On 2/3/22 15:42, Matus UHLAR - fantomas wrote:
it might be this:

% openssl s_client -connect darwin.bork.org:25 -starttls smtp
CONNECTED(00000003)
depth=2 C = US, O = Internet Security Research Group, CN = ISRG Root X1
verify return:1
depth=1 C = US, O = Let's Encrypt, CN = R3
verify return:1
depth=0 CN = darwin.bork.org
verify return:1
---
Certificate chain
0 s:CN = darwin.bork.org
   i:C = US, O = Let's Encrypt, CN = R3
1 s:C = US, O = Let's Encrypt, CN = R3
   i:C = US, O = Internet Security Research Group, CN = ISRG Root X1
2 s:C = US, O = Internet Security Research Group, CN = ISRG Root X1
   i:O = Digital Signature Trust Co., CN = DST Root CA X3

the third certificate is expired, but the second one is already trusted by
root CA, so the third should not be evaluated.

See:
 https://letsencrypt.org/2021/10/01/cert-chaining-help.html

With the workarounds at:
 https://www.openssl.org/blog/blog/2021/09/13/LetsEncryptRootCertExpire/

Best,
Patrick

Reply via email to