Skip to content

Instantly share code, notes, and snippets.

@stek29
Last active April 28, 2024 11:20
Show Gist options
  • Star 14 You must be signed in to star a gist
  • Fork 3 You must be signed in to fork a gist
  • Save stek29/761232c6f7e1ffbc36b98da2a3a0f4d9 to your computer and use it in GitHub Desktop.
Save stek29/761232c6f7e1ffbc36b98da2a3a0f4d9 to your computer and use it in GitHub Desktop.
fix webOS ca certificates for DST Root X3 expiry (on rooted TVs)

HowTo

  • Root via rootmy.tv
  • Install

Tested on webOS 4.5, should at least on webOS 3.5+

Installation/Update

curl -qs "https://gist.githubusercontent.com/stek29/761232c6f7e1ffbc36b98da2a3a0f4d9/raw/install.sh?$(date +%s)" | sh -

Removal

/var/lib/webosbrew/init.d/letsencrypt-ca-certs clean
rm /var/lib/webosbrew/init.d/letsencrypt-ca-certs

License

BSD0

#!/bin/sh
set -e
if [ "$(id -u)" != 0 ]; then
echo "ERROR: Must run as root"
exit 1
fi
URL="https://gist.githubusercontent.com/stek29/761232c6f7e1ffbc36b98da2a3a0f4d9/raw/letsencrypt-ca-certs.sh?$(date +%s)"
INITD="/var/lib/webosbrew/init.d"
START_DEVMODE="/media/cryptofs/apps/usr/palm/services/com.palmdts.devmode.service/start-devmode.sh"
echo "Installing letsencrypt-ca-certs"
mkdir -p "$INITD"
curl -qs "$URL" -o "$INITD/letsencrypt-ca-certs"
chmod +x "$INITD/letsencrypt-ca-certs"
# For comparibility with 3 versions of RootMyTV:
# Starting from RootMyTV2 startup.sh is used and has ran-parts
# Older versions of RootMyTV have ran-parts in start-devmode
# Popular russian fork of old RootMyTV doesnt have run-parts at apl
if [ ! -f "/var/lib/webosbrew/startup.sh" ] && ! grep -qs "run-parts $INITD" "$START_DEVMODE"; then
echo "Notice: Incompatible/outdated start-devmode.sh detected"
echo "Notice: run-parts was added to start-devmode for comaptibility"
echo "Notice: please update your root/start-devmode script"
cat <<EOF >>"$START_DEVMODE"
# Added by letsencrypt-ca-certs installer for compat
# !!! UPDATE YOUR ROOT SCRIPTS PLEASE !!!
if [[ -d "$INITD" ]]; then
run-parts "$INITD"
fi
EOF
fi
"$INITD/letsencrypt-ca-certs" clean
"$INITD/letsencrypt-ca-certs"
#!/bin/sh
# source: https://gist.github.com/stek29/761232c6f7e1ffbc36b98da2a3a0f4d9
set -e
PERSIST="/media/letsencrypt-ca-certs"
REPLACE_CERT="mozilla/DST_Root_CA_X3.crt"
CERTS="/usr/share/ca-certificates"
ETCCERTS="/etc/ssl/certs"
if [ "$1" = "clean" ]; then
if grep -qs " $ETCCERTS " /proc/mounts; then
umount "$ETCCERTS"
fi
if grep -qs " $CERTS/$REPLACE_CERT " /proc/mounts; then
umount "$CERTS/$REPLACE_CERT"
fi
if [ -d "$PERSIST" ]; then
rm -r "$PERSIST"
fi
exit 0
fi
if [ ! -d "$PERSIST" ]; then
mkdir -p "$PERSIST"
fi
if [ ! -f "$PERSIST/ISRG_Root_X1.crt" ]; then
# from https://letsencrypt.org/certs/isrgrootx1.pem
cat <<EOF >"$PERSIST/ISRG_Root_X1.crt"
-----BEGIN CERTIFICATE-----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=
-----END CERTIFICATE-----
EOF
fi
if ! grep -qs " $CERTS/$REPLACE_CERT " /proc/mounts; then
echo "Replacing $REPLACE_CERT with ISRG_Root_X1"
mount --bind "$PERSIST/ISRG_Root_X1.crt" "$CERTS/$REPLACE_CERT"
fi
skip_etc_certs=0
if [ -f "$PERSTST/skip_etc_certs" ]; then
echo "skip_etc_certs present, skipping $ETCCERTS remount"
skip_etc_certs=1
else
if [ ! -f "$PERSIST/certs/ca-certificates.crt" ]; then
echo "generating new ca certs"
mkdir -p "$PERSIST/certs"
if ! update-ca-certificates --verbose --fresh --etccertsdir "$PERSIST/certs" \
|| [ ! -f "$PERSIST/certs/ca-certificates.crt" ]; then
echo "update-ca-certificates failed, enabling skip_etc_certs"
skip_etc_certs=1
touch "$PERSIST/skip_etc_certs"
rm -r "$PERSIST/certs" || :
fi
fi
fi
if [ "$skip_etc_certs" = "0" ]; then
if ! grep -qs " $ETCCERTS " /proc/mounts; then
echo "Remounting $ETCCERTS"
mount --bind "$PERSIST/certs" "$ETCCERTS"
fi
fi
@Informatic
Copy link

