Forum Discussion
custom clientssl profile not working & giving warning to clients.
Hi, we have deployed LTM with custom client profile. SSL certificate is from Go Daddy and we have imported client SSL certificates, private keys, and Bundle certificate. Also configured Bundle certificate in Chain parameter, however, for 1 VS it is working fine; but for other VS it's giving warning to client. What could be the reason and possible solution? WE have verified SSL certificates with Keys as well as Certificates & Bundle through openssl commands and it is OKay.
5 Replies
- Pranav_73262
Nimbostratus
Note: parent profile is default clentssl profile and we are using wildcard certificate with 1 wildcard. what warning does the client get?
it could have something to do with the hostname and what the certificate is good for. could you share that information?
if not just check yourself what the hostname is you going to and what the certificate CN is. remember that with a *.domain.com wildcard certificate you usually cant use it on domain.com
- Kevin_Stewart
Employee
A client side certificate error is usually one of three things. The certificate that the server has presented to the client in the SSL handshake:
-
Is expired or invalid in some way.
-
Its x509 subject (or subjectAltName) is not the same host name that the client requested (this also happens when you access by IP address).
-
Is not trusted. A client OS/browser will have an explicitly stored list of trusted certificate authority certificates. When the server presents its certificate to the client, the client must be able to establish a complete trust chain with that certificate from the certificates in its store. So for example, if you have a 3-level certificate architecture (CA -> subCA -> issued certs), but the client only has the root CA in its trust store, the client would be unable to build a complete chain. Perhaps the easiest thing to do here is download the server's cert to the affected client machine and open it up. If Windows, go to the Certificate Path tab of the Certificate viewer to see if the client can build the path to the root CA.
For what it's worth, bundle certificates, chain parameters, and trusted and advertised certificate authority options are all only required when the client is passing a certificate to the server. These settings are not used when the server is passing a certificate to the client.
-
- Pranav_73262
Nimbostratus
Thanks. It is working now somehow.
- Pranav_73262
Nimbostratus
We got wrong bundle and hence it was creating issue. We added correct bundle in Chain parameter and it started working fine. Thanks.
Help guide the future of your DevCentral Community!
What tools do you use to collaborate? (1min - anonymous)Recent Discussions
Related Content
* Getting Started on DevCentral
* Community Guidelines
* Community Terms of Use / EULA
* Community Ranking Explained
* Community Resources
* Contact the DevCentral Team
* Update MFA on account.f5.com