On Thu, Feb 03, 2022 at 06:51:09PM +0100, Matus UHLAR - fantomas wrote:
sorry, the third one is not expired:

        Issuer: O = Digital Signature Trust Co., CN = DST Root CA X3
        Validity
            Not Before: Jan 20 19:14:03 2021 GMT
            Not After : Sep 30 18:14:03 2024 GMT
        Subject: C = US, O = Internet Security Research Group, CN = ISRG Root X1

the root that signs it is expired:

        Issuer: O = Digital Signature Trust Co., CN = DST Root CA X3
        Validity
            Not Before: Sep 30 21:12:19 2000 GMT
            Not After : Sep 30 14:01:15 2021 GMT
        Subject: O = Digital Signature Trust Co., CN = DST Root CA X3

I was writing from memory.

On 03.02.22 12:55, Viktor Dukhovni wrote:
Yes, most systems (other than ancient Android systems) are expected to
have the ISRG root in place, and prefer it to the cross-cert in the
chain.

Since MTAs (at least on port 25) are not typically serving old Android
phones as clients, one might consider configuring the ACME client to
build a chain anchored at the ISRG root, without the DST cross-cert.

...and it's possible that some clients/checkers complain beause of DST root
being expired (the last intermediate certificate is signed by expired CA)

--
Matus UHLAR - fantomas, uh...@fantomas.sk ; http://www.fantomas.sk/
Warning: I wish NOT to receive e-mail advertising to this address.
Varovanie: na tuto adresu chcem NEDOSTAVAT akukolvek reklamnu postu.
Fighting for peace is like fucking for virginity...

Reply via email to