webOS 3.8:

Installing letsencrypt-ca-certs
Replacing mozilla/DST_Root_CA_X3.crt with ISRG_Root_X1
generating new ca certs
/usr/sbin/update-ca-certificates: [--verbose] [--fresh]
update-ca-certificates failed, enabling skip_etc_certs

Maybe setting up overlayfs on /etc/ssl/certs and /usr/share/ca-certificates may work better?

@Informatic
Copy link

Informatic commented Nov 25, 2021

Another note:
webOS 3.4 is missing c_rehash (which is used by update-ca-certificates)
webOS 3.8 ships with: https://github.com/pld-linux/openssl/blob/master/openssl-c_rehash.sh

@stek29
Copy link
Author

stek29 commented Nov 29, 2021

@Informatic I don't think that overlayfs is really needed

I have worked on rebuilding newer version of openssl (with c_rehash and proper update-ca-certificates), but didn't have time to try it on older versions

@zly-alex
Copy link

Приветствую, на webOS 3.9 обновление прошло отлично, за исключением одного но, сертификаты браузера находятся отдельно.
Можно ждать от вас скрипта для таких систем?
В любом случае огромное спасибо.

@Informatic
Copy link

Hey! Just a heads up - RootMyTV v2 has moved the startup script to /var/lib/webosbrew/startup.sh (and we'll use that path from now on in any further potential exploits) - can you add a check that'd prevent from touching start-devmode.sh if that path exists?

References:
https://github.com/RootMyTV/RootMyTV.github.io/blob/main/files/jumpstart.sh
https://github.com/RootMyTV/RootMyTV.github.io/blob/main/stage2.html#L107-L115

@stek29
Copy link
Author

stek29 commented Jan 24, 2022

@Informatic thank you for the heads up! I’ve updated the script.

@teredactle
Copy link

Another note: webOS 3.4 is missing c_rehash (which is used by update-ca-certificates) webOS 3.8 ships with: https://github.com/pld-linux/openssl/blob/master/openssl-c_rehash.sh

Any workaround to this would be appreciated it as I have also tried on Webos 3.4 and getting the error since it's missing c_rehash

"/usr/sbin/update-ca-certificates: line 213: c-rehash: not found"

thank you

@thoj
Copy link

thoj commented Apr 4, 2023

This seems to work on webos 3.4:

cd /media
curl -qs https://github.com/pld-linux/openssl/blob/master/openssl-c_rehash.sh > c_rehash
chmod +x c_rehash
export PATH="$PATH:/media/"
curl -qs "https://gist.githubusercontent.com/stek29/761232c6f7e1ffbc36b98da2a3a0f4d9/raw/install.sh?$(date +%s)" | sh -

@drogtorri
Copy link

WebOS 3.9.0-62709
firmware 6.00.25
rooted via rootmy.tv
OpenSSL 1.0.2k 26 Jan 2017

Everything installs properly but browser still not opening sites with new certificates. Any way to debug?

root@LGwebOSTV:~# curl -qs "https://gist.githubusercontent.com/stek29/761232c6f7e1ffbc36b98da2a3a0f4d9/raw/install.sh?$(date +%s)" | sh -
Installing letsencrypt-ca-certs
Replacing mozilla/DST_Root_CA_X3.crt with ISRG_Root_X1
generating new ca certs
Clearing symlinks in /media/letsencrypt-ca-certs/certs...
done.
Updating certificates in /media/letsencrypt-ca-certs/certs...
Doing .
ACCVRAIZ1.pem => a94d09e5.0
ACEDICOM_Root.pem => 381ce4dd.0
AC_Raíz_Certicámara_S.A..pem => 6f2c1157.0
Actalis_Authentication_Root_CA.pem => 930ac5d2.0
AffirmTrust_Commercial.pem => 2b349938.0
AffirmTrust_Networking.pem => 93bc0acc.0
AffirmTrust_Premium.pem => b727005e.0
AffirmTrust_Premium_ECC.pem => 9c8dfbd4.0
Atos_TrustedRoot_2011.pem => e36a6752.0
Autoridad_de_Certificacion_Firmaprofesional_CIF_A62634068.pem => 3bde41ac.0
Baltimore_CyberTrust_Root.pem => 653b494a.0
Buypass_Class_2_Root_CA.pem => 54657681.0
Buypass_Class_3_Root_CA.pem => e8de2f56.0
CA_Disig_Root_R1.pem => 9007ae68.0
CA_Disig_Root_R2.pem => 2ae6433e.0
CA_WoSign_ECC_Root.pem => 26eaad2f.0
CFCA_EV_ROOT.pem => 0b1b94ef.0
CNNIC_ROOT.pem => bd1910d4.0
COMODO_Certification_Authority.pem => 40547a79.0
COMODO_ECC_Certification_Authority.pem => eed8c118.0
COMODO_RSA_Certification_Authority.pem => d6325660.0
Camerfirma_Chambers_of_Commerce_Root.pem => f90208f7.0
Camerfirma_Global_Chambersign_Root.pem => cb59f961.0
Certification_Authority_of_WoSign_G2.pem => f38a011e.0
Certigna.pem => e113c810.0
Certinomis_-_Autorité_Racine.pem => d957f522.0
Certinomis_-_Root_CA.pem => 9f0f5fd6.0
Certum_Root_CA.pem => 442adcac.0
Certum_Trusted_Network_CA.pem => 48bec511.0
Chambers_of_Commerce_Root_-_2008.pem => c47d9980.0
China_Internet_Network_Information_Center_EV_Certificates_Root.pem => 1874d4aa.0
ComSign_CA.pem => bb2d49a0.0
Comodo_AAA_Services_root.pem => ee64a828.0
Comodo_Secure_Services_root.pem => c9f83a1c.0
Comodo_Trusted_Services_root.pem => 56657bde.0
Cybertrust_Global_Root.pem => 76cb8f92.0
D-TRUST_Root_Class_3_CA_2_2009.pem => c28a8a30.0
D-TRUST_Root_Class_3_CA_2_EV_2009.pem => d4dae3dd.0
DST_Root_CA_X3.pem => 4042bcee.0
DigiCert_Assured_ID_Root_CA.pem => b1159c4c.0
DigiCert_Assured_ID_Root_G2.pem => 9d04f354.0
DigiCert_Assured_ID_Root_G3.pem => 7f3d5d1d.0
DigiCert_Global_Root_CA.pem => 3513523f.0
DigiCert_Global_Root_G2.pem => 607986c7.0
DigiCert_Global_Root_G3.pem => dd8e9d41.0
DigiCert_High_Assurance_EV_Root_CA.pem => 244b5494.0
DigiCert_Trusted_Root_G4.pem => 75d1b2ed.0
E-Tugra_Certification_Authority.pem => 5273a94c.0
EC-ACC.pem => 349f2832.0
EE_Certification_Centre_Root_CA.pem => 128805a3.0
Entrust.net_Premium_2048_Secure_Server_CA.pem => aee5f10d.0
Entrust_Root_Certification_Authority.pem => 6b99d060.0
Entrust_Root_Certification_Authority_-_EC1.pem => 106f3e4d.0
Entrust_Root_Certification_Authority_-_G2.pem => 02265526.0
Equifax_Secure_Global_eBusiness_CA.pem => ef2f636c.0
Equifax_Secure_eBusiness_CA_1.pem => 79ad8b43.0
GeoTrust_Global_CA.pem => 2c543cd1.0
GeoTrust_Primary_Certification_Authority.pem => 480720ec.0
GeoTrust_Primary_Certification_Authority_-_G2.pem => 116bf586.0
GeoTrust_Primary_Certification_Authority_-_G3.pem => e2799e36.0
GeoTrust_Universal_CA.pem => ad088e1d.0
GeoTrust_Universal_CA_2.pem => 8867006a.0
GlobalSign_ECC_Root_CA_-_R4.pem => b0e59380.0
GlobalSign_ECC_Root_CA_-_R5.pem => 1d3472b9.0
GlobalSign_Root_CA.pem => 5ad8a5d6.0
GlobalSign_Root_CA_-_R2.pem => 4a6481c9.0
GlobalSign_Root_CA_-_R3.pem => 062cdee6.0
Global_Chambersign_Root_-_2008.pem => 0c4c9b6c.0
Go_Daddy_Class_2_CA.pem => f081611a.0
Go_Daddy_Root_Certificate_Authority_-_G2.pem => cbf06781.0
Hellenic_Academic_and_Research_Institutions_RootCA_2011.pem => 1636090b.0
Hongkong_Post_Root_CA_1.pem => 3e45d192.0
IGC_A.pem => 3ee7e181.0
IdenTrust_Commercial_Root_CA_1.pem => ef954a4e.0
IdenTrust_Public_Sector_Root_CA_1.pem => 1e08bfd1.0
Izenpe.com.pem => cc450945.0
