Chrome not using cert, Firefox is

When I visit the site with Chrome the returned error is NET::ERR_CERT_COMMON_NAME_INVALID. Using Firefox, the cert common name is correct.

My domain is: cmmsandbox.eli.org

I ran this command:

It produced this output:

My web server is (include version): Apache/2.4.41 (Ubuntu)

The operating system my web server runs on is (include version): Ubuntu 20.04.4 LTS

My hosting provider, if applicable, is: Linode

I can login to a root shell on my machine (yes or no, or I don't know): yes

I'm using a control panel to manage my site (no, or provide the name and version of the control panel): no

The version of my client is (e.g. output of certbot --version or certbot-auto --version if you're using Certbot): certbot 1.32.1

Hi @steveplatz, and welcome to the LE community forum :slight_smile:

SSL Labs shows a cert name mismatch:
SSL Server Test: cmmsandbox.eli.org (Powered by Qualys SSL Labs)

We are talking about Apache...
So, take nothing for granted!
What shows?:
apachectl -t -D DUMP_VHOSTS

3 Likes

Using this online tool SSL Server Test (Powered by Qualys SSL Labs) the results SSL Server Test: cmmsandbox.eli.org (Powered by Qualys SSL Labs) show that 2 different Certificates are being served.

Certificate #1: RSA 2048 bits (SHA256withRSA) Alternative names	cmmsandbox.eli.org cmmsandbox.elr.info
Certificate #2: RSA 2048 bits (SHA256withRSA) Alternative names eli.org www.eli.org **MISMATCH**
1 Like

What could cause that?

Server configuration.

2 Likes

Apart from server config, you might just need to restart Apache. Sometimes some Apache tasks get stuck and will serve a prior cert. I think this is likely your problem as I get different certs for the same repeated request (not related to chrome | firefox).

Note the different Common Name (CN) on identical requests made seconds apart:

echo | openssl s_client -connect cmmsandbox.eli.org:443  | head

Certificate chain
 0 s:CN = eli.org
   i:C = US, O = Let's Encrypt, CN = R3
   a:PKEY: rsaEncryption, 2048 (bit); sigalg: RSA-SHA256
   v:NotBefore: Nov 23 12:44:07 2022 GMT; NotAfter: Feb 21 12:44:06 2023 GMT

=================================
echo | openssl s_client -connect cmmsandbox.eli.org:443  | head

Certificate chain
 0 s:CN = cmmsandbox.eli.org
   i:C = US, O = Let's Encrypt, CN = R3
   a:PKEY: rsaEncryption, 2048 (bit); sigalg: RSA-SHA256
   v:NotBefore: Dec  7 21:47:34 2022 GMT; NotAfter: Mar  7 21:47:33 2023 GMT
3 Likes

Nice work @MikeMcQ, now that I tried that I see it as well from my location.

2 Likes

I added the certs with certbot - wouldn't certbot restart apache after finishing the config changes?

The --apache plug-in would do a reload which only affects viable workers. It is possible an Apache worker has been stuck for a long time and only seeing implications of that now. Stuff happens.

If you did not use the plug-in (did webroot or something) then you are responsible for reload.

3 Likes

OK, after restart I'm seeing the previous issue clear-up. Thanks, super easy!

3 Likes

Good. Looks good to me too. I tried like 10 openssl requests and all were correct

3 Likes

This topic was automatically closed 30 days after the last reply. New replies are no longer allowed.