TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Ask HN: What is going on with SSL certs?

13 点作者 julesie将近 5 年前
I'm suddenly getting SSL errors from unrelated services we use. For example status.algolia.com, Pingdom and others.

4 条评论

cpach将近 5 年前
See this thread: <a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=23362759" rel="nofollow">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=23362759</a>
ivanr将近 5 年前
One of the AddTrust root certificates has just expired. This is the certificate: <a href="https:&#x2F;&#x2F;crt.sh&#x2F;?id=1" rel="nofollow">https:&#x2F;&#x2F;crt.sh&#x2F;?id=1</a><p>This certificate was originally deployed some 20 years ago and expired today. There will be servers out there configured with certificate chains that terminate with this particular root. I&#x27;ve also seen some expired intermediates as well. In theory, this shouldn&#x27;t be a problem. Clients with modern PKI stacks should be able to deal with the expiration by using path building to find trust paths that are still valid, but there appears to be a long tail of clients that don&#x27;t handle this situation well.<p>If you&#x27;ve received a notification from a monitoring platform and the leaf certificate is still valid, the notification is likely to be a false positive. I got one of those.<p>You should probably be able to neutralise the false positives by reconfiguring your servers with a different chain, one that terminates with a still-valid root. Don&#x27;t include the expired root in the chain. You should do this for maximum compatibility with old clients also.
chrisked将近 5 年前
Came here to say it is happening by on our end too. Received a lot of expired ssl cert notifications, but cannot reproduce it. Currently trying to understand why this is happening. At first sight seems a glitch.
评论 #23361694 未加载
live_alone将近 5 年前
we are also facing sudden ssl issues