Dear Maxim,

On my Ubuntu FF uses CAs from /etc/ssl/certs/, Chrome seems to use internal CAs
Can you check with keytool your keystore contains full chain (including CA)?

Example 
https://www.sslshopper.com/article-most-common-java-keytool-keystore-commands.html

keytool -list -v -keystore keystore.jks
My certificate chain is Root CA -> Intermediate CA from Let'e Encrypt -> RMTPS certificate.

When looking into the keystore, I see only the Intermediate CA -> RMTPS certificate chain. The root CA is not included. Is it needed to be present as well to make everything working?

I used these commands on the keystore:
# keytool -importkeystore -srckeystore <tmp>/openmeetings.p12 -srcstoretype PKCS12 -destkeystore /opt/openmeetings/conf/keystore.jmx -alias red5 # keytool -import -keystore /opt/openmeetings/conf/keystore.jmx -trustcacerts -file /etc/letsencrypt/live/openmeetings/chain.pem -alias letsencrypt

When trying to add the root CA I got the message stating that that certificate was already known in the global CA keystore. I force-added it now to test out the effect. The result is the same: Firefox cannot connect. I did not redo my sniffing. I assume it will look similar.

Thank you so far
Christian

Reply via email to