Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Server-mode SSL ignores CA cert #280

Closed
dos1 opened this issue Apr 4, 2018 · 0 comments
Closed

Server-mode SSL ignores CA cert #280

dos1 opened this issue Apr 4, 2018 · 0 comments
Labels

Comments

@dos1
Copy link
Contributor

dos1 commented Apr 4, 2018

When I tried to use Let's Encrypt certificate instead of self-signed one with server-mode XMPP frontend, I couldn't get the clients to properly verify the cert.

Turns out the certificate chain as presented by Spectrum is incomplete and contains only the server cert, while it should also present the CA cert if present in the pkcs12, so the intermediate certificate can be verified against the root certs.

Cert on Spectrum's server that fails verification:

CONNECTED(00000003)
depth=0 CN = redacted.domain.com
verify error:num=20:unable to get local issuer certificate
verify return:1
depth=0 CN = redacted.domain.com
verify error:num=21:unable to verify the first certificate
verify return:1
---
Certificate chain
 0 s:/CN=redacted.domain.com
   i:/C=US/O=Let's Encrypt/CN=Let's Encrypt Authority X3
---

Cert on ejabberd, verified correctly:

CONNECTED(00000003)
depth=2 O = Digital Signature Trust Co., CN = DST Root CA X3
verify return:1
depth=1 C = US, O = Let's Encrypt, CN = Let's Encrypt Authority X3
verify return:1
depth=0 CN = redacted.domain.com
verify return:1
---
Certificate chain
 0 s:/CN=redacted.domain.com
   i:/C=US/O=Let's Encrypt/CN=Let's Encrypt Authority X3
 1 s:/C=US/O=Let's Encrypt/CN=Let's Encrypt Authority X3
   i:/O=Digital Signature Trust Co./CN=DST Root CA X3
---
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

No branches or pull requests

2 participants