ok I have got a little further with this but I am still stuck.
The offending certificate is in the keychain access listed under "System Roots" Doh! (good old screen blindness)
The certificate is "DST Root CA X3" which expired on the 30 Sep 2021 at 15:01:15
The certificate was replaced with "ISRG Root X1" which is the root certificate that is shown when accessing the server using a web browser.
The facility to remove root certificates through the GUI has been removed from Catalina so instructions along the lines of right click and select delete do not work.
Via the command line
sudo security delete- certificate -c "DST Root CA X3" / System/Library/Keychains/SystemRootCertificates.keychain
results in the error message
security: SecKeychainItemDelete: UNIX[Operation not permitted]
The suggested work around
saving the root certificate as a .cer (right click and export via keychain access) then running:
sudo security add-trusted-cert -d -r deny -k "/Library/Keychains/System.keychain" certname.cer
Changes the message in the munki error log from
SSL error detail: (-9814, ’Chain had an expired cert')
to
SSL error detail: (-9807, ‘Invalid certificate chain’)
It changes the certificate from being "certificate has expired" to " This certificate is marked as not trusted for all users" in keychain access but munki purists in rejecting the certificate.
sudo security add-trusted-cert -d -r trustRoot -k "/Library/Keychains/System.keychain" certname.cer
sudo security add-trusted-cert -d -r unspecified -k "/Library/Keychains/System.keychain" certname.cer
Result in
SSL error detail: (-9814, ’Chain had an expired cert')
Setting “trustRoot” removes the expiration notice from keychain access and I suspect would revalidate the certificate to other applications.
Setting “trustAsRoot” results in the error
SecTrustSettingsSetTrustSettings: One or more parameters passed to a function were not valid.
But I suspect would not be appropriate.
This is pure speculation but it is starting to look like a significant issue with munki not using Apples API for certificate verification and apple removing the ability to remove a certificate because it's not necessary if you use Apples certificate verification API.
Once again any help would be greatly appreciated.
--
You received this message because you are subscribed to the Google Groups "munki-discuss" group.
To unsubscribe from this group and stop receiving emails from it, send an email to munki-discus...@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/munki-discuss/616d63b6-d48b-43bb-a4c2-1425cc45580en%40googlegroups.com.
nscurl https://munki.<fqdn>/manifests/<serialnumber>
returns the manifest as expected.
It looks like people are starting to realise it may be part of a fairly major problem for anyone using Let’s Encrypt certificates in MacOS for https access outside of a web browser.
I'm hoping that performing an unnecessary update of the servers ssl certificate will get around the problem.