Microsec_e-Szigno_Root_CA_2009.pem => 8160b96c.0
NetLock_Arany_=Class_Gold=_Főtanúsítvány.pem => 988a38cb.0
NetLock_Qualified_=Class_QA=_Root.pem => 861e0100.0
Network_Solutions_Certificate_Authority.pem => 4304c5e5.0
OISTE_WISeKey_Global_Root_GA_CA.pem => b1b8a7f3.0
OISTE_WISeKey_Global_Root_GB_CA.pem => e73d606e.0
PSCProcert.pem => c5d3212a.0
QuoVadis_Root_CA.pem => 080911ac.0
QuoVadis_Root_CA_1_G3.pem => 749e9e03.0
QuoVadis_Root_CA_2.pem => d7e8dc79.0
QuoVadis_Root_CA_2_G3.pem => 064e0aa9.0
QuoVadis_Root_CA_3.pem => 76faf6c0.0
QuoVadis_Root_CA_3_G3.pem => e18bfb83.0
RSA_Security_2048_v3.pem => c99398f3.0
Root_CA_Generalitat_Valenciana.pem => 0810ba98.0
S-TRUST_Authentication_and_Encryption_Root_CA_2005_PN.pem => 0d1b923b.0
S-TRUST_Universal_Root_CA.pem => 19c1fa33.0
SecureSign_RootCA11.pem => 18856ac4.0
SecureTrust_CA.pem => f39fc864.0
Secure_Global_CA.pem => b66938e9.0
Security_Communication_EV_RootCA1.pem => 9d520b32.0
Security_Communication_RootCA2.pem => cd58d51e.0
Security_Communication_Root_CA.pem => f3377b1b.0
Sonera_Class_1_Root_CA.pem => 67d559d1.0
Sonera_Class_2_Root_CA.pem => 9c2e7d30.0
Staat_der_Nederlanden_EV_Root_CA.pem => 03179a64.0
Staat_der_Nederlanden_Root_CA_-_G3.pem => 5a4d6896.0
Starfield_Class_2_CA.pem => f387163d.0
Starfield_Root_Certificate_Authority_-_G2.pem => 4bfab552.0
Starfield_Services_Root_Certificate_Authority_-_G2.pem => 09789157.0
StartCom_Certification_Authority.pem => ae8153b9.0
StartCom_Certification_Authority_2.pem => ae8153b9.1
StartCom_Certification_Authority_G2.pem => 876f1e28.0
SwissSign_Gold_CA_-_G2.pem => 4f316efb.0
SwissSign_Platinum_CA_-_G2.pem => a8dee976.0
SwissSign_Silver_CA_-_G2.pem => 57bcb2da.0
Swisscom_Root_CA_1.pem => 667c66d4.0
Swisscom_Root_CA_2.pem => 3efd4dc0.0
Swisscom_Root_EV_CA_2.pem => 034868d6.0
T-TeleSec_GlobalRoot_Class_2.pem => 1e09d511.0
T-TeleSec_GlobalRoot_Class_3.pem => 5443e9e3.0
TC_TrustCenter_Class_3_CA_II.pem => 5620c4aa.0
TWCA_Global_Root_CA.pem => 5f15c80c.0
TWCA_Root_Certification_Authority.pem => b7a5b843.0
Taiwan_GRCA.pem => 6410666e.0
TeliaSonera_Root_CA_v1.pem => 5cd81ad7.0
Trustis_FPS_Root_CA.pem => d853d49e.0
TÜRKTRUST_Elektronik_Sertifika_Hizmet_Sağlayıcısı_H5.pem => 7992b8bb.0
TÜRKTRUST_Elektronik_Sertifika_Hizmet_Sağlayıcısı_H6.pem => c679bc3f.0
USERTrust_ECC_Certification_Authority.pem => f30dd6ad.0
USERTrust_RSA_Certification_Authority.pem => fc5a8f99.0
VeriSign_Class_3_Public_Primary_Certification_Authority_-_G4.pem => 7d0b38bd.0
VeriSign_Class_3_Public_Primary_Certification_Authority_-_G5.pem => b204d74a.0
VeriSign_Universal_Root_Certification_Authority.pem => c01cdfa2.0
Verisign_Class_1_Public_Primary_Certification_Authority.pem => 24ad0b63.0
Verisign_Class_1_Public_Primary_Certification_Authority_-_G2.pem => b8e83700.0
Verisign_Class_1_Public_Primary_Certification_Authority_-_G3.pem => ee1365c0.0
Verisign_Class_2_Public_Primary_Certification_Authority_-_G2.pem => cb357862.0
Verisign_Class_2_Public_Primary_Certification_Authority_-_G3.pem => dc45b0bd.0
Verisign_Class_3_Public_Primary_Certification_Authority.pem => 415660c1.0
Verisign_Class_3_Public_Primary_Certification_Authority_-_G2.pem => 1ec4d31a.0
Verisign_Class_3_Public_Primary_Certification_Authority_-_G3.pem => c0ff1f52.0
Verisign_Class_3_Public_Primary_Certification_Authority_2.pem => 415660c1.1
Visa_eCommerce_Root.pem => a760e1bd.0
WellsSecure_Public_Root_Certificate_Authority.pem => 7d5a75e4.0
WoSign.pem => 8096d0a9.0
WoSign_China.pem => 5d63b0ae.0
XRamp_Global_CA_Root.pem => 706f604c.0
certSIGN_ROOT_CA.pem => 8d86cdd1.0
ePKI_Root_Certification_Authority.pem => ca6e4ad9.0
thawte_Primary_Root_CA.pem => 2e4eed3c.0
thawte_Primary_Root_CA_-_G2.pem => c089bbbd.0
thawte_Primary_Root_CA_-_G3.pem => ba89ed3b.0
149 added, 0 removed; done.
Running hooks in /etc/ca-certificates/update.d...
done.
Remounting /etc/ssl/certs
root@LGwebOSTV:~# reboot

