From nobody Sun Sep 4 17:44:48 2022 X-Original-To: freebsd-security@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4MLJv75Xnnz4cJdK for ; Sun, 4 Sep 2022 17:44:51 +0000 (UTC) (envelope-from cmt@burggraben.net) Received: from smtp.burggraben.net (smtp.burggraben.net [IPv6:2a01:4f8:140:510a::3]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "smtp.burggraben.net", Issuer "R3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4MLJv70vf1z4308 for ; Sun, 4 Sep 2022 17:44:51 +0000 (UTC) (envelope-from cmt@burggraben.net) Received: from elch.exwg.net (elch.exwg.net [IPv6:2001:470:7120:1:127b:44ff:fe4f:148d]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "elch.exwg.net", Issuer "R3" (not verified)) by smtp.burggraben.net (Postfix) with ESMTPS id D5D25C0031A; Sun, 4 Sep 2022 19:44:48 +0200 (CEST) Received: by elch.exwg.net (Postfix, from userid 1000) id 515443AB1D; Sun, 4 Sep 2022 19:44:48 +0200 (CEST) Date: Sun, 4 Sep 2022 19:44:48 +0200 From: Christoph Moench-Tegeder To: Axel Rau Cc: FreeBSD-security@freebsd.org Subject: Re: pkg 1.18.4 refuses local CAcert on 13.1-RELEASE-p2 Message-ID: References: List-Id: Security issues List-Archive: https://lists.freebsd.org/archives/freebsd-security List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-security@freebsd.org X-BeenThere: freebsd-security@freebsd.org MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline In-Reply-To: User-Agent: Mutt/2.2.7 (2022-08-07) X-Rspamd-Queue-Id: 4MLJv70vf1z4308 X-Spamd-Bar: --- Authentication-Results: mx1.freebsd.org; dkim=none; dmarc=none; spf=pass (mx1.freebsd.org: domain of cmt@burggraben.net designates 2a01:4f8:140:510a::3 as permitted sender) smtp.mailfrom=cmt@burggraben.net X-Spamd-Result: default: False [-3.50 / 15.00]; NEURAL_HAM_LONG(-1.00)[-1.000]; NEURAL_HAM_MEDIUM(-1.00)[-1.000]; NEURAL_HAM_SHORT(-1.00)[-0.998]; RCVD_IN_DNSWL_MED(-0.20)[2a01:4f8:140:510a::3:from]; R_SPF_ALLOW(-0.20)[+ip6:2a01:4f8:140:510a::3]; MIME_GOOD(-0.10)[text/plain]; RCPT_COUNT_TWO(0.00)[2]; MIME_TRACE(0.00)[0:+]; FROM_EQ_ENVFROM(0.00)[]; MLMMJ_DEST(0.00)[FreeBSD-security@freebsd.org]; R_DKIM_NA(0.00)[]; ARC_NA(0.00)[]; RCVD_COUNT_THREE(0.00)[3]; ASN(0.00)[asn:24940, ipnet:2a01:4f8::/32, country:DE]; FREEFALL_USER(0.00)[cmt]; TO_MATCH_ENVRCPT_SOME(0.00)[]; FROM_HAS_DN(0.00)[]; DMARC_NA(0.00)[burggraben.net]; TO_DN_SOME(0.00)[]; RCVD_TLS_LAST(0.00)[] X-ThisMailContainsUnwantedMimeParts: N ## Axel Rau (Axel.Rau@Chaos1.DE): > but openssl verify shows successful verification: > - - - > # openssl s_client -connect some_fqdn:443 -6 -verify_return_error | grep verify > depth=1 some_internal_CA Home-brewed CA? Sure that the extensions have been set correctly? (Most commonly missed/wrong is the CA flag in Basic Constraints). Standard openssl verification is not helpful, you'll need at least "-strict -policy_check". TL;DR: use Let's Encrypt. Regards, Christoph -- Spare Space