Is it safe to remove a self-signed root certificate from the chain; and what, if any, are the consequences of doing that?
And how would I go about doing this on a Windows setup? The instructions under "Manually updating the local certificates" which suggest to remove the DST Root CA X3 certificate from the chain is for non-Windows setups.
This is how I found about about my problem: I ran a SSL test on my domain https://www.filmfix.com using https://www.ssllabs.com:
I use https://github.com/do-know/Crypt-LE to obtain my wildcard Let's Encrypt certificate and run Apache to handle all :443 calls.
Doing some digging I found a way to remove that certificate, but the chain is somehow still listed.
Removing DST Root CA X3 from Windows
I went ahead and did certmgr.msc
to check on it
The URL support.microsoft.com/?id=293781 is not working; but I found this related page https://learn.microsoft.com/en-us/troubleshoot/windows-server/identity/trusted-root-certificates-are-required and could not find the mentioning of DST Root CA X3 in it, so I deleted the certificate and rebooted Windows.
I regenerated the Let's Encrypt wildcard certificate and restarted Apache. Now testing at https://www.ssllabs.com it looks like I the SSL DST Root CA X3 issue is no longer.
I tested on https://www.immuniweb.com and got an A+! And found this helpful tip:
The server is not configured to support OCSP stapling for its RSA certificate that allows better verification of the certificate validation status. Reconfigure or upgrade your web server to enable OCSP stapling.
But I still see CN = DST Root CA X3
in the chain when running.
C:\64bit\Apache24\bin>openssl s_client -connect www.filmfix.com:443 -status -servername www.filmfix.com
CONNECTED(000001B0)
depth=2 C = US, O = Internet Security Research Group, CN = ISRG Root X1
verify error:num=20:unable to get local issuer certificate
verify return:1
depth=1 C = US, O = Let's Encrypt, CN = R3
verify return:1
depth=0 CN = *.filmfix.com
verify return:1
OCSP response: no response sent
---
Certificate chain
0 s:CN = *.filmfix.com
i:C = US, O = Let's Encrypt, CN = R3
1 s:C = US, O = Let's Encrypt, CN = R3
i:C = US, O = Internet Security Research Group, CN = ISRG Root X1
2 s:C = US, O = Internet Security Research Group, CN = ISRG Root X1
i:O = Digital Signature Trust Co., CN = DST Root CA X3
---
Do I need to remove any of the ssl.pem
or ssl.csr
file for openssl to regenerate the files to update the chain?