-
Notifications
You must be signed in to change notification settings - Fork 343
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
TO: WARNING: SSL keys were successfully added for 'my-delivery-service', but the input certificate may be invalid (certificate verification produced a different chain) #7035
Comments
EXAMPLE of chain order
|
@zrhoffman thoughts on #3267 the first enhancement suggested relates to this issue:
|
Hmm I'm not seeing that TO changes the cert order. If the cert chain is in the wrong order, I get
Instead, the verifying certificate: certificate (x509v3) validation error: server certificate missing 'serverAuth' extended key usage warning seems to be coming from the fact that the TO host's root certificates are used for verification, rather than the user-provided root certificate. So, eliminating that warning does not seem related to the order of the certificate chain. |
But i we're genuinely interested in reordering the cert chain instead of getting the
error, we can probably always reorder it in leaf-intermediate-root order, since otherwise TO will produce that error. |
Okay, so @srijeet0406 and I looked into #7035, and the warning,
Is not related to certificate chain order at all, it happens because the root certificate provided in the chain is not one of the CA certs provided in the TO host's Receiving a warning when the root cert is not in |
Yes I think a better error is needed the existing one does not make sense in this case |
This Improvement request (usability, performance, tech debt, etc.) affects these Traffic Control components:
Current behavior:
POSTing a new certificate to
/deliveryservices/sslkeys/add
with the Root Certificate before the Leaf Certificate results in a 200-level response with a warning:New behavior:
An additional field, Certificate Chain Order, should be added to determine whether the validation expects the Leaf Certificate or the Root Certificate to be first. If this validation fails, a 400-level HTTP status code should be returned. Mock screenshot:
The text was updated successfully, but these errors were encountered: