ERR_CERT_AUTHORITY_INVALID only on one network

My domain is: https://ifppm.org/

I ran this command: A friend works in a gov department with two networks, one more secure and one less secure and more open. The domain works fine on the more secure network, but returns an ERR_CERT_AUTHORITY_INVALID error on the open network. Both Chrome and Edge return the error. Yes, I double-checked this, you would think it would be the reverse, but it is only on the "less secure" network on which there is an issue.

It produced this output: I understand that the issue is likely my friend's network. But it is really important that my site be accessible there, so it is my problem now. I am hoping that someone has run into this, and can help me with suggestions to help my friend figure out why machines on their less secure network would have issues.

My web server is (include version): Hosted by SiteGround.

The operating system my web server runs on is (include version): Believe it is Fedora Linux.

My hosting provider, if applicable, is: Siteground.

I can login to a root shell on my machine (yes or no, or I don't know): No.

I'm using a control panel to manage my site (no, or provide the name and version of the control panel): I can ssh to the server, but do not have root access.

The version of my client is (e.g. output of certbot --version or certbot-auto --version if you're using Certbot): Unknown.

From my point of view there's nothing wrong with the certificate.

Without a more detailed error from this friend of yours I don't think there's much we can do to debug this remotely from the public internet. That friend should make screenshots of the certificate that the browser(s) have received. (My guess is some MitM firewall or other "security" device.)

5 Likes

Typically, an error like ERR_CERT_AUTHORITY_INVALID on a single network means that network is intercepting or filtering traffic in some way.

To debug further, it would be helpful to see what the browser's error message says.

In Chrome, you can click the ERR_CERT_AUTHORITY_INVALID message, and it will show some more info

To test that, you can see https://untrusted-root.badssl.com/

It'll have some extra info like this:

Subject: *.badssl.com
Issuer: BadSSL Untrusted Root Certificate Authority
Expires on: Jan 28, 2027
Current date: Jan 28, 2025

That may have a hint as to what the intercepting authority is.

7 Likes

Thanks, will do and report back. For now, is the message "Vendor signed No" returned by SSL Certificate Checker as below relevant?

image

1 Like

On that site, further down I see

And here is what I see as the presently being served certificate

$ openssl s_client -showcerts -servername ifppm.org -connect ifppm.org:443 < /dev/null
CONNECTED(00000003)
depth=2 C = US, O = Internet Security Research Group, CN = ISRG Root X1
verify return:1
depth=1 C = US, O = Let's Encrypt, CN = R11
verify return:1
depth=0 CN = *.ifppm.org
verify return:1
---
Certificate chain
 0 s:CN = *.ifppm.org
   i:C = US, O = Let's Encrypt, CN = R11
   a:PKEY: rsaEncryption, 2048 (bit); sigalg: RSA-SHA256
   v:NotBefore: Dec 13 21:07:18 2024 GMT; NotAfter: Mar 13 21:07:17 2025 GMT
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
 1 s:C = US, O = Let's Encrypt, CN = R11
   i:C = US, O = Internet Security Research Group, CN = ISRG Root X1
   a:PKEY: rsaEncryption, 2048 (bit); sigalg: RSA-SHA256
   v:NotBefore: Mar 13 00:00:00 2024 GMT; NotAfter: Mar 12 23:59:59 2027 GMT
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
---
Server certificate
subject=CN = *.ifppm.org
issuer=C = US, O = Let's Encrypt, CN = R11
---
No client certificate CA names sent
Peer signing digest: SHA256
Peer signature type: RSA-PSS
Server Temp Key: ECDH, secp384r1, 384 bits
---
SSL handshake has read 3283 bytes and written 767 bytes
Verification: OK
---
New, TLSv1.3, Cipher is TLS_AES_256_GCM_SHA384
Server public key is 2048 bit
Secure Renegotiation IS NOT supported
Compression: NONE
Expansion: NONE
No ALPN negotiated
Early data was not sent
Verify return code: 0 (ok)
---
DONE

And these all seem to believe the presently being severed certificate is fine

4 Likes

As @Bruce5051 pointed out, their info is not credible.

