Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Certificate Expired Error #596

Open
davidstx opened this issue Oct 6, 2021 · 25 comments
Open

Certificate Expired Error #596

davidstx opened this issue Oct 6, 2021 · 25 comments

Comments

@davidstx
Copy link

davidstx commented Oct 6, 2021

I updated the LetsEncrypt certificates on my server, now validate certificate no longer works and I get a certificate expired error

@fribse
Copy link

fribse commented Oct 6, 2021

MQTT Explorer: 0.3.5
Same here. I checked the mosquitto server here with:
openssl s_client -connect <realurl>:8883 2>/dev/null | openssl x509 -noout -dates
And that says the certificate is valid.
Also MQTT Box agrees :-)

@hallard
Copy link

hallard commented Oct 6, 2021

Nice to see I'm not alone, spend lot of time on my config thinking of an issue on docker instance with certificate until I see all is fine except on MQTT Explorer Side. Not sure what changed and why now it does not work either.

openssl s_client -servername broker.mydomain.com -connect broker.mydomain.com:8883 2>/dev/null | openssl x509 -noout -dates
notBefore=Aug 15 17:14:58 2021 GMT
notAfter=Nov 13 17:14:56 2021 GMT

@fribse
Copy link

fribse commented Oct 6, 2021

Mine shows almost the same dates:
notBefore=Aug 18 00:31:25 2021 GMT
notAfter=Nov 16 00:31:23 2021 GMT

@fribse
Copy link

fribse commented Oct 6, 2021

Just saw this:
#593
I guess that's why...

@fribse
Copy link

fribse commented Oct 6, 2021

Well, no, my certificate chain is going to the ISRG root cert, so that's not the case for me :-(

@hallard
Copy link

hallard commented Oct 6, 2021

Same thing here I used my broker certificate and quickly binded it to https (same name of course) with nginx and all is good from browser view.

image

My guess is how the app handle the certificate on client computer.

@DavidPearce
Copy link

DavidPearce commented Oct 9, 2021

Same issue here. I suspect that the MQTT Explorer client uses an internal cert store, rather than Windows wide certs. We had similar issues with a piece of hardware that we make, and in this case, because we also had DST Root CA X3 which had expired, this had to be removed. If the Client does use some internal cert handling, updating from here should fix it: https://curl.se/ca/cacert.pem

@grillp
Copy link

grillp commented Oct 11, 2021

Seems there is a workaround as this is a problem in the electron library that MQTT Explorer uses.

The workaround is to create the certificate again, but tying it to a specific certificate chain using the --preferred-chain "ISRG Root X1" option on certbot (electron/electron#31212 (comment))

e.g.
sudo certbot certonly --nginx -d <domain> --preferred-chain "ISRG Root X1"

I tried that and it solved the problem for me.

@mrkeuz
Copy link

mrkeuz commented Oct 12, 2021

Same issue.
MQTT Explorer: 0.3.5 (snap version)
Ubuntu 20.04.3

Just want upvote.

@konstantin-teplitzky
Copy link

konstantin-teplitzky commented Oct 13, 2021

the same issue
trying to check 0.4.0-beta1 (and is the same)
Linux AppImage version

@urbanze
Copy link

urbanze commented Oct 14, 2021

Same problem here!

@greetclock
Copy link

greetclock commented Oct 27, 2021

That might be relevant for the problem that we have. I use 0.3.5

Update September 30, 2021 As planned, the DST Root CA X3 cross-sign has expired, and we’re now using our own ISRG Root X1 for trust on almost all devices. For more details about the plan, keep reading! We have also updated our Production Chain Changes thread on our community forum - our team and community are here and ready to help with any questions you may have about this expiration.

https://letsencrypt.org/docs/dst-root-ca-x3-expiration-september-2021/

@jceloria
Copy link

jceloria commented Jan 5, 2022

This quick workaround worked for me:
electron/electron#31212 (comment)

@amitrohatgi
Copy link

@jceloria how did you apply the workaround?

@johnceloria
Copy link

I read and comprehended the content in provided link and then took the suggested action? I'm not sure what you're asking me to provide to you.

@amitrohatgi
Copy link

amitrohatgi commented Feb 8, 2022 via email

@johnceloria
Copy link

Right, its a workaround and not a fix.

@marinofra
Copy link

You can download the root certificate from here and add it your connection options via:

  1. Advanced
  2. Certificates
  3. Server Certificate (CA)

Don't forget to save the configuration after testing if it works correctly.

Until the application is updated to a version of Electron where this was patched or the CA gets baked into the code with an hacky workaround, this the only way to fix the problem.

@DavidPearce
Copy link

Thanks marinofra. This worked for me, I can now turn cert validation on again and successfully connect to the affected servers.

@johny-mnemonic
Copy link

@thomasnordquist wouldn't this issue deserve at least a bump of beta version with new electron to fix the cert issue?

@frosty-geek
Copy link

+1

@PhiRie
Copy link

PhiRie commented Jan 23, 2024

Still facing the same issue with version 0.4.0-beta1. Is there any fix planned to use the certificate store of the underlying OS?

@ilgrank
Copy link

ilgrank commented Feb 8, 2024

Just in case someone is expecting help from the Dev: he's not connecting since very long, and as far as we can tell the project is on hold at best.

@PhiRie
Copy link

PhiRie commented Feb 8, 2024

Thx @ilgrank for the info. Sad, because I liked the tool but then I will give MQTTX a try.

@bj00rn
Copy link
Collaborator

bj00rn commented Apr 2, 2024

Electron is upgraded to 29 now, hopefully that will fix it. Im moving slowly to try to break things. I'll try to get a new beta built

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests