wesupport

25% off on first invoice for all services*

SPRING SALE

Use coupon

*Offer valid for new customers only

25% off on first invoice for all services*

SPRING SALE

Use coupon

*Offer valid for new customers only

Need help?

Our experts have had an average response time of 11.43 minutes in March 2024 to fix urgent issues.

We will keep your servers stable, secure, and fast at all times for one fixed price.

Let’s Encrypt bug in CAA – How do we tackle this?

by | Mar 5, 2020

Oops!! Let’s Encrypt is revoking 3 Million Certificates due to a bug in CAA check!

On February 29, 2020, the free SSL provider had to do this due to a bug in their certificate generating process.

At Bobcares, we frequently deal with Let’s Encrypt queries, as a part of our Server Management Services.

Today, let’s see how our Support Engineers helped our customers to handle this LetsEncrypt bug.

 

What are Let’s Encrypt and CAA?

Let’s Encrypt is an open certificate authority and its runs for free.

They provide digital certificates to the people for securing websites. In other words, it enables the HTTPS(SSL/TLS) on their website links.

Next comes CAA, the Certificate Authority Authorization.

It is a type of DNS record that allows the site owners to specify which all Certificate Authorities are allowed to issue certificates containing their domain names.

 

More about the Let’s Encrypt bug

It’s time now to see the details of the bug.

Before issuing a TLS certificate, Let’s Encrypt verify its users and domains using a Certificate Authority software called Boulder.

And the bug manly impacted the CAA specification implementation inside Boulder. As per the bug, there was a flaw in the CAA validation. As a result, a user that validated his domain for CAA records could install a certificate within the next 30 days despite the changes in DNS.

And this commonly affected the very frequently reissued certificates.

Fortunately, the team patched the bug in a short time. And, the Boulder is now verifying CAA fields properly before issuing the new certificates. Also, they decided to revoke the impacted certificates by March 4th.

 

Am I using an affected certificate?

That raises the question, Is my website having a broken certificate?

We are getting many requests to renew Let’s Encrypt certificates as the authority revoked 3 Million Certificates on March 4th, 2020.

Let’s now see how to check the website certificate’s validity.

So, our Engineers first check the affected certificate using an online tool:

https://checkhost.unboundtest.com/

And, on a Linux system, we use the command that shows example.com‘s current certificate serial number:

openssl s_client -connect example.com:443 -servername example.com -showcerts </dev/null 2>/dev/null | openssl x509 -text -noout | grep -A 1 Serial\ Number | tr -d :

Then, we check whether this serial number is listed in https://letsencrypt.org/caaproblem/ 

And, we inform our affected customers and renew their certificates. Otherwise, the site shows a security warning.

 

How we fix Let’s Encrypt websites in the server

Here, renewing the certificate is the solution and our Dedicated Engineers help customers in renewing their website certificates immediately.

Recently, one of our customers approached us with a similar request. He said he got an e-mail regarding the bug from Let’s Encrypt team.

Let’s Encrypt bug in CAA

The customer was using certbot as an ACME client. So, we renewed his certificate using the command below.

certbot renew --force-renewal

Where ACME client is a protocol used by Let’s Encrypt to verify that who controls the given domain name.

[Need more assistance with Let’s Encrypt?- We’ll help you.]

 

Conclusion

In short, we saw details about the Let’s Encrypt CAA bug. Also, we saw how our Support Engineers resolved the problem by renewing the certificate.

PREVENT YOUR SERVER FROM CRASHING!

Never again lose customers to poor server speed! Let us help you.

Our server experts will monitor & maintain your server 24/7 so that it remains lightning fast and secure.

GET STARTED

var google_conversion_label = "owonCMyG5nEQ0aD71QM";

0 Comments

Submit a Comment

Your email address will not be published. Required fields are marked *

Categories

Tags