TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

RHEL/CentOS 7 Fix for Let’s Encrypt Change

47 pointsby cjgover 3 years ago

3 comments

tialaramexover 3 years ago
It&#x27;s interesting that Ubuntu and RHEL went with very different choices here. Ubuntu decided to patch OpenSSL, so this means if you&#x27;re relying on the old behaviour (weird, but certainly possible) that&#x27;s an unexpected change. RHEL decided to explicitly remove trust in DST Root CA X3 even though it isn&#x27;t actually expired quite yet, which seems less likely to have surprising consequences but does involve taking a patch to the upstream although likely that patch gets removed in a month or two when upstream removes this expired root CA.<p>On the surface the Ubuntu plan is riskier, but, it also carries a richer reward. The old OpenSSL behaviour is silly, even if you wanted that, wanting it is silly, and most likely you had no idea it does this so changing it just makes the library do what you assumed it already did. Ubuntu may eat a handful of &quot;Why did you break our weird software?&quot; tickets now, but avoid several more of these incidents for long-term support over coming months and years, depending on how willing they are to support these older systems for $$$.<p>For admins who have frequent patching either mean it&#x27;s less likely they run into trouble later this week, and even if they don&#x27;t patch production (a reasonable caution) knowing that this fix worked in non-production and is available means it&#x27;s a shorter route from &quot;it broke&quot; to &quot;we applied the patch and fixed it&quot; when it does blow up.
评论 #28681923 未加载
geocrasherover 3 years ago
It&#x27;s resolved. Update to<p>ca-certificates-2021.2.50-72.el7_9.noarch<p>A quick bash command to check if you&#x27;re updated and if not, update:<p><pre><code> rpm -qa | grep ca-certificates-2021.2.50-72.el7_9.noarch || yum update -y ca-certificates</code></pre>
cesarbover 3 years ago
I wonder what effect this will have on non-updated RHEL&#x2F;CentOS 7 installs (for instance, new installs and&#x2F;or new docker&#x2F;podman containers). Do the servers used for the package updates use a certificate chain with this issue, or would a simple &quot;yum update&quot; be enough?