-
-
Notifications
You must be signed in to change notification settings - Fork 5.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
CA check reports -635 days #3323
Comments
Edit: nevermind, gitea is not spelled GitTea... |
But that CA is expired, so the server certificate would also reflect expired even though it was issued beyond the expiry date of the CA: This is an old issue, though the article suggests they could be cross-signed so if that is the case perhaps it has to do with the method used to verify it. I can't see the details of the CA nor the intermediates which would have signed this cert. |
I'm getting this too on every HTTPS endpoint I am monitoring with the certificate expiration check enabled. I don't see the point in monitoring the Root CA's expiration by default. That should probably be an advanced option and UptimeKuma really needs to better understand certificate chains / cross signing so these false positives don't happen. edit: if you don't want UptimeKuma to bother checking expiration of the rest of the cert chain you can use this crude hack to stop it from checking
|
It's evidently not a good idea to notify every cert in the chain for expiry. I don't see any other way to fix this then to check each cert against some "trusted roots", and stopping there. |
But testing if the certificate is valid is already being handled, right?
if |
|
Correct, but that should be sufficient. I've never seen an HTTPS monitoring tool try to validate the whole chain's expirations. Typically (IMO) you'll monitor that certificate directly with another mechanism otherwise you just end up with hundreds or thousands of redundant alert notifications when your private CA root is going to be expiring. If e.g., LetsEncrypt's CA is expiring next week, notifying me is rather pointless. If we have to do the CA's job for them we're in a heap of trouble... Anyway, just glad I found a workaround so I can continue experimenting with this software. Thanks, all! |
Note that a TLS CA certificate expiry is only relevant if it's part of the trust chain. In this case, it's not, since there's another CA certificate beside it that has not yet expired. See also: https://letsencrypt.org/certificates/ |
We had to stop the SSL checking of Uptime Kuma as it was completely useless for these Letsencrypt certificates. Would it be possible to simple ignore errors with the "DST Root CA X3" certificate that expires on Seems like that would stop the false alarms for Letsencrypt without having it understand that modern browsers no longer need that certificate. |
Fixed by #3874. |
🛡️ Security Policy
Description
After I updated to
1.22.0
I got a lot of notifications about "expired" CA certificates. My certs are coming from Let's encrypt and they areNot After: Mon, 04 Jun 2035 11:04:38 GMT
.(matrix alert)
I have a few platforms to alert and I got spammed on all channels.
👟 Reproduction steps
I just update, nothing special.
👀 Expected behavior
I don't get notified about expired CA certificate if it's not expired.
😓 Actual Behavior
I got expired CA notification for every single https monitors.
🐻 Uptime-Kuma Version
1.22.0
💻 Operating System and Arch
Ubuntu 20.04
🌐 Browser
N/A
🐋 Docker Version
Docker 20.10.14 + Swarm
🟩 NodeJS Version
I'm using the official docker image
📝 Relevant log output
The text was updated successfully, but these errors were encountered: