<div dir="auto">Ok, thanks. Where on the client end i can remove it?</div><br><div class="gmail_quote"><div dir="ltr" class="gmail_attr">чт, 30 дек. 2021 г., 23:12 Andrew Gallagher via Gnupg-users <<a href="mailto:gnupg-users@gnupg.org">gnupg-users@gnupg.org</a>>:<br></div><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><br>
> On 30 Dec 2021, at 16:27, Alex Nadtoka <<a href="mailto:alex.nadtoka@gmail.com" target="_blank" rel="noreferrer">alex.nadtoka@gmail.com</a>> wrote:<br>
> <br>
> Even if I remove root certificate from the server it will be added again on renewal.<br>
<br>
It is the client that needs the ca certificate to be removed, not the server. The root cause is that there is more than one verification path possible and unpatched openssl versions pick the wrong (expired) option. <br>
<br>
A<br>
_______________________________________________<br>
Gnupg-users mailing list<br>
<a href="mailto:Gnupg-users@gnupg.org" target="_blank" rel="noreferrer">Gnupg-users@gnupg.org</a><br>
<a href="http://lists.gnupg.org/mailman/listinfo/gnupg-users" rel="noreferrer noreferrer" target="_blank">http://lists.gnupg.org/mailman/listinfo/gnupg-users</a><br>
</blockquote></div>