Bug 1886063
Summary: | Expiring O = Digital Signature Trust Co., CN = DST Root CA X3 | |||
---|---|---|---|---|
Product: | Red Hat Enterprise Linux 8 | Reporter: | Stanislav Zidek <szidek> | |
Component: | ca-certificates | Assignee: | Bob Relyea <rrelyea> | |
Status: | CLOSED CURRENTRELEASE | QA Contact: | Alexander Sosedkin <asosedki> | |
Severity: | low | Docs Contact: | ||
Priority: | low | |||
Version: | 8.6 | CC: | asosedki, cllang, ol+redhat, philipp, ssorce | |
Target Milestone: | rc | Keywords: | Triaged, ZStream | |
Target Release: | 8.7 | |||
Hardware: | Unspecified | |||
OS: | Unspecified | |||
Whiteboard: | ||||
Fixed In Version: | ca-certificates-2022.2.54-80.2.el8_6 | Doc Type: | No Doc Update | |
Doc Text: | Story Points: | --- | ||
Clone Of: | ||||
: | 2118463 (view as bug list) | Environment: | ||
Last Closed: | 2023-06-05 16:22:55 UTC | Type: | Bug | |
Regression: | --- | Mount Type: | --- | |
Documentation: | --- | CRM: | ||
Verified Versions: | Category: | --- | ||
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | ||
Cloudforms Team: | --- | Target Upstream Version: | ||
Embargoed: | ||||
Bug Depends On: | ||||
Bug Blocks: | 2118463 |
Description
Stanislav Zidek
2020-10-07 15:15:48 UTC
This is a known issue and there is no mitigation: https://letsencrypt.org/docs/dst-root-ca-x3-expiration-september-2021/ (In reply to Philip Prindeville from comment #1) > This is a known issue and there is no mitigation: > > https://letsencrypt.org/docs/dst-root-ca-x3-expiration-september-2021/ Does this mean that this cert should be removed completely? (In reply to Oleg Girko from comment #2) > (In reply to Philip Prindeville from comment #1) > > This is a known issue and there is no mitigation: > > > > https://letsencrypt.org/docs/dst-root-ca-x3-expiration-september-2021/ > > Does this mean that this cert should be removed completely? No. Cutting & pasting from the above article: "DST Root CA X3 will expire on September 30, 2021. That means those older devices that don’t trust ISRG Root X1 will start getting certificate warnings when visiting sites that use Let’s Encrypt certificates. There’s one important exception: older Android devices that don’t trust ISRG Root X1 will continue to work with Let’s Encrypt, thanks to a special cross-sign from DST Root CA X3 that extends past that root’s expiration. This exception only works for Android." If you do remove it, certain old Android devices won't work. And newer devices, that use the first path, don't need the cross-signing anyway and aren't bothered by the expired certificate. So it does no harm to leave it in place... and provides continuity for older devices that won't be updated. If you are using older versions of openssl, then removing the cert makes things better. We actually removed the cert from RHEL-6 and RHEL-7 databases because they are running the older version of openssl. The cert will get removed from the root store naturally in the next update. If you want to explicitly remove it now, it should do no harm. The Android description applies to android's root store. There's a separate issue of whether or not not include the intermediate certificate signed by this root cert in your server chain. That's a configuration of your webserver and independent of the ca-certificate root store. I'll refer you to the article on how to decide whether or not to include the intermediate certificate in your server's certificate chain. In general this sort of notification is mostly for issues with openssl on RHEL-6 and RHEL-7. Modern openssl is more tolerant of multiple chain paths with one path having expired certificates. bob RHEL 8.7 contains ca-certificates-2022.2.54-80.2.el8_6. |