Having spoken to MailChimp, the certificate they're still (Jan 2016) using – for compatibility reasons, they told me – is the GTE CyberTrust Global Root (note GTE was bought by Digicert), so you don't need to replace the entire bundle, just add or force PHP to read this certificate:
https://gte-cybertrust-global-root.digicert.com/info/index.html
(note you'll get an 'insecure connection' warning if you try and load that in Firefox, for hopefully obvious reasons – you can add an exception.)
It's in standard .crt format, which is what you need. Guide to certificate formats
You didn't specify what the server was but here's how to add an extra one on Linux without having to replace an entire bundle etc:
On Debian/Ubuntu, certificates live in /etc/ssl/certs/
- Copy and paste the signature into a new file in that directory, e.g.
mailchimp-legacy.crt
- run
sudo c_rehash /etc/ssl/certs
- What's going on here: c_rehash
calculates a short hash of each certificate and creates a symlink from that to the original .pem or .crt file. Basically it's a quick lookup table for openssl - openssl will perform the hash as well and look for the symlink, rather than having to have a database of certificate names or open every file in turn to find the right one.
- check it's worked with this:
ls -lh *.0 | grep 'mailchimp-legacy.crt'
You should see something like this:
lrwxrwxrwx 1 root root 20 Feb 13 14:17 4d654d1d.0 -> mailchimp-legacy.crt
lrwxrwxrwx 1 root root 20 Feb 13 14:17 c692a373.0 -> mailchimp-legacy.crt
Alternatively: On Debian, there's also a file called /etc/ca-certificates.conf
and the exclamation mark in the line !mozilla/GTE_CyberTrust_Global_Root.crt
indicates not to use that one. I believe it's possible to put a copy of the certificate with that name under /usr/share/ca-certificates/mozilla
and run sudo update-ca-certificates
, but it seems to me it be likely to be removed again when the package & config file are next updated.
Remember to remove any workarounds you were using - e.g.
- old CA bundles in your certificate directory
- anywhere you override CURLOPT_CAINFO in your PHP
- an openssl.cainfo line in your php.ini
Check your application works correctly. I didn't need to restart PHP or my webserver, the change was instant. Worth using apt-get update/upgrade
to check you have the most recently certificate packages.
Here's a way to verify SSL connection (and verification) to a specific server from the command line:
echo GET | openssl s_client -CApath /etc/ssl/certs/ -connect us3.api.mailchimp.com:443 2>&1
Monitoring: (updated) MailChimp's v2.0 API (deprecated) has an endpoint called 'helper/ping
' which returns some text to indicate the API status - useful as an automated test of API health and that your certificates are all still working. If you're using v3.0, they recommend using the API Root Resource and appending ?fields=account_name
if you don't actually need to check any of the data.
Someone asked in the comments if this was related to Heartbleed. No. Heartbleed is an openssl vulnerability related to eavesdropping on data in RAM. Mozilla removed GTE CyberTrust (twice) because they wanted to remove all 1024-bit root certificates - research has suggested a nation state could break a 1024-bit prime.