Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Darkly)
  • No Skin
Collapse
Brand Logo
  1. Home
  2. Uncategorized
  3. Today is the last day that #Letsencrypt will issue certificates with the "Client Authentication" EKU (Extended Key Usage).

Today is the last day that #Letsencrypt will issue certificates with the "Client Authentication" EKU (Extended Key Usage).

Scheduled Pinned Locked Moved Uncategorized
letsencrypt
6 Posts 5 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • Jan Wildeboer 😷:krulorange:J This user is from outside of this forum
    Jan Wildeboer 😷:krulorange:J This user is from outside of this forum
    Jan Wildeboer 😷:krulorange:
    wrote last edited by
    #1

    Today is the last day that #Letsencrypt will issue certificates with the "Client Authentication" EKU (Extended Key Usage). If that sounds like obscure technobabble, you are mostly right. But it might cause some breakage in unexpected places where servers talk to each other (e-mail server, XMPP servers, mTLS (mutual Transport Layer Security) setups). Here's information for XMPP: https://blog.prosody.im/2026-letsencrypt-changes/

    Jan Wildeboer 😷:krulorange:J MarjorieRM altim πŸ‡ͺπŸ‡Ί πŸ”’πŸŒπŸŒ³πŸ“°:linux:A 3 Replies Last reply
    0
    • Jan Wildeboer 😷:krulorange:J Jan Wildeboer 😷:krulorange:

      Today is the last day that #Letsencrypt will issue certificates with the "Client Authentication" EKU (Extended Key Usage). If that sounds like obscure technobabble, you are mostly right. But it might cause some breakage in unexpected places where servers talk to each other (e-mail server, XMPP servers, mTLS (mutual Transport Layer Security) setups). Here's information for XMPP: https://blog.prosody.im/2026-letsencrypt-changes/

      Jan Wildeboer 😷:krulorange:J This user is from outside of this forum
      Jan Wildeboer 😷:krulorange:J This user is from outside of this forum
      Jan Wildeboer 😷:krulorange:
      wrote last edited by
      #2

      If you rely on the Client Auth EKU, you will have to find a different Certificate Authority (CA) than Letsencrypt. Or run your own CA, which is certainly possible but adds another attack layer. Oh, by the way, this change is described as being *better* for security, which I find a bit of a confusing justification. Le sigh.

      Larvitz :fedora: :redhat:L 1 Reply Last reply
      0
      • Jan Wildeboer 😷:krulorange:J Jan Wildeboer 😷:krulorange:

        Today is the last day that #Letsencrypt will issue certificates with the "Client Authentication" EKU (Extended Key Usage). If that sounds like obscure technobabble, you are mostly right. But it might cause some breakage in unexpected places where servers talk to each other (e-mail server, XMPP servers, mTLS (mutual Transport Layer Security) setups). Here's information for XMPP: https://blog.prosody.im/2026-letsencrypt-changes/

        MarjorieRM This user is from outside of this forum
        MarjorieRM This user is from outside of this forum
        MarjorieR
        wrote last edited by
        #3

        @jwildeboer any information about what we need to do to keep our email server communicating?
        At present I use my letsencrypt certificate.

        πŸ”— David SommersethD 1 Reply Last reply
        0
        • MarjorieRM MarjorieR

          @jwildeboer any information about what we need to do to keep our email server communicating?
          At present I use my letsencrypt certificate.

          πŸ”— David SommersethD This user is from outside of this forum
          πŸ”— David SommersethD This user is from outside of this forum
          πŸ”— David Sommerseth
          wrote last edited by
          #4

          @marjolica

          From the link @jwildeboer posted, there is this detail:

          However they have announced that they will be issuing certificates for only β€œserver authentication” by default from 11th February 2026

          From what I'm understanding, using Lets Encrypt certificates on an incoming SMTP server shouldn't change anything. Then using a certificate issued for server usage would be a better match.

          If you use Lets Encrypt for client usage it might be different. However, if that will actually have an impact on Postfix as an outgoing SMTP server, that I'm not sure of. Generally speaking most SMTP servers have been fairly forgiving with the TLS communication.

          The bigger challenge will be if you use Lets Encrypt on a client side, using it for authentication purposes against a strict TLS server on the remote end, which checks the EKU field and requires it to be set to "client authentication". This use case will break with the coming Lets Encrypt change.

          1 Reply Last reply
          0
          • Jan Wildeboer 😷:krulorange:J Jan Wildeboer 😷:krulorange:

            Today is the last day that #Letsencrypt will issue certificates with the "Client Authentication" EKU (Extended Key Usage). If that sounds like obscure technobabble, you are mostly right. But it might cause some breakage in unexpected places where servers talk to each other (e-mail server, XMPP servers, mTLS (mutual Transport Layer Security) setups). Here's information for XMPP: https://blog.prosody.im/2026-letsencrypt-changes/

            altim πŸ‡ͺπŸ‡Ί πŸ”’πŸŒπŸŒ³πŸ“°:linux:A This user is from outside of this forum
            altim πŸ‡ͺπŸ‡Ί πŸ”’πŸŒπŸŒ³πŸ“°:linux:A This user is from outside of this forum
            altim πŸ‡ͺπŸ‡Ί πŸ”’πŸŒπŸŒ³πŸ“°:linux:
            wrote last edited by
            #5

            @jwildeboer What does this mean for services such as Synology DSM?

            1 Reply Last reply
            0
            • Jan Wildeboer 😷:krulorange:J Jan Wildeboer 😷:krulorange:

              If you rely on the Client Auth EKU, you will have to find a different Certificate Authority (CA) than Letsencrypt. Or run your own CA, which is certainly possible but adds another attack layer. Oh, by the way, this change is described as being *better* for security, which I find a bit of a confusing justification. Le sigh.

              Larvitz :fedora: :redhat:L This user is from outside of this forum
              Larvitz :fedora: :redhat:L This user is from outside of this forum
              Larvitz :fedora: :redhat:
              wrote last edited by
              #6

              @jwildeboer ZeroSSL, the other big ACME CA for free-certs, did remove Client Auth EKU already last October 😞

              1 Reply Last reply
              1
              0
              • R ActivityRelay shared this topic
              Reply
              • Reply as topic
              Log in to reply
              • Oldest to Newest
              • Newest to Oldest
              • Most Votes


              • Login

              • Don't have an account? Register

              • Login or register to search.
              Powered by NodeBB Contributors
              • First post
                Last post
              0
              • Categories
              • Recent
              • Tags
              • Popular
              • World
              • Users
              • Groups