Hi,

I noticed your server certificate is issued by a commonly trusted
authority but in some circumstances clients still have difficulties
validating it.

The reason for that is that your certificate is issued by
"CN = Starfield Secure Certification Authority"
which is an intermediate certificate authority (issued by "OU =
Starfield Class 2 Certification Authority"). Debian's ca-certificates
(ver. 20090814+nmu2) comes with
"OU = Starfield Class 2 Certification Authority"
which is considered to be trusted.

To allow an SSL/TLS client to validate all the chain up to a trusted
root CA, it should have all the certificates in the chain. With Apache
it's usually done with "SSLCertificateChainFile" option.

Manual testing is possible with:
openssl s_client -connect dev.openwrt.org:443 -CApath /etc/ssl/certs/

HTH
-- 
Be free, use free (http://www.gnu.org/philosophy/free-sw.html) software!
mailto:fercer...@gmail.com
_______________________________________________
openwrt-devel mailing list
openwrt-devel@lists.openwrt.org
https://lists.openwrt.org/mailman/listinfo/openwrt-devel

Reply via email to