Jump to content

HTTPS/2021 Let's Encrypt root expiry/hu

From Meta, a Wikimedia project coordination wiki
This page is a translated version of the page HTTPS/2021 Let's Encrypt root expiry and the translation is 33% complete.

Mi ez?

This is about a special HTTPS compatibility issue facing very outdated clients connecting to certain sites, including ours!

On 2021-09-30 at about 14:00 UTC, a very old root certificate which has been included in many older clients will expire and become invalid. For such clients, this certificate was their only mechanism of being compatible with server certificates issued by Let's Encrypt. This is a complex technical issue which has been looming for a long time now. Various ingenious mitigations have been put in place by Let's Encrypt as the date has approached to minimize the impacts to real users. Unfortunately, there will be some unavoidable impacts in some less-common cases!

Foundation projects (including Wikipedia) make use of Let's Encrypt certificates at some of our edge servers, and thus these impacts will affect a very small number of users of our projects, but this issue isn't specific to our projects. Let's Encrypt is securing millions of domains across the Internet, so this expiry impact will be felt quite broadly, and affected clients simply won't work well on the Internet in general after the cutoff date.

For more of the complex technical details underpinning this issue, the best source is Scott Helme's extensive blog post on the topic.

Kompatibilitási gondok

In broad terms - most software which has been updated in the past 5 years should be unaffected, and most hardware devices made since 2011 should be capable of the necessary software upgrades. Below are the specific cases we're aware of on various platforms which may face new compatibility issues connecting to our sites on 30 September 2021:

Android

As far as we're aware, our current level of Android support should remain unchanged at roughly version 4.4 or higher (the cutoff can vary a little due to vendor OS customization and/or alternate browser installation).

iOS

iOS 9 is affected by this expiry, so users will need to upgrade to iOS 10 (or later), which was released in about 2016. The iPhone 5 (released in about 2012) and all later phones are capable of updating to iOS 10 or later. The primary device affected will be remaining users of the iPhone 4S, which cannot be upgraded beyond iOS 9. All iPhones older than the 4S were already incompatible with Wikimedia's current TLS configuration.

macOS

macOS version 10.11 (El Capitan) is affected by this expiry, so users will need to upgrade to macOS 10.12.1 (Sierra) or higher, which was released in about 2016 and supports most Mac hardware made since 2011. All versions of macOS older than 10.11 were already incompatible with Wikimedia's current TLS configuration.

If a Mac computer cannot be upgraded to macOS Sierra or newer, another option is to import the ISRG Root X1 certificate in the Keychain Manager and mark it as trusted.

Windows

No specific new issues, but we should re-iterate than XP and Vista are far out of security support and not recommended, and may face additional compatibility issues (see more details in: wikitech:HTTPS/Browser Recommendations).

OpenSSL

On Linux and other open source operating systems which use the OpenSSL library, OpenSSL version 1.0.2 and older may have issues with this certificate expiry. These issues can be mitigated without updating OpenSSL if necessary, and the OpenSSL project has extensive information on this topic. Affected operating systems include Debian 7 Wheezy, Ubuntu 16.04 Xenial, and others of a similar era (initially released ~5+ years ago).

If the OpenSSL blog post linked above doesn't help, here are some anecdotal workarounds:

Java

Official Java 8 updates earlier than 8u141, released in July 2017, are affected by this expiry, which might affect some bots and other automation which accesses our sites. Alternate Java implementations (e.g. the open-source ones) may have similar version timeline issues, and vendor updates should be available to address it.