Hurricane Electric's IPv6 Tunnel Broker Forums

Advanced search  

News:

Welcome to Hurricane Electric's Tunnelbroker.net forums!

Author Topic: https://dyn.dns.he.net bad certificate?  (Read 3440 times)

an0nym

  • Newbie
  • *
  • Posts: 3
https://dyn.dns.he.net bad certificate?
« on: December 26, 2015, 02:06:39 PM »

Hi

Since December 25 +- several days certificate of https://dyn.dns.he.net is no longer recognized as valid.

ddclient says
Quote
cannot connect to dyn.dns.he.net:443 socket: SSL connect attempt failed error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed SSL connect attempt failed error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed

curl says
Quote
* Server certificate:
*    subject: CN=dyn.dns.he.net
*    start date: Dec 23 18:48:32 2015 GMT
*    expire date: Dec 22 18:48:32 2017 GMT
*    common name: dyn.dns.he.net
*    issuer: CN=CAcert Class 3 Root,OU=http://www.CAcert.org,O=CAcert Inc.
* NSS error -8179 (SEC_ERROR_UNKNOWN_ISSUER)
* Peer's Certificate issuer is not recognized.

openssl says
Quote
$ openssl s_client -showcerts -host dyn.dns.he.net -port 443 </dev/null | openssl x509 -outform PEM
depth=0 CN = dyn.dns.he.net
verify error:num=20:unable to get local issuer certificate
verify return:1
depth=0 CN = dyn.dns.he.net
verify error:num=21:unable to verify the first certificate
verify return:1
DONE

Manually trusting the certificate does not help (Fedora 23)
Quote
openssl s_client -showcerts -host dyn.dns.he.net -port 443 </dev/null | openssl x509 -outform PEM >/etc/pki/ca-trust/source/anchors/dyn.dns.he.net.pem
update-ca-trust extract
I've done it for the previous certificate and it worked. Now it doesn't.

It seems new certificate has been issued on December 23. Has it been setup right?

Could you help me make ddclient work again over ssl?
« Last Edit: December 26, 2015, 02:09:29 PM by an0nym »
Logged

lordvader

  • Newbie
  • *
  • Posts: 5
Re: https://dyn.dns.he.net bad certificate?
« Reply #1 on: December 29, 2015, 10:47:15 AM »

I think it's impossible to use self-signed certificate to establish secure connection since they have renewed the certificate.
I can only avoid this problem by using parameter --inscure (or -k) with curl.

Why don't HE.net use authorized certificate on the dynamic DNS updater server?
Have no idea why they only use self-signed certificate on it.
« Last Edit: December 29, 2015, 10:55:21 AM by lordvader »
Logged

an0nym

  • Newbie
  • *
  • Posts: 3
Re: https://dyn.dns.he.net bad certificate?
« Reply #2 on: December 29, 2015, 11:31:28 AM »

At the moment the certificate is not self signed. It is signed by authority not trusted anymore. (Not that it makes big difference.)

The problem is for some reason one cannot force trust it now. It worked prior to reissue on December 23. Now it does not.
« Last Edit: December 29, 2015, 11:33:17 AM by an0nym »
Logged

lordvader

  • Newbie
  • *
  • Posts: 5
Re: https://dyn.dns.he.net bad certificate?
« Reply #3 on: January 02, 2016, 05:35:04 AM »

I just dumped the root cert that I couldn't dump before from dyn.dns.he.net.
Now, I can update my DDNS records in secure connection with it.
If anyone want to dump the cert by self, use openssl with option "-showcerts".
Or download it from cacert.org (Class 1 PKI Key).

Supposing HE.net has updated it with cacert.org signed, Thanks a lot!!
And Happy New Year to everyone read this thread ;p

Code: [Select]
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
« Last Edit: January 02, 2016, 05:39:04 AM by lordvader »
Logged