mirror of
https://github.com/therootcompany/greenlock-express.js.git
synced 2025-04-12 18:40:38 +00:00
Getting Net::ERR_CERT_COMMON_NAME_INVALID on Chrome #3
Loading…
x
Reference in New Issue
Block a user
No description provided.
Delete Branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
See attached image. Common name shows up as
*.commerceowl.com
.To make matters worse, it's only happening for some people (looks like Windows 10 machines are prone to this).
Click to see more info.
My guess is that the name on the certificate is something like
foo.com
and the domain being required isbar.com
.I believe that would be an error in the
approveDomains
logic.The dns-01 plugins are pretty new, so it could be an issue in greenlock itself, but I think that's less likely.
Is it all browsers on Windows 10? Or just a particular one?
Is it happening on other OSes at all?
I can't really get it reproduce at all. It's a weird firewall or some security software context where it happens.
So, for the domain (dns-01 authed using wildcard *.commerceowl.com)
evoo2.commerceowl.com
, Common Name in the cert ends up beingcoconut.sellwithrecipes.com
(http-01 authed custom domain). See screenshot.Thoughts on how approveDomains is causing this issue?
Whatever domain you list first becomes the subject of the certificate. All of the rest become altnames (SAN / SubjectAltName).
The list should be deterministic.
For any given domain you should always give back the same first domain name (the subject) and the same altnames.
If you're getting a request for one domain, but then you're giving it a more or less random domain as the certificate subject as the result of an unsorted database query I'm not sure what will happen.
What domains do you see in the SAN list on the cert?
Looks like this was a weird IT environment where some "security" tool was doing a MITM and replacing the cert.