-
Notifications
You must be signed in to change notification settings - Fork 824
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Support --preferred-chain certbot option #695
Comments
Hi. First thing first, thanks for warning us about this change. As mentioned in the
As you're aware of, this project does not use kuba/simp_le has been abandoned by its creator for years, the currently maintained fork (and the one used by |
Thanks for the response. I've opened an issue on zenhack's repo. Regarding the urgency: January 11th is when they will switch the default Intermediate to E1 which is no longer signed by Identrust. This will be a big deal for many people, but they say that the R3 Intermediate will still be an option (via In the coming week they are switching from X3 to R3. The latter is still signed by both Identrust and ISRG so in theory it has the same backwards compatibility. What they have not stated is which of those two trust chains will be used by default and end up in our Update: I asked Let's Encrypt and got a great response. Sounds like everything should keep working as is until January 11th. At that point we do need a way to select which intermediate to use. |
@lukecyca the featured has been added to the
The |
I pulled the acme.sh image and tested it out. I can see with DEBUG=1 that it correctly calls acme.sh with ... Indeed, acme.sh#3252 describes what I'm seeing. It fetches both chains, but puts the ISRG one in In any case it looks like this repo is doing the right thing now, so this issue can probably be closed. |
Looks like you experienced the same results as me and were equally confused. 😅 |
@lukecyca I pushed another version of |
I updated the image, and verified that the Forced renewal. Verified the acme.sh parameters in the debug output:
The result was exactly the same as before. The intermediate cert that gets included in Edit: Looks like acme.sh has confirmed this as a bug and is working on it. Let's track that and once they have a fix perhaps you can pull that into your acmesh branch and I will re-test. Thanks for all your help BTW! |
The issue is supposed to be fixed in the |
I'm hitting API limits from all this testing, so I'll try again in a day or two. |
I pulled the latest image and did Their fix was in this commit so I manually went into my container and verified that it does indeed have that change. So I can be sure I was testing with this fix. |
I'm not sure where to go from here. :( I guess just trace through what's different between proxy-companion and using acme.sh natively. @Neilpang are you able to offer any suggestions? Can you see our problem from the log file I emailed you? |
From what I recall from my tests two weeks ago I'm starting to doubt that the The flag parameter is the only one to be passed to if [[ "$acme_preferred_chain" != "<no value>" ]]; then
# Using amce.sh --preferred-chain to select alternate chain.
params_issue_arr+=(--preferred-chain "\"$acme_preferred_chain\"")
fi |
I pushed yet another version of the |
I just emailed you my logs of my last couple attempts earlier today. I tried both I will try your latest image next. |
It works! 🎉 Your latest image works for me with with Thanks for all of your help with this. Let me know if there's anything I can do to help get the acmesh branch tested and ready for release. |
@lukecyca just to be sure : do you confirm that the feature work correctly with |
I ran the following three tests over the last hour:
👍 Everything looks good to me. Thank you for all your effort on this. |
Works fine on my side too. I tried to set Many thanks for this feature 🙏 |
Let's Encrypt is changing the default chain of trust (details), which has wide implications for backwards compatibility for clients with old CA root stores. Certbot now supports specifying
--preferred-chain
so that we can manage this transition (details).The first part of this transition is going to occur in less than a week, or as soon as they receive their cross-signature from IdentTrust for the new "R3" Intermediate. So this is very time sensitive.
Is it possible to specify
--preferred-chain
in letsencrypt-nginx-proxy-companion currently? Is there a way to override the certbot parameters that are used in order to include this?Can we add a LETSENCRYPT_PREFERRED_CHAIN environment variable so that this can be selected on a per-container basis?
The text was updated successfully, but these errors were encountered: