SSL cert “err_cert_authority_invalid” on mobile chrome only

后端 未结 12 1692
轻奢々
轻奢々 2021-01-30 12:22

Domain: https://www.amz2btc.com

Analysis from SSL Labs: https://www.ssllabs.com/ssltest/analyze.html?d=amz2btc.com

All my desktop browsers open this fine. Mob

相关标签:
12条回答
  • 2021-01-30 13:01

    I had this same problem while hosting a web site via Parse and using a Comodo SSL cert resold by NameCheap.

    You will receive two cert files inside of a zip folder: www_yourdomain_com.ca-bundle www_yourdomain_com.crt

    You can only upload one file to Parse: Parse SSL Cert Input Box

    In terminal combine the two files using:

    cat www_yourdomain_com.crt www_yourdomain_com.ca-bundle > www_yourdomain_com_combine.crt
    

    Then upload to Parse. This should fix the issue with Android Chrome and Firefox browsers. You can verify that it worked by testing it at https://www.sslchecker.com/sslchecker

    0 讨论(0)
  • 2021-01-30 13:02

    I had the same probleme but the response made by Mike A helped me to figure it out: I had a my certificate, an intermediate certificate (Gandi) , an other intermediate (UserTrustRSA) and finally the RootCA certificate (AddTrust).

    So first i made a chain file with Gandi+UserTrustRSA+AddTrust and specified it with SSLCertificateChainFile. But it didn't worked.

    So i tried MikeA answer by just putting AddTruct cert in a file and specified it with SSLCACertificateFile and removing SSLCertificateChainFile.But it didn't worked.

    So finnaly i made a chain file with only Gandi+UserTrustRSA specified by SSLCertificateChainFile and the other file with only the RootCA specified by SSLCACertificateFile and it worked.

    #   Server Certificate:
    SSLCertificateFile /etc/ssl/apache/myserver.cer
    
    #   Server Private Key:
    SSLCertificateKeyFile /etc/ssl/apache/myserver.key
    
    #   Server Certificate Chain:
    SSLCertificateChainFile /etc/ssl/apache/Gandi+UserTrustRSA.pem
    
    #   Certificate Authority (CA):
    SSLCACertificateFile /etc/ssl/apache/AddTrust.pem
    

    Seems logical when you read but hope it helps.

    0 讨论(0)
  • 2021-01-30 13:02

    I guess you should install CA certificate form one if authority canter:

    ssl_trusted_certificate ssl/SSL_CA_Bundle.pem;

    0 讨论(0)
  • 2021-01-30 13:05

    For those having this problem on IIS servers.

    Explanation: sometimes certificates carry an URL of an intermediate certificate instead of the actual certificate. Desktop browsers can DOWNLOAD the missing intermediate certificate using this URL. But older mobile browsers are unable to do that. So they throw this warning.

    You need to

    1) make sure all intermediate certificates are served by the server

    2) disable unneeded certification paths in IIS - Under "Trusted Root Certification Authorities", you need to "disable all purposes" for the certificate that triggers the download.

    PS. my colleague has wrote a blog post with more detailed steps: https://www.jitbit.com/maxblog/21-errcertauthorityinvalid-on-android-and-iis/

    0 讨论(0)
  • 2021-01-30 13:05

    The report from SSLabs says:

      This server's certificate chain is incomplete. Grade capped to B.
      ....
      Chain Issues                  Incomplete
    

    Desktop browsers often have chain certificates cached from previous connections or download them from the URL specified in the certificate. Mobile browsers and other applications usually don't.

    Fix your chain by including the missing certificates and everything should be right.

    0 讨论(0)
  • 2021-01-30 13:06

    I hope i am not too late, this solution here worked for me, i am using COMODO SSL, the above solutions seem invalid over time, my website lifetanstic.co.ke

    Instead of contacting Comodo Support and gain a CA bundle file You can do the following:

    When You get your new SSL cert from Comodo (by mail) they have a zip file attached. You need to unzip the zip-file and open the following files in a text editor like notepad:

    AddTrustExternalCARoot.crt
    COMODORSAAddTrustCA.crt
    COMODORSADomainValidationSecureServerCA.crt
    

    Then copy the text of each ".crt" file and paste the texts above eachother in the "Certificate Authority Bundle (optional)" field.

    After that just add the SSL cert as usual in the "Certificate" field and click at "Autofil by Certificate" button and hit "Install".

    Inspired by this gist: https://gist.github.com/ipedrazas/6d6c31144636d586dcc3

    0 讨论(0)
提交回复
热议问题