Yes - look like it is for slightly different reasons. Apple have decided
on a new policy for verifying certificates and the certificate must have
either two (younger certs) or three (older certs) valid SCTs. I suspect
that you could re-issue your cert to comply with this, but I am not sure
about your mechanism for this. It seems though that even if Go 1.18 was
patched to let such a failure through - and it isn’t clear that it should
be, as per the TODO - that it would not help with AWS as it seems that they
don’t have ANY SCTs in their certificates. AWS will have have to re-issue
probably all their certificates, which leaves some of us a bit screwed for
a while.

This isn’t my area of expertise, but it seems that perhaps Apple have been
a bit too aggressive on this. I hazard a guess that what they have
implemented is likely correct, but if a company such as Apple makes such a
change, I think they should have made more noise about it, so that other
companies knew about the change.

So, a combination of OSX 12.3 with Go 1.18 will trigger this, unless you
have the ability to re-issue certificates with the requisite number of
SCTs. I have no control over most AWS certificates - they are issued by
AWS, for AWS. So now, I will have to ask AWS if they can do anything about
it. But I can’t see them re-issuing certificates for all their myriad
services, overnight.

Jim

PS: I quote the ticket you raised, in case it is useful to others:

https://github.com/golang/go/issues/51991


On Mar 29, 2022 at 2:48:34 AM, Davanum Srinivas <dava...@gmail.com> wrote:

> Jim,
>
> Looks like we ended up seeing the same problem in a kubernetes test case
> as well:
> https://github.com/kubernetes/kubernetes/issues/108956
>
> -- Dims
>
> On Thu, Mar 24, 2022 at 2:09 AM Jim Idle <j...@idle.ws> wrote:
>
>> Having just upgraded to 1.18, I find that quite a few encrypted
>> connections, for instance https to a Neptune instance on AWS, now fail with:
>>
>> x509: “*.xxxxxxxxx.neptune.amazonaws.com” certificate is not standards
>> compliant
>>
>> It seems to be related to this comment:
>>
>>
>> https://cs.opensource.google/go/go/+/master:src/crypto/x509/root_darwin.go;l=52
>>
>> I don’t immediately see anything on how to get around this via google
>> searches, though I see some changelists concerning x509 for 1.18. I am not
>> able to change the Neptune certificate, which may indeed not be quite
>> standards compliant, as the error message suggests. However, it is not just
>> Neptune - I see some people having issues with redid for instance.
>>
>> Apologies if this has been addressed somewhere that I have not found.
>> Perhaps with more time, I will find some workaround or solution, but I
>> thought asking here may help.
>>
>> Any input/workarounds appreciated, as well as any insight into the reason
>> for change.
>>
>> Jim
>>
>> --
>> You received this message because you are subscribed to the Google Groups
>> "golang-nuts" group.
>> To unsubscribe from this group and stop receiving emails from it, send an
>> email to golang-nuts+unsubscr...@googlegroups.com.
>> To view this discussion on the web visit
>> https://groups.google.com/d/msgid/golang-nuts/CAGPPfg-PtW7dqeNKo72fvLsLZ1Qg2i_AwmUBJcTGMNgeHUhfCA%40mail.gmail.com
>> <https://groups.google.com/d/msgid/golang-nuts/CAGPPfg-PtW7dqeNKo72fvLsLZ1Qg2i_AwmUBJcTGMNgeHUhfCA%40mail.gmail.com?utm_medium=email&utm_source=footer>
>> .
>>
>
>
> --
> Davanum Srinivas :: https://twitter.com/dims
>

-- 
You received this message because you are subscribed to the Google Groups 
"golang-nuts" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to golang-nuts+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/golang-nuts/CAGPPfg_FTFPLk6Rq577YFLNK_3D8qYWdkDhDQgzRjfOTqhMbBw%40mail.gmail.com.

Reply via email to