicht.

Weiß jemand, wie man die UTM dazu bringt auf das X1 Zertifikat zu wechseln? 

Gruß Volker



This thread was automatically locked due to age.
  • "certificate has expired"  

    an example:

    certificate has expired
    Subject
    /CN=freckle.com
    Issuer
    /C=US/O=Let's Encrypt/CN=R3
    I have been putting them all in exception lists to skip ssl scan 
    (Entschuldigung für die Veröffentlichung auf Englisch. Mein Deutschtraining ist lange her)
  • I have the same issue, even after following what nfawcett said.

    While trying to retrieve the URL:
    Status
    certificate has expired
    Subject
    /CN=*.cnet.com
    Issuer
    /C=US/O=Let's Encrypt/CN=R3
    SHA1 Fingerprint
    39:E8:5B:A8:37:CA:42:FF:A8:AF:84:10:A9:11:C1:4B:4A:70:04:4C
    MD5 Fingerprint
    A5:62:51:57:C5:B5:5C:51:C2:FC:C3:2D:A3:6F:C5:55
    Valid from
    Sep 2 19:44:20 2021 GMT
    Valid until
    Dec 1 19:44:19 2021 GMT
  • check intermediate certificate. By whom it has been issued?

  • Disabling Digital Signature Trust Co. DST Root CA X3 and then turning the web filter off and then back on fixed the issue for me.

  • I did not delete or manually download any CAs.  The expired CA was replaced in our AWS instance with a cadata pattern update at 22:37 CDT (UTC-0500) on 30 September.  My lab UTM was updated 3 minutes later.  It was still necessary to restart the Proxy.  You can disable/enable Web Filtering in WebAdmin or run the following command as root:

         /var/mdw/scripts/httpproxy restart

    If you're in the Americas and you want to see if your UTM was updated.

        zgrep 'package="cadata"' /var/log/up2date/2021/09/up2date-2021-09-30.log.gz

    In the rest of the world, I suspect it would be:

        zgrep 'package="cadata"' /var/log/up2date/2021/10/up2date-2021-10-01.log.gz

    Cheers und MfG - Bob

     
    Sophos UTM Community Moderator
    Sophos Certified Architect - UTM
    Sophos Certified Engineer - XG
    Gold Solution Partner since 2005
    MediaSoft, Inc. USA
  • Hallo, selbst nachdem ich das R3 entfernt habe, das X3 automatisch gelöscht wurde und die UTM neugestartet wurde, gibt die UTM WAF (reverse proxy) immer noch den alten Pfad mit aus.

    www.ssllabs.com:

    Certification Paths
    Path #1: Trusted
    1 Sent by server xxx.domain.com
    Fingerprint SHA256: c6fd72b49484c6124acd17f5bff8d90bf941200e889d67a607511f72ac429dfd
    Pin SHA256: thxSHxnuQfCLGcjZzukPDVgDsYMm8Dc7L6KvNWLdB2I=

    RSA 2048 bits (e 65537) / SHA256withRSA
    2 Sent by server R3
    Fingerprint SHA256: 67add1166b020ae61b8f5fc96813c04c2aa589960796865572a3c7e737613dfd
    Pin SHA256: jQJTbIh0grw0/1TkHSumWb+Fs0Ggogr621gT3PvPKG0=

    RSA 2048 bits (e 65537) / SHA256withRSA
    3 In trust store ISRG Root X1   Self-signed
    Fingerprint SHA256: 96bcec06264976f37460779acf28c5a7cfe8a3c0aae11a8ffcee05c0bddf08c6
    Pin SHA256: C5+lpZ7tcVwmwQIMcRtPbsQtWLABXhQzejna0wHFr8M=

    RSA 4096 bits (e 65537) / SHA256withRSA
    Path #2: Not trusted (invalid certificate [Fingerprint SHA256: 0687260331a72403d909f105e69bcf0d32e1bd2493ffc6d9206d11bcd6770739])
    1 Sent by server xxx.domain.com
    Fingerprint SHA256: c6fd72b49484c6124acd17f5bff8d90bf941200e889d67a607511f72ac429dfd
    Pin SHA256: thxSHxnuQfCLGcjZzukPDVgDsYMm8Dc7L6KvNWLdB2I=

    RSA 2048 bits (e 65537) / SHA256withRSA
    2 Sent by server R3
    Fingerprint SHA256: 67add1166b020ae61b8f5fc96813c04c2aa589960796865572a3c7e737613dfd
    Pin SHA256: jQJTbIh0grw0/1TkHSumWb+Fs0Ggogr621gT3PvPKG0=

    RSA 2048 bits (e 65537) / SHA256withRSA
    3 Sent by server ISRG Root X1
    Fingerprint SHA256: 6d99fb265eb1c5b3744765fcbc648f3cd8e1bffafdc4c2f99b9d47cf7ff1c24f
    Pin SHA256: C5+lpZ7tcVwmwQIMcRtPbsQtWLABXhQzejna0wHFr8M=

    RSA 4096 bits (e 65537) / SHA256withRSA
    4 In trust store DST Root CA X3   Self-signed
    Fingerprint SHA256: 0687260331a72403d909f105e69bcf0d32e1bd2493ffc6d9206d11bcd6770739
    Pin SHA256: Vjs8r4z+80wjNcr1YKepWQboSIRi63WsWXhIMN+eWys=

    RSA 2048 bits (e 65537) / SHA1withRSA
    Valid until: Thu, 30 Sep 2021 14:01:15 UTC
    EXPIRED
    Weak or insecure signature, but no impact on root certificate

    Lösche ich das R3 aus der UTM, wird der Pfad nicht mehr mit ausgegeben aber verschieden Endgeräte können keine vertrauenvolle Verbindung mehr aufbauen.

    Hat dazu jemand eine Lösung ohne die Endgeräte einstellen zu müssen?