@dwilczek
Copy link

have the same issue....

@tatem68
Copy link

tatem68 commented Oct 23, 2023

Hi! Can you tell me if there is hope for an ssl update in webos 1.4?

@FluffyDiscord
Copy link

I am getting simply openssl:Error: 'rehash' is an invalid command. on webos 5.2.1

@C0rn3j
Copy link

C0rn3j commented Mar 31, 2024

https://webostv.developer.lge.com/develop/specifications/tls

Updated webOS 3.x and 4.x should have the certs working fine.
5.x should just be working.

This is according to the above statement by LG.
From my experience, updating does not jack, all the way to 05.50.15 (.10->.15, root survived) and I still get issuer errors.
This script does not seem to work either, unfortunately.

See webosbrew/webos-homebrew-channel#179

@stek29
Copy link
Author

stek29 commented Apr 1, 2024

@C0rn3j official LG Developer email has replied to me saying they won't fix this on older devices. I'm not sure if anything has changed since.

Date: Tue, 5 Oct 2021 06:51:15 +0300
Subject: webOS TV: Let's Encrypt DST Root CA X3 Expiration issues
From: Viktor Oreshkin <me@stek29.rocks>
To: developer@lge.com

Hello,
It seems that due to Let's Encrypt DST Root CA X3 Expiration and lack of
ISRG Root certificates in trusted CA list there's no way to access sites
using Let's Encrypt issued certificates in the web app, no matter how
remote web server is configured.

The issue affects at least TVs with webOS TV 4.x and older, I'm not sure
about newer models.
Oh, and we browser app works fine, I guess that's because it uses different
version or different trusted CA lists.

Could you please issue an update with new CA lists and fixing Let's Encrypt
in Web Engine for older TV models?

Thanks in advance,
Viktor Oreshkin.


Date: Tue, 5 Oct 2021 13:34:02 +0900
Subject: RE: webOS TV: Let's Encrypt DST Root CA X3 Expiration issues
From: DeveloperLG <developer@lge.com>
To: Viktor Oreshkin <me@stek29.rocks>

Hello,

Thank you for contacting us.

ISRG Root X1 of Let's Encrypt is supported since the webOS TV 5.0 and later only, and we don't have any update plans for it now.

If you want to support previous versions of the webOS TV, please use a supported certificate for them.
You can find trusted root certificates for each webOS TV in Web Engine.

Best regards,
LG Developer Site Team

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment