Skip to content

Inabiltiy to s2s on next generation letsencrypt certifiates (X509v3 Extended Key Usage: ONLY TLS Web Server Authentication) #4392

@Menelmacar

Description

@Menelmacar

Bug description

When generating a letsencrypt certificate with the tlsserver ACME profile to mimic the future of letsencrypt
(see https://letsencrypt.org/2025/05/14/ending-tls-client-authentication/ )
then my prosody server can't to any s2s with ejabberd servers anymore:

From the log:
info SASL EXTERNAL with conference.siacs.eu failed: error<cancel:not-authorized:unsupported certificate purpose>

It seems prosody already has a workaround for this, allowing these certificates for s2s regardless.
It would be good to allow letsencrypt with ejabberd in the future too, even with these limited certificates, since they will be realistically the only choice for some people.

Edit: it seems basically all free acme root CAs will do the same, it's some googpe policy that's needed for them to be in Google chrome in the future. And apparently these companies can't afford to have a second root for client certificates.

If I allow dialback, then I can connect regardless

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions