Google has detected that the SSL/TLS certificate used on https://www.... is self-signed, which means that it was issued by your server rather than by a Certificate Authority. Because only Certificate Authorities are considered trusted sources for SSL/TLS certificates, your certificate cannot be trusted by most of the browsers. In addition, a self-signed certificate means that your content is not authenticated, it can be modified, and your userās data or browsing behavior can be intercepted by a third-party. As a result, many web browsers will block users by displaying a security warning message when your site is accessed. This is done to protect usersā browsing behavior from being intercepted by a third party, which can happen on sites that are not secure.
Recommended Action:
Get a new certificate
To correct this problem, you need to get a new, dedicated SSL/TLS certificate from a trusted Certificate Authority (CA). This certificate must match your complete site URL, or be a wildcard certificate that can be used for multiple subdomains on a domain.
It looks like youāve just picked a few lines out of the ssllabs report, which arenāt very helpful in determining whether your server is actually using a Letsencrypt cert. In the top block of the report (marked Authentication), under Server Key and Certificate #1, what does it say for Issuer? What does it say next to Trusted? What about under Additional Certificates and Certification Paths?
The insecure protocols are a problem, and you should configure your server to disable them, but they arenāt causing anyone to believe you have a self-signed certificate.
As @danb35 has mentioned your reports are incomplete.
By removing your URL in your first post and only providing a partial report in your second you essentially hindering anyone helping you.
If you have a website live and accessible through the internet then you donāt need to obscure the information on this website, additionally with open vulnerabilities you should look to get help as soon as possible.
If you provide the full reports then members of this community will be able to help you.
I would imagine though from the partial reports that you are not using the LetsEncrypt issued certificate and have a server environment that has not been configured correctly.
Based on your comments, I analyzed the warnings in the reports, and was able to fix my httpd.conf appropriately. The key was to remove SSL-v3 support and to activate forward secrecy. Iām now at an A+ rating instead of C!
hmmā¦ Iāve added my site to Google Webmaster tools again, and AGAIN received the email stating that
"Self signed SSL/TLS certificate for [domain]".
My website even got an A+ rating on ssllabs.com, but Google thinks itās self-signed?!
In my browser (iPhone) (safari & chrome) your cert looks fine and is trusted. And in SSL detective it looks fine too. Not sure whatās up with Google.
In webmaster tools you did actually add it as an https://ā¦ Site I assume correct?
Yes, the email from Google refers to the https:// ā¦ version (only) and nags me about the āself-signed certificateā on this site.
I have added the http:// version too (separately) in Webmaster tools, but iirc, thatās the recommended way to do it. I donāt think thatās the reason for the problem.
Iām not 100% positive but i would have to imagine Google would accept the higher bit cert. I can find no evidence to the contrary. I will try it out with one of my domains and a 4096 key. standby.
I think I have found out the reason with a helpful reply in another forum. Looks like if the server doesnāt provide SNI support, Google reports this problem as it tests the certificate with a non-SNI compatible bot (!).
So Iāll have to figure out how to enable SNI support on my CentOS/Plesk server and will update the thread according to my findingsā¦ not sure how to have Google fetch/test my site again though.
I donāt know anything about Google bot nor Plesk, but Iām pretty sure your site is using SNI.
Here is what a browser/bot/etc. without SNI support will get trying to connect to your web server:
$ openssl s_client -connect www.psychotherapiepraxis.at:443 -CApath /etc/ssl/certs/ CONNECTED(00000003)
depth=0 C = US, ST = Washington, L = Seattle, O = Odin, OU = Plesk, CN = Plesk, emailAddress = info@plesk.com
verify error:num=18:self signed certificate
verify return:1
depth=0 C = US, ST = Washington, L = Seattle, O = Odin, OU = Plesk, CN = Plesk, emailAddress = info@plesk.com
verify return:1
---
Certificate chain
0 s:/C=US/ST=Washington/L=Seattle/O=Odin/OU=Plesk/CN=Plesk/emailAddress=info@plesk.com
i:/C=US/ST=Washington/L=Seattle/O=Odin/OU=Plesk/CN=Plesk/emailAddress=info@plesk.com
---
Server certificate
-----BEGIN CERTIFICATE-----
MIIDfTCCAmUCBFZqMucwDQYJKoZIhvcNAQELBQAwgYIxCzAJBgNVBAYTAlVTMRMw
EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdTZWF0dGxlMQ0wCwYDVQQKEwRP
ZGluMQ4wDAYDVQQLEwVQbGVzazEOMAwGA1UEAxMFUGxlc2sxHTAbBgkqhkiG9w0B
CQEWDmluZm9AcGxlc2suY29tMB4XDTE1MTIxMTAyMjAyM1oXDTE2MTIxMDAyMjAy
M1owgYIxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH
EwdTZWF0dGxlMQ0wCwYDVQQKEwRPZGluMQ4wDAYDVQQLEwVQbGVzazEOMAwGA1UE
AxMFUGxlc2sxHTAbBgkqhkiG9w0BCQEWDmluZm9AcGxlc2suY29tMIIBIjANBgkq
hkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA37HX+ZsmC1iZ1pdDwQMaHCfk2eP3qQyF
PvKnPUXjVjv+pCEC1fME8FCCZjwcKcVkMGBFbQzip8DxMn/9jlD7i7Zr/7pWG+Sn
DZBpWziqZf9zdWmqSEVDbi9djYSGVNH3udk+SjmmUp0J/d/4JR/+oyhTz2x/mf0n
z5yMwZJ7GFg2KZmG12kvYoHBJ3PnUlpTUvSpYoTtmWq8jj609bIVcPlpLiQYUKe3
eJSHQL9tTAsTygt0dtuoz5dldWe76WqmE1p7MvmPxUYdH3cN6r3A8Y/71aTTEWaC
1AHeT/kC29ifC+mb+g8YBDQuXkydVR71rR8+Ap23LVVfQ4+u+aLPGQIDAQABMA0G
CSqGSIb3DQEBCwUAA4IBAQA9x96iXqANS8T/N830FSBsH36f9/IURJ1xoeqxAOxN
ej2Y9A/lIAjhykuC3YSPIQ7rdw/ZxVf1UMjwrukwCIQ7fL63Z96pIPDh6zZJKmnI
jNJPtAqv1VAc/YyqKr8PaTwkWu1mcj+snhAuKhpf1YWrGo5+WzKAOv9Ykc2V5Mir
d7DrIGWSJkKwxVT+/0t+MDTLE5n7DIWKC5zdu9ydJkgcZnACTUv2mKMEhoe8v/50
j45DPAkxMesBjY4guYP/YzMqg4ocjutJAaIjVcRXKN6I8IAH7bGSO+R8lqVc4K1M
epr8/mQQCTiKgGBp/nKlz3EpV7nbcwPixJL1RvQDuLAu
-----END CERTIFICATE-----
subject=/C=US/ST=Washington/L=Seattle/O=Odin/OU=Plesk/CN=Plesk/emailAddress=info@plesk.com
issuer=/C=US/ST=Washington/L=Seattle/O=Odin/OU=Plesk/CN=Plesk/emailAddress=info@plesk.com
---
No client certificate CA names sent
---
SSL handshake has read 1588 bytes and written 424 bytes
---
New, TLSv1/SSLv3, Cipher is ECDHE-RSA-AES256-GCM-SHA384
Server public key is 2048 bit
Secure Renegotiation IS supported
Compression: NONE
Expansion: NONE
SSL-Session:
Protocol : TLSv1.2
Cipher : ECDHE-RSA-AES256-GCM-SHA384
Session-ID: B078EAD3B7BE2168425E35FE7F8045CA32A175B89831DFC1E8AE42BE60D30499
Session-ID-ctx:
Master-Key: 4EF4BFB3D33D5288BFDCA0BD555B80BF9121EE03C245BDB7A5D124D1F3AA314C0AA9F6BD044622E4333752A3D386D39E
Key-Arg : None
PSK identity: None
PSK identity hint: None
SRP username: None
TLS session ticket lifetime hint: 300 (seconds)
TLS session ticket:
0000 - ab df 21 1c cb ae cb 61-c7 63 09 30 9d 31 6f 85 ..!....a.c.0.1o.
0010 - 0d 2e 0f ea 58 3b ee 6c-bd 98 cf 3b aa 9e 2e a7 ....X;.l...;....
0020 - a4 38 13 88 0d 13 6d 7d-59 56 be 32 2c 9a 79 bc .8....m}YV.2,.y.
0030 - ec 34 30 29 9f c8 ab 03-8a d9 61 f1 8a e2 5e f4 .40)......a...^.
0040 - cb 0e c9 b0 c4 69 6a f2-e4 d0 14 15 e5 8a 4f 85 .....ij.......O.
0050 - 5a be 44 dc cc 7c f7 9e-37 30 db d7 48 1c 3a 9c Z.D..|..70..H.:.
0060 - cd 85 e2 7d 98 90 51 2e-ca c3 c0 69 9a f8 b6 85 ...}..Q....i....
0070 - 06 53 c5 0c 27 23 d4 02-23 dd 9d 30 5c bb e3 80 .S..'#..#..0\...
0080 - fe a5 41 19 b9 48 37 33-d2 02 c9 b2 9f e3 6e 1a ..A..H73......n.
0090 - 18 98 7d c3 8e 5b 2a ed-1c cb dd 9c c4 a2 a9 aa ..}..[*.........
00a0 - 19 99 dc 8f 0a 8f 20 90-e9 51 7d ca ea a7 25 f4 ...... ..Q}...%.
00b0 - 7c cd 3a 7c d0 b2 ef 07-f8 de 19 82 c3 64 4d c3 |.:|.........dM.
Start Time: 1450736596
Timeout : 300 (sec)
Verify return code: 18 (self signed certificate)
And this is what a browser/bot/etc. with SNI support will get:
$ openssl s_client -connect www.psychotherapiepraxis.at:443 -servername www.psychotherapiepraxis.at -CApath /etc/ssl/certs/
CONNECTED(00000003)
depth=2 O = Digital Signature Trust Co., CN = DST Root CA X3
verify return:1
depth=1 C = US, O = Let's Encrypt, CN = Let's Encrypt Authority X1
verify return:1
depth=0 CN = www.psychotherapiepraxis.at
verify return:1
---
Certificate chain
0 s:/CN=www.psychotherapiepraxis.at
i:/C=US/O=Let's Encrypt/CN=Let's Encrypt Authority X1
1 s:/C=US/O=Let's Encrypt/CN=Let's Encrypt Authority X1
i:/O=Digital Signature Trust Co./CN=DST Root CA X3
---
Server certificate
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
subject=/CN=www.psychotherapiepraxis.at
issuer=/C=US/O=Let's Encrypt/CN=Let's Encrypt Authority X1
---
No client certificate CA names sent
---
SSL handshake has read 3773 bytes and written 460 bytes
---
New, TLSv1/SSLv3, Cipher is ECDHE-RSA-AES256-GCM-SHA384
Server public key is 4096 bit
Secure Renegotiation IS supported
Compression: NONE
Expansion: NONE
SSL-Session:
Protocol : TLSv1.2
Cipher : ECDHE-RSA-AES256-GCM-SHA384
Session-ID: 657BB6D1081E964C6858640032A54E35C3CF0688A36B2826F533656405EE1BB5
Session-ID-ctx:
Master-Key: 1749CBAA9E46C162DAF967577BEBA669DCD1327557F91BEDEAA302A81F60664E9C3A0C63EA8D114EAB02D0A440F3FD07
Key-Arg : None
PSK identity: None
PSK identity hint: None
SRP username: None
TLS session ticket lifetime hint: 300 (seconds)
TLS session ticket:
0000 - ab df 21 1c cb ae cb 61-c7 63 09 30 9d 31 6f 85 ..!....a.c.0.1o.
0010 - 91 71 81 af aa b3 1a a0-d0 29 ca 66 b7 40 27 b5 .q.......).f.@'.
0020 - 6e ff 93 54 ae ed ad c5-fb 6b df 1a 7a 2a dd 5f n..T.....k..z*._
0030 - 9a d1 a1 41 2b 72 36 e9-06 be 8a 8c a6 cd 65 c0 ...A+r6.......e.
0040 - c9 21 a3 08 cd 02 73 44-c9 ad 2b 52 b0 91 c2 63 .!....sD..+R...c
0050 - 07 ce 0b 78 1b 64 02 0a-24 5c fe e5 a2 53 a6 12 ...x.d..$\...S..
0060 - f8 cf c9 40 aa 84 48 24-0e f6 3a 21 89 b5 c1 70 ...@..H$..:!...p
0070 - 1a 70 a2 8a 19 8b ea 00-05 1b e1 b3 14 c9 cf b6 .p..............
0080 - c4 c7 06 7e ed 1a 8b fe-6e 6d e2 fb 3a da c1 97 ...~....nm..:...
0090 - 99 aa c9 1c f1 85 40 44-d6 a2 62 6d 81 31 3c 75 ......@D..bm.1<u
00a0 - 57 4c b9 db dc 1e ac 26-04 b1 c4 b0 34 a0 47 03 WL.....&....4.G.
00b0 - 83 bc c7 24 b9 c4 c5 1a-84 64 0b 13 c9 5c 55 d7 ...$.....d...\U.
00c0 - 8c ad 8b 8a e1 d9 d2 a1-8d 8f cb e6 27 0e f9 3e ............'..>
00d0 - 72 d9 9e 70 4b 9c ca 19-b4 2f 75 8d a6 ec 17 80 r..pK..../u.....
Start Time: 1450736739
Timeout : 300 (sec)
Verify return code: 0 (ok)
The first certificate is a self-signed certificate by Plesk, I donāt know what is this cert used forā¦ also, donāt know if you share that plesk server, maybe you could change the default cert (plesk signed cert) by your own cert, so the Google bot will see your site cert correctly, donāt knowā¦ Iām here only to tell you that your site supports SNI ;).
So perhaps I can learn something here as well; all of my sites use SNI (except one) and have yet never received such a warning from google or elsewhere. If it is related to SNI, what about his config would be causing issues?
Thanks for your response, Sahsanu! Iām learning something new every day right now!
I feel weāre getting closer. Basically I was thinking that my (brand new w/ Plesk 12 and CentOS 7) server supports SNI, I just have to set it up the right way!
Looks like Iāll have to go through Plesk to avoid my settings being overwritten at every little change of config of OS update. In domain settings, Plesk asks me for
Private key (.key) *
Certificate (.crt) *
CA certificate (*-ca.crt)
I guess āPrivate Keyā is supposed to be privkey.pem, āCertificateā is cert.pem, and āCA Certificateā fullchain.pem?
Clients that do not properly support SNI will end up getting all the certs tied to that IP, and may freak out for any irregularity that involves any of those certs. In this case the self-signed cert needs to be removed, or the server needs to be configured in such a way to serve the desired cert as primary. For example, nginx has a setting called default_server for this purpose: https://tech.mendix.com/linux/2014/10/29/nginx-certs-sni/
do you have some information on how to do that without nginx (only Apache)? I have Apache 2.4.6 installed. I have spent 2 days and night so far without being able to find out how to serve non-sni capable browsers correctly.