Control: tag -1 moreinfo

Hi Jonas,

On Sat, 04 Apr 2020 at 20:18:28 +0200, Jonas Smedegaard wrote:
> C = US, O = Let's Encrypt, CN = Let's Encrypt Authority X3
> error 2 at 1 depth lookup: unable to get issuer certificate
> [live] Error: Received invalid X.509 certificate from ACME server!

This indicates that the received X.509 certificate isn't signed by the
CA specified as ‘CAfile’.  More precisely, that

    openssl verify -CAfile $CAfile -purpose sslserver -x509_strict 
</path/to/cert

has a non-0 exit status.  The default value for ‘CAfile’ is the lacme-
provided cross signed chain /usr/share/lacme/lets-encrypt-x3-cross-signed.pem ,
did you perhaps set it to something else?  I'm not familiar with
verify(1ssl) error messages but it suggests that the the CA file doesn't
contain the full chain.

Works for me with the default ‘CAfile’ value, at least:

    $ curl -s 
https://acme-v02.api.letsencrypt.org/acme/cert/036c9c4c3720c2241c7f32cb5920470555db
 \
      | openssl verify -CAfile 
/usr/share/lacme/lets-encrypt-x3-cross-signed.pem -purpose sslserver 
-x509_strict
    stdin: OK

Does this command work on your system?  I've not been able to reproduce
the “error 2 at 1 depth lookup” error, but for a completely different CA
verify(1ssl) fails with:

    $ curl -s 
https://acme-v02.api.letsencrypt.org/acme/cert/036c9c4c3720c2241c7f32cb5920470555db
 \
      | openssl verify -CAfile 
/usr/share/lacme/lets-encrypt-x1-cross-signed.pem -purpose sslserver 
-x509_strict
    CN = live.homebase.dk
    error 20 at 0 depth lookup: unable to get local issuer certificate
    error stdin: verification failed

(Adding --debug will indicate the exact `openssl verify -CAfile …` that
fails.)

-- 
Guilhem.

Attachment: signature.asc
Description: PGP signature

Reply via email to