-
Notifications
You must be signed in to change notification settings - Fork 336
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
x509: certificate signed by unknown authority #182
Comments
for me |
@extrawurst - unfortunately the |
To add some more context... The Mozilla CA program has been been progressively removing support for the Symantec/GeoTrust certificate authorities since 2017 due to serious shortcomings in the way the CA was operated: Most recently the On 2021-02-02, this change was released to all Ubuntu LTS releases, as part of the regular update of the Debian's equivalent update occurred in: Since https://api.push.apple.com uses For example:
And similarly the official Go docker image (in the case of this tag, based on Debian Buster):
Ideally Apple would stop using a legacy CA that most of the ecosystem no longer trusts. However their docs say:
...which suggests they are aware of the issue, but are still choosing not to update the CA used, presumably for backwards compatibility reasons (eg old clients with an outdated root cert stores or that have unfortunately hardcoded the CA). However now that modern OSes/clients are being affected, perhaps this might nudge them into finally doing the right thing. This issue is affecting Apple Push Notification clients in other languages too, eg: In the meantime the only options for systems where the user doesn't control the root store, are:
Re (1), is there a way for users of |
Having tried After looking at the comments from @edmorley, I ended up looking at Debian Bug 962596 which references installing the missing certificate manually, and provides the following recipe:
The certificate linked above is that which is mentioned in Apple Remote Notification Server documentation. Once done, I can confirm that APNS2 normal processing resumed. Putting thought to @bmueller's specific issue relating to not having sudo access or being able to update the certificates manually, whilst I haven't updated APNS2 to specifically pass in the root certificate as opposed to adding the cert to the server, looking at crypto/tls, I wonder if it may be possible to add the certificate via the |
Thanks @neilmorton. That did the trick, slightly different for Arch and maybe other Linux distros.
|
Good to hear it helped @cenkbilgen. Yes, I should have said that the commands were based on Ubuntu / Debian, so other distros may need tweaking! |
I'd still rather not add this system-wide, even if Apple still trusts it to some extent. But it is works and they are aware of the problem, so more elaborate work-arounds may be unnecessary. |
As per the Apple documentation, they're supporting the GeoTrust certificate only till 29th March 2021 so we need to add both the GeoTrust certificate and the AAACertificateServicesRootCA (Sectigo Portal). Tweaked @neilmorton 's command with the new certs.
|
As it turns out, the Comodo CA will be effective March 29 2021, which is imported by default in the CA certs ( |
Thanks for the update @adityadet . Looks like Apple got onto this later on yesterday and provided the details surrounding their change on 29th March 2021. As you mention, the AAACertificateServicesRootCA (Comodo) is already included in the current CA Certs, so assuming root access is available, adding the GeoTrust Global CA mentioned above as a temporary measure until 29th March 2021 seems to be the only required step in order to maintain service. On the 29th March, once Apple swap to using the AAA Certificate Services root certificate, you can remove the directory |
We needed a solution that worked on App Engine. AFAIK we can't modify the system certs on App Engine. So we extended the RootCAs in Go by overriding the http transport.
Based on code from https://www.tzeejay.com/blog/2021/01/fix-geotrust-apns/ |
getting the below error. Can someone look into the issue [UAT:]> helm version how can we get the tiller-token back if we delete the pod |
@goginenigvk If this issue has just occurred, have you just created new certificates? If so, it may be worth looking at this: https://developer.apple.com/support/expiration/, in particular Apple Push Notification Service SSL Certificates, so see if this is involved. |
Early this morning I started getting "x509: certificate signed by unknown authority" error messages in my console.
After investigating, it appears that a bunch of services (including Heroku, which I use) have started removing the GeoTrust Global CA cert from their root certificates. However, Apple requires the GeoTrust Global CA cert in order to send notifications via tokens.
Is there a workaround for this? Would it be possible to bundle the GeoTrust Global CA cert (https://www.geotrust.com/resources/root_certificates/certificates/GeoTrust_Global_CA.pem) with the client so that everything just works out of the box?
The text was updated successfully, but these errors were encountered: