<div dir="ltr">Many thanks, the trick of removing the cross-signed certificate from the chain on the server does the trick.</div><br><div class="gmail_quote"><div dir="ltr" class="gmail_attr">On Mon, Sep 27, 2021 at 4:00 PM Roger Lipscombe <<a href="mailto:roger@differentpla.net">roger@differentpla.net</a>> wrote:<br></div><blockquote class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left-width:1px;border-left-style:solid;border-left-color:rgb(204,204,204);padding-left:1ex">On Mon, 27 Sept 2021 at 14:41, Jeroen Koops <<a href="mailto:koops.j@gmail.com" target="_blank">koops.j@gmail.com</a>> wrote:<br>
> One of the changes was the removal of the DST Root CA X3 root-certificate. This certificate is used as a root by Let's Encrypt certificates, and is almost expiring.<br>
> Has anyone else seen this issue? Is there a solution?<br>
<br>
See <a href="https://blog.voltone.net/post/29" rel="noreferrer" target="_blank">https://blog.voltone.net/post/29</a> and <a href="https://blog.voltone.net/post/30" rel="noreferrer" target="_blank">https://blog.voltone.net/post/30</a><br>
</blockquote></div><br clear="all"><div><br></div>-- <br><div dir="ltr" class="gmail_signature"><div>Jeroen Koops</div><div><br></div><div>M: <a href="mailto:koops.j@gmail.com" target="_blank">koops.j@gmail.com</a></div><div>T: +31-6-55590300</div></div>