Linode Forum
Linode Community Forums
 FAQFAQ    SearchSearch    MembersMembers      Register Register 
 LoginLogin [ Anonymous ] 
Post new topic  Reply to topic
Author Message
PostPosted: Wed Feb 04, 2015 4:31 am 
Offline
Senior Newbie

Joined: Sun Jan 04, 2015 10:43 pm
Posts: 9
Hi guys,

I bought a cheap RapidSSL certificate for my domain and I hooked it up in Nodebalancer. All seems to work just fine on my desktop until I brought up the site in Chrome on mobile. I was presented with an "Your connection is not private" message. At the bottom it says "NET::ERR_CERT_AUTHORITY_INVALID". The same thing happens in Firefox as well. After a bit of digging it turns out that mobile browsers seem to handle certificates a bit differently (but I don't fully understand the details of it though).

I've been trying to figure out how I can fix this but I can't seem to find the right information. Could some please point me in the right direction?

Thanks!


Top
   
PostPosted: Wed Feb 04, 2015 8:56 am 
Offline
Senior Member

Joined: Fri May 02, 2008 8:44 pm
Posts: 1121
Did you also install all the intermediate certificates that came with your RapidSSL cert? The error message seems to indicate that you are missing one or more of the intermediate certificates that are required to link your SSL cert with an authority that your browser trusts.


Top
   
PostPosted: Wed Feb 04, 2015 4:34 pm 
Offline
Senior Newbie

Joined: Sun Jan 04, 2015 10:43 pm
Posts: 9
I'm not sure I was supposed to. Maybe I misunderstood the docs. There are two boxes for certificates, one for the service certificate and the other for the private key. In the Nodebalancer reference [1] there is talk about "Chained certificates" but I'm not sure if this applies to me.

The certificate is for a single domain which I guess is the most standard set up. I'm not sure about multiple certificates...

Any help is much appreciated.


Top
   
PostPosted: Thu Feb 05, 2015 8:30 am 
Offline
Senior Member

Joined: Fri May 02, 2008 8:44 pm
Posts: 1121
The box for certificates will accept multiple certificates, concatenated ("chained") one after another, like this:

Code:
-----BEGIN CERTIFICATE-----
BLAH BLAH BLAH BLAH BLAH BLAH BLAH BLAH
BLAH BLAH BLAH BLAH BLAH BLAH BLAH BLAH
BLAH BLAH BLAH BLAH BLAH BLAH BLAH BLAH
-----END CERTIFICATE-----
-----BEGIN CERTIFICATE-----
BLAH BLAH BLAH BLAH BLAH BLAH BLAH BLAH
BLAH BLAH BLAH BLAH BLAH BLAH BLAH BLAH
BLAH BLAH BLAH BLAH BLAH BLAH BLAH BLAH
-----END CERTIFICATE-----
-----BEGIN CERTIFICATE-----
BLAH BLAH BLAH BLAH BLAH BLAH BLAH BLAH
BLAH BLAH BLAH BLAH BLAH BLAH BLAH BLAH
BLAH BLAH BLAH BLAH BLAH BLAH BLAH BLAH
-----END CERTIFICATE-----


All cheap certificates nowadays are chained certificates. The browser does not directly trust the certificate for your domain. It is trusted only because it can be chained with another certificate that the browser trusts. Sometimes, the chained certificate itself needs to be chained to yet another certificate, all the way to the "root certificate" that is guaranteed to be trusted by all browsers. The long chain makes it easier for SSL vendors to manage subsidiaries and minimizes damage in case a part of the chain is compromised.

The chain certificates for RapidSSL are available here. (Don't take my word for it, verify it yourself. You should have received the same "certificate bundle" in the confirmation email when you purchased your certificate.)


Top
   
Display posts from previous:  Sort by  
Post new topic  Reply to topic


Who is online

Users browsing this forum: No registered users and 5 guests


You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum

Search for:
Jump to:  
RSS

Powered by phpBB® Forum Software © phpBB Group