> Most likely, you're not requesting a full chain from acme-client, or you
> haven't given the full chain certificate a name relayd will pick up
> automatically.
According to relayd.conf(5), relayd should pick up my full chain
certificate.
# /etc/ssl
drwxr-xr-x 3 root wheel 512B Dec 27 2021 acme/
drwx------ 2 root wheel 512B Oct 25 19:57 private/
-r--r--r-- 1 root wheel 341K Sep 14 19:34 cert.pem
-r--r--r-- 1 root wheel 2.1K Oct 25 19:59 src.domain.io.crt
-r--r--r-- 1 root wheel 3.8K Oct 25 19:59 src.domain.io.fullchain.pem
-rw-r--r-- 1 root wheel 504B Oct 26 17:46 src.domain.io.ocsp
-rw-r--r-- 1 root wheel 504B Oct 26 13:58 src.domain.io.ocsp.pem
# /etc/ssl/private
-r-------- 1 root wheel 3.2K Oct 25 19:59 src.domain.io.key
# relayd.conf(5)
keypair name
The relay will attempt to look up a private key in
/etc/ssl/private/name:port.key and a public certificate
in /etc/ssl/name:port.crt, where port is the specified
port that the relay listens on. If these files are not
present, the relay will continue to look in
/etc/ssl/private/name.key and /etc/ssl/name.crt. This
option can be specified multiple times for TLS Server
Name Indication. If not specified, a keypair will be
loaded using the specified IP address of the relay as
name. See ssl(8) for details about TLS server
certificates.
An optional OCSP staple file will be used during TLS
handshakes with this server if it is found as a
non-empty
file in /etc/ssl/name:port.ocsp or /etc/ssl/name.ocsp.
The file should contain a DER-format OCSP response
retrieved from an OCSP server for the certificate in
use,
and can be created using ocspcheck(8).
To generate the files in /etc/ssl, I used the following commands:
# acme-client -F src.domain.io
# /usr/sbin/ocspcheck -N -o /etc/ssl/src.domain.io.ocsp.pem
/etc/ssl/src.domain.io.fullchain.pem
Kind Regards.
On Sat, Oct 26, 2024 at 8:01 PM Anthony J. Bentley <[email protected]>
wrote:
> Am Jam writes:
> > $ git clone https://src.domain.io/user/aoc.git
> > Cloning into 'aoc'...
> > fatal: unable to access 'https://src.domain.io/user/aoc.git/': SSL
> > certificate problem: unable to get local issuer certificate
> >
> > and
> >
> > $ curl https://src.domain.io
> > curl: (60) SSL certificate problem: unable to get local issuer
> > certificate
> > More details here: https://curl.se/docs/sslcerts.html
> >
> > curl failed to verify the legitimacy of the server and therefore could
> > not
> > establish a secure connection to it. To learn more about this
> situation
> > and
> > how to fix it, please visit the web page mentioned above.
>
> acme-client(1) generates a certificate without any intermediate
> certificates unless a full chain is specifically requested; see
> acme-client.conf(5).
>
> relayd(8)'s 'tls keypair' will automatically pick up certificates named
> according to a particular pattern; see relayd.conf(5).
>
> Most likely, you're not requesting a full chain from acme-client, or you
> haven't given the full chain certificate a name relayd will pick up
> automatically.
>