mirror of
https://github.com/nsupdate-info/nsupdate.info.git
synced 2026-04-25 08:35:56 +03:00
[GH-ISSUE #285] gentoo & startssl troubles, use letsencrypt certificate #227
Labels
No labels
bug
bug
duplicate
easy
easy
enhancement
enhancement
invalid
needs help
pull-request
scalability
security
task
urgent
wontfix
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
starred/nsupdate.info-nsupdate-info#227
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @ThomasWaldmann on GitHub (Nov 21, 2016).
Original GitHub issue: https://github.com/nsupdate-info/nsupdate.info/issues/285
Originally assigned to: @ThomasWaldmann on GitHub.
I got notified that gentoo removed the root cert of startssl, making TLS connections to nsupdate.info fail.
We should use letsencrypt certificates.
@ThomasWaldmann commented on GitHub (Nov 21, 2016):
It's planned to move nsupdate.info service to a new server, but the precise date is unknown yet.
On that server, we'll also use letsencrypt certificates for nsupdate.info, if possible.
About gentoo's timing: it is known that startssl/wosign is on the way out, but until today I thought there is a gradual deprecation, first hitting all NEW certs (does not apply for us), then also the expiring certs (next year for us). So, gentoo was maybe a bit too quick / radical with this.
Workarounds for gentoo users might be:
@bonki commented on GitHub (Nov 21, 2016):
Thanks for posting, we can continue this here :)
More specifically, it's
ca-certificates-20160104.3.27.1-r2which removed the StartCom and WoSign CAs from Gentoo unstable (bug #598072). TheUSEflaginsecure_certsallows for them to be installed for now, i.e. if you trust the CAs something along the lines ofreinstalls all certificates and temporarily "fixes" the problem.
I agree that this was a hasty decision to make. Google and Mozilla provide more information on the matter and describe the actions they are taking here and here.
There is one paragraph (quoting Google) I don't really understand, though (emphasis mine):
The way I read it this means that even certificates issued before the cut-off date (October 21, 2016) might be subject to not being trusted in Chrome 56 any longer.
Obviously, I'd rather see us transition sooner than later.
@ThomasWaldmann commented on GitHub (Jan 20, 2017):
I just switched https://nsupdate.info/ service to a Let's Encrypt certificate, thus the cert problem is solved.
The server move is still pending, but will also happen soon.
@ThomasWaldmann commented on GitHub (Jan 20, 2017):
As a side note:
We could not offer donations while using StartSSL for-free certificate (due to their very restrictive definition of non-commercial-only usage).
Thus I reenabled donations now, see the site footer.