HTTPS monitor fails with (9260) SSL certificate problem: self signed certificate in certificate chain (Peer certificate cannot be authenticated with given CA certificates) when run from San Francisco but not other locations.
Release : SAAS
Component : CA APP SYNTHETIC MONITOR (WATCHMOUSE)
Path #1: Trusted
|
||
1 | Sent by server | server.mydomain.com Fingerprint SHA256: fb9246d694c8280e38ff4514df66e97dfad93c8826c3059642c797b98f909465 Pin SHA256: PiM1i4DeUPbLlJnaoAbeZqeWtBO616nKJw2+EfzPToU= RSA 2048 bits (e 65537) / SHA256withRSA |
2 | Sent by server | COMODO RSA Organization Validation Secure Server CA Fingerprint SHA256: 111006378afbe8e99bb02ba87390ca429fca2773f74d7f7eb5744f5ddf68014b Pin SHA256: EgNpQklEUNXn9Nl6RoIOC532j1g5+EFw0ZpLxxJq9Ms= RSA 2048 bits (e 65537) / SHA384withRSA |
3 | Sent by server In trust store |
COMODO RSA Certification Authority Self-signed Fingerprint SHA256: 52f0e1c4e58ec629291b60317f074671b85d7ea80d5b07273463534b32b40234 Pin SHA256: grX4Ta9HpZx6tSHkmCrvpApTQGo67CYDnvprLg5yRME= RSA 4096 bits (e 65537) / SHA384withRSA |
Path #2: Trusted
|
||
1 | Sent by server | server.mydomain.com Fingerprint SHA256: fb9246d694c8280e38ff4514df66e97dfad93c8826c3059642c797b98f909465 Pin SHA256: PiM1i4DeUPbLlJnaoAbeZqeWtBO616nKJw2+EfzPToU= RSA 2048 bits (e 65537) / SHA256withRSA |
2 | Sent by server | COMODO RSA Organization Validation Secure Server CA Fingerprint SHA256: 111006378afbe8e99bb02ba87390ca429fca2773f74d7f7eb5744f5ddf68014b Pin SHA256: EgNpQklEUNXn9Nl6RoIOC532j1g5+EFw0ZpLxxJq9Ms= RSA 2048 bits (e 65537) / SHA384withRSA |
3 | Extra download | COMODO RSA Certification Authority Fingerprint SHA256: 38392f17ce7b682c198d29c6e71d2740964a2074c8d2558e6cff64c27823f129 Pin SHA256: grX4Ta9HpZx6tSHkmCrvpApTQGo67CYDnvprLg5yRME= RSA 4096 bits (e 65537) / SHA384withRSA |
4 | In trust store | AAA Certificate Services Self-signed Fingerprint SHA256: d7a7a0fb5d7e2731d771e9484ebcdef71d5f0c3e0a2948782bc83ee0ea699ef4 Pin SHA256: vRU+17BDT2iGsXvOi76E7TQMcTLXAqj0+jGPdW7L1vM= RSA 2048 bits (e 65537) / SHA1withRSA Weak or insecure signature, but no impact on root certificate |
There are many factors that could affect which certificate path is used for a connection and determining why a particular one is used would be a resource intensive activity and ultimately would not solve the problem
The solution is that the certificate path needs to be corrected to include the missing certificate.