[GH-ISSUE #487] OpenWrt ddns-scripts returns error - "Invalid SSL certificate" ? #360

Closed
opened 2026-02-26 10:31:03 +03:00 by kerem · 5 comments
Owner

Originally created by @jaimet on GitHub (Oct 8, 2021).
Original GitHub issue: https://github.com/nsupdate-info/nsupdate.info/issues/487

Hi.

I've recently discovered that the ddns-scripts updater (that I am using in my OpenWrt router) appears to be having problems. I see the following in the syslog:

Thu Oct  7 17:59:51 2021 user.err ddns-scripts[15728]: nsupdateinfo_ipv4: uclient-fetch Error: '5'
Thu Oct  7 17:59:51 2021 user.warn ddns-scripts[15728]: nsupdateinfo_ipv4: Transfer failed - retry 5842/0 in 60 seconds

I think that I have traced the problem back to:

# /bin/uclient-fetch --ca-certificate=/etc/ssl/cert.pem 'https://ipv4.nsupdate.info'
Downloading 'https://ipv4.nsupdate.info'
Connecting to 213.239.209.163:443
Connection error: Invalid SSL certificate

I realise and understand that this is not an OpenWrt support site, but as far as I am aware, I have changed nothing in my router for the past 3 months. Are you aware of any recent changes (with nsupdate.info) that may cause this?

With kind regards, Jaime

Originally created by @jaimet on GitHub (Oct 8, 2021). Original GitHub issue: https://github.com/nsupdate-info/nsupdate.info/issues/487 Hi. I've recently discovered that the ddns-scripts updater (that I am using in my OpenWrt router) appears to be having problems. I see the following in the syslog: ``` Thu Oct 7 17:59:51 2021 user.err ddns-scripts[15728]: nsupdateinfo_ipv4: uclient-fetch Error: '5' Thu Oct 7 17:59:51 2021 user.warn ddns-scripts[15728]: nsupdateinfo_ipv4: Transfer failed - retry 5842/0 in 60 seconds ``` I think that I have traced the problem back to: ``` # /bin/uclient-fetch --ca-certificate=/etc/ssl/cert.pem 'https://ipv4.nsupdate.info' Downloading 'https://ipv4.nsupdate.info' Connecting to 213.239.209.163:443 Connection error: Invalid SSL certificate ``` I realise and understand that this is not an OpenWrt support site, but as far as I am aware, I have changed nothing in my router for the past 3 months. Are you aware of any recent changes (with nsupdate.info) that may cause this? With kind regards, Jaime
kerem closed this issue 2026-02-26 10:31:03 +03:00
Author
Owner

@ThomasWaldmann commented on GitHub (Oct 9, 2021):

You can check our certificate by invoking this url with a browser: it is a letsencrypt cert.

Maybe you need to update your root certificates / ca certificates.

<!-- gh-comment-id:939351375 --> @ThomasWaldmann commented on GitHub (Oct 9, 2021): You can check our certificate by invoking this url with a browser: it is a letsencrypt cert. Maybe you need to update your root certificates / ca certificates.
Author
Owner

@jaimet commented on GitHub (Oct 9, 2021):

Ok. I don't know what url you were referring to, but I triggered/found this during my investigation, and obviously the results indicate that the problem is not with your certificate.

I'm currently using openwrt's latest root certificates / ca certificate package, so I don't think is the cause of the problem. It may be a problem with the new ssl library that I'm using.

I'll close this now, but I am going to keep digging, and I will update this issue with any useful information that I find. Thank you for your reply, but above all, thank you for nsupdate.info. 🙏

<!-- gh-comment-id:939370380 --> @jaimet commented on GitHub (Oct 9, 2021): Ok. I don't know what url you were referring to, but I triggered/found [this](https://www.ssllabs.com/ssltest/analyze.html?d=ipv4.nsupdate.info) during my investigation, and obviously the results indicate that the problem is *not* with your certificate. I'm currently using openwrt's latest [root certificates / ca certificate package](https://openwrt.org/packages/pkgdata/ca-bundle), so I don't think is the cause of the problem. It may be a problem with the [new ssl library](https://openwrt.org/packages/pkgdata/libustream-wolfssl20201210) that I'm using. I'll close this now, but I am going to keep digging, and I will update this issue with any useful information that I find. Thank you for your reply, but above all, thank you for nsupdate.info. :pray:
Author
Owner

@ThomasWaldmann commented on GitHub (Oct 10, 2021):

Looks like you need TLS 1.2 or 1.3 and up-to-date ca certs.

<!-- gh-comment-id:939576053 --> @ThomasWaldmann commented on GitHub (Oct 10, 2021): Looks like you need TLS 1.2 or 1.3 and up-to-date ca certs.
Author
Owner

@jaimet commented on GitHub (Oct 12, 2021):

Found it! It seems that I am not alone. - it is an issue with wolfssl, triggered by the expiration of one of the letsencrypt global root certs. Interestingly, there is no later ca-bundle, presumably because both openssl and mbedTLS can deal correctly with the expiration (by automatically switching to the other certification path). HTH.

<!-- gh-comment-id:941093250 --> @jaimet commented on GitHub (Oct 12, 2021): Found it! [It seems that I am not alone.](https://forum.openwrt.org/t/107891) - it is an issue with wolfssl, triggered by the expiration of one of the letsencrypt global root certs. Interestingly, there is no later ca-bundle, presumably because both openssl and mbedTLS can deal correctly with the expiration (by automatically switching to the other certification path). HTH.
Author
Owner

@ThomasWaldmann commented on GitHub (Oct 13, 2021):

Ah, yeah, that explains it.

<!-- gh-comment-id:941802142 --> @ThomasWaldmann commented on GitHub (Oct 13, 2021): Ah, yeah, that explains it.
Sign in to join this conversation.
No milestone
No project
No assignees
1 participant
Notifications
Due date
The due date is invalid or out of range. Please use the format "yyyy-mm-dd".

No due date set.

Dependencies

No dependencies set.

Reference
starred/nsupdate.info-nsupdate-info#360
No description provided.