| Summary: | rootcerts contains an expired CA that stops IPSec VPN from working. | ||
|---|---|---|---|
| Product: | Mageia | Reporter: | Zombie Ryushu <zombie_ryushu> |
| Component: | RPM Packages | Assignee: | All Packagers <pkg-bugs> |
| Status: | RESOLVED INVALID | QA Contact: | |
| Severity: | normal | ||
| Priority: | Normal | CC: | davidwhodgins, luigiwalser |
| Version: | 8 | ||
| Target Milestone: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| URL: | https://www.ssl.com/blogs/addtrust-external-ca-root-expired-may-30-2020/ | ||
| Whiteboard: | |||
| Source RPM: | rootcerts-20210223.00-1.mga8.src.rpm | CVE: | |
| Status comment: | |||
|
Description
Zombie Ryushu
2021-04-11 20:19:18 CEST
Thank you for this report, which we take as "rootcerts [] contains an expired [certificate]. I use ..." Rootcerts has no dedicated maintainer, so assigning this bug globally; CC'ing DavidW who has most to do with it. CC:
(none) =>
luigiwalser If your VPN's TLS certificate is signed by an expired CA cert, then you need to report it to the administrators of your VPN to fix their cert. Our rootcerts are current. Note that removing the CA cert won't fix anything for you, it would just change the problem from expired to unrecognized. Status:
NEW =>
RESOLVED It's not that simple. See the url above which links to the fix at https://access.redhat.com/articles/5117881 CC:
(none) =>
davidwhodgins Meant to reopen too. Resolution:
INVALID =>
(none) Those are not actions to be taken by the packagers. Resolution:
(none) =>
INVALID I've tried to fix it the way described by RedHat, even using Root Access the faulty Cert breaking the chain of trust persists. Resolution:
INVALID =>
(none) Because your VPN provider needs to fix it. Status:
REOPENED =>
RESOLVED |