I just wanted to add that "your" SSL test site gives the same error even for this forum's domain name. It uses a poor cert validation technique that might have worked some years ago for Let's Encrypt but has not been kept updated.

Use any of the sites Bruce offered rather than that one :slight_smile:

7 Likes

So my friend on his network clicked the URL and got the following information. As you can see, the information circled is not correct at all.

Is there useful language I can use to help him talk to his IT people? Like, as an unrealistic example to illustrate what I mean, "it looks like your firewall is taking over communications on port 443 and misdirecting them to your internal certification authority. This is usually because switch TRAPCA is set to 001 when it should be set to 002".

Or other useful questions / information / communication I can give my friend to help solve this on his side?

That very much looks like a firewall or other device deliberately blocking connectivity.

That screenshot should be enough for them to understand what's going on.

6 Likes

Yet this is what I see

1 Like

Is your friend working at the Nuclear Regulatory Commission by any chance? :stuck_out_tongue:

I don't get any other reference to "NRC" that makes much sense.

Often, companies will set up their own private certificate authority and distribute that private root certificate among all the company computers, so their firewall can silently intercept all the trafic and do deep packet inspection even within an HTTPS connection. However, if one would plug in their own device, they wouldn't have this private root cert installed and thus get an error.

Also, this problem should also occur for other websites, not just yours.

3 Likes

Yes, my friend works at the "National Research Council", NRC. Which helps explain why, in his network, it says the CN, O, and U are NRC.

However, what makes it Let's Encrypt relevant is why my site is the only one that has this problem. On a daily basis, many people on his network visit sites all over the world, and as far as my friend knows, my site is the only one to have this problem, using Let's Encrypt .

Could there be something around (and I'm using very imprecise language here because I am guessing far beyond my expertise) that R11 is not a root certificate authority but farther down the chain, whereas most other sites have certificates that are authenticated by a first level root CA? Or something different about R11 and Let's Encrypt compared to other certificate setups?

I will pass on this information to him to see if there is something their IT can do. But since my site is the only one with the problem, I can see how their IT people would ask why it is their problem, and ask what is different about Let's Encrypt, or the way it is set up on my site.

We use Palo Alto firewall in the organization I am working. This firewall has also deep inspection enabled, terminating the TLS connections. However, we maintain a list of well-known websites, there we do not terminate the connection, just let them passthrough. May be your friend is accessing mostly similarly sites that are whitelisted from deep inspection?

4 Likes

I'm pretty sure that this is most certainly not a Let's Encrypt issue. Chances are that among those working sites your friend can visit, one or more are also secured by a Let's Encrypt certificate, as Let's Encrypt has a market share of about 60 % worldwide.

R11 indeed is not a root certificate, but an intermediate certificate. However, your site also sends this intermediate in the TLS ClientHello, which it should do. That way, browsers can use their internal root store to generate a chain from the certificate from your site, using the intermediate, to the root certificate in the browsers root store.
This is normal CA behaviour and not different from any CA. In fact, publicly trusted CAs are not even allowed to directly sign an end leaf certificate using the actual root certificate. An intermediate is mandatory.

That said, who knows what kind of settings the tech boys and girls of National Research Council have configured in their firewall?

In the link about market share above there's also a section called "Popular sites using Let’s Encrypt". Your friend could try those sites and see if it's Let's Encrypt or not. If all of those sites also refuse to work, then maybe Let's Encrypt indeed is the issue.

3 Likes

Thanks very much folks. My friend did some testing, and most Let's Encrypt sites were accessible, but some were not, strong indication of a whitelist at play. He will check further, and I will advise the outcome.

3 Likes

Confirmed, it was simply a whitelist problem. As @bruncsak noted, there must be a firewall that is terminating TLS connections unless whitelisted. The last post by @Osiris was helpful to my friend (he came onto this forum and read the thread).

A request was made to whitelist, and now the site is accessible. Thanks to all for the help.

3 Likes