Right, Firefox and Chrome do use AIAs. I wish they wouldn't...

--
 Sent from a phone, apologies for poor formatting.

On 9 December 2024 14:45:04 Theo Buehler <t...@theobuehler.org> wrote:

On Mon, Dec 09, 2024 at 02:21:41PM +0000, Stuart Cassoff wrote:
$ cd /usr/ports/x11/dbus-tcl && make fetch
===>  Checking files for dbus-tcl-3.1
>> Fetch https://chiselapp.com/user/schelte/repository/dbus/uv/dbus-3.1.tar.gz
TLS handshake failure: certificate verification failed: unable to get local issuer certificate
>> Fetch https://ftp.openbsd.org/pub/OpenBSD/distfiles/dbus-3.1.tar.gz
dbus-3.1.tar.gz
100% | ***********************************************************************************************| 158 KB 00:00


As you can see from the output of openssl s_client -connect chiselapp.com:433,
it sends the wrong intermediate in its cert chain:

Certificate chain
0 s:/CN=chiselapp.com
  i:/C=US/O=Let's Encrypt/CN=R10
1 s:/C=US/O=Let's Encrypt/CN=R11
  i:/C=US/O=Internet Security Research Group/CN=ISRG Root X1
2 s:/C=US/O=Internet Security Research Group/CN=ISRG Root X1
  i:/C=US/O=Internet Security Research Group/CN=ISRG Root X1

The issuer of cert 0 is R10, but it sends R11.

This should be fixed by the server operator.

The site has a valid Letsencrypt cert, according to Firefox and Chrome.

The cert is indeed valid if you have R10 available.

I suspect chrome and firefox have the LE intermediates baked in (or go
fetch it from the Authority Info Access extension) so as to be able to
cope with such misconfigurations.

I could add this to the port:
FETCH_CMD = /usr/bin/ftp -V ${_PROGRESS} -C -S dont
But I doubt that's recommended or desired.

Any help with this would be greatly appreciated.


Stu


Reply via email to