-
Notifications
You must be signed in to change notification settings - Fork 28
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
TLS Certificate Issue #81
Comments
Please show me more curl log. |
* Trying 142.44.241.201:443...
* Connected to orbitalsolutions.ca (142.44.241.201) port 443 (#0)
* ALPN: offers h2,http/1.1
* TLSv1.3 (OUT), TLS handshake, Client hello (1):
* CAfile: /etc/ssl/certs/ca-certificates.crt
* CApath: /etc/ssl/certs
* TLSv1.3 (IN), TLS handshake, Server hello (2):
* TLSv1.3 (IN), TLS handshake, Encrypted Extensions (8):
* TLSv1.3 (IN), TLS handshake, Certificate (11):
* TLSv1.3 (OUT), TLS alert, unknown CA (560):
* SSL certificate problem: unable to get local issuer certificate
* Closing connection 0
curl: (60) SSL certificate problem: unable to get local issuer certificate
More details here: https://curl.se/docs/sslcerts.html
curl failed to verify the legitimacy of the server and therefore could not
establish a secure connection to it. To learn more about this situation and
how to fix it, please visit the web page mentioned above. |
I found that |
What do you suggest as a solution? I believe the issue is solved by the client using AIA, but this can't be expected by all clients. |
What is the version of your system? Is is relatively old? And you can see the test results of ssllabs. https://www.ssllabs.com/ssltest/analyze.html?d=orbitalsolutions.ca |
Is the certificate chain misconfigured or incomplete so the client has to go to the AIA endpoint? It looks like it is missing an intermediate cert so it is up to the client to pull it. Are you using transparent or reverse proxy? |
I am not sure how the server makes a difference since this is client side that has to pull from the AIA endpoint if intermediate certs are missing as is the case here. If you look at the openssl -connect output, the server is returning two certs in the chain. The intermediate cert that is missing is pulled by the browser from the AIA endpoint before it does the verification. |
Nginx is giving the correct chain to the client, while Pingap is not... That is why AIA is needed. This is what I provided to Pingap and Nginx https://help.configuressl.com/primessl-ca-bundle-rsa-dv-root-e46/ as the fullchain, so it should be working fine yet it isn't. |
What does
|
Do you try to use only chain certificate? |
Hello,
It seems after providing the TLS cert, TLS private key, and TLS chain some web clients seem to fail to verify the certificate. The domain in question is orbitalsolutions.ca, and I don't see anything in the logs showing an issues related to TLS.
The text was updated successfully, but these errors were encountered: