Hi, Thank you. Best regard Riccardo asked 20 Jul '17, 02:47 Riccardo1987 edited 21 Jul '17, 06:14 cmaynard ♦♦ |
One Answer:
The certificates all look good to me, I suspect that there is an issue on the client machine where it's unable to verify the certificate chain. I (on Windows) extracted the certificates using tshark and then converted the hex strings to binary with PowerShell and then used certutil to verify:
answered 21 Jul ‘17, 07:46 grahamb ♦ The problem is on server 10.0.1.1? (21 Jul ‘17, 08:01) Riccardo1987 Yes. Whatever software is running there is unable to verify the certifcate chain. (21 Jul ‘17, 08:09) grahamb ♦ Sorry Grahamb, i am not expert in this argument. Can you send/share cert3.der? Thank you so much. (21 Jul ‘17, 08:45) Riccardo1987
Not that doing so would be impossible, but if any root CA certificate should serve its purpose, you must never trust the one extracted from the certificate chain in server hello packet. Instead, you should obtain it via some other path, as the server operator might have forged it. In this particular case, you have @grahamb’s word that he’s tested it ( So what about downloading it from DigiCert’s web? Could be a better idea, but remember, I may have myself forged both the web you are accessing and the whole DigiCert’s web. So as for me, the best idea is to try to open that web on another machine within your reach which does have that DigiCert’s certificate pre-installed in its trusted CA certificate store, and if it works fine, to export the certificate from that machine’s trusted certificate store into a file and import that file on your machine. (21 Jul ‘17, 09:30) sindy |
My wild guess would be that the sender of that Alert message did not like the other party's certificate because the latter refers to an unknown Certification Authority (CA). As you haven't provided the capture, I don't know which side complains, so I cannot suggest what to do.
Hi Sindy, where can i send you the capture?
Can you share a capture in a publicly accessible spot, e.g. CloudShark, Google Drive, DropBox etc?
I activate cloudshark . The ip destination is ip.addr ==193.43.5.203 . The site for view packet is https://www.cloudshark.org/captures/de953fadb58d
Thank you