Weird SSL common name mismatch












0















Today I came across a weird case of cn mismatch. I have two domains:



kpmg.talentsource.rs and
www.kpmg.talentsource.rs



both have prod.q.ssl.global.fastly.net as their CNAME
they have the same A records and certificates.



Nevertheless:



https://kpmg.talentsource.rs (OK)



https://www.kpmg.talentsource.rs (CN mismatch)





https://www.ssllabs.com/ssltest/analyze.html?d=kpmg.talentsource.rs&s=151.101.65.62
https://www.ssllabs.com/ssltest/analyze.html?d=www.kpmg.talentsource.rs&s=151.101.65.62



Note: none of the two has the kpmg.talentsource.rs in neither the the CN nor the SAN



Any ideas why this is happening?










share|improve this question

























  • @TheNewOne I don't own the servers. I am just curious. Regardless of that, I am interested to know why the certificate fails, not why the server returns 500 when connected, which shouldn't require access to the server. e.g. how chrome identifies that the certificate of the first domain is good and the second's is bad?

    – user10679118
    Nov 20 '18 at 12:50













  • Removed the comments because they were misleading. The answer seems right :)

    – TheNewOne
    Nov 20 '18 at 15:47
















0















Today I came across a weird case of cn mismatch. I have two domains:



kpmg.talentsource.rs and
www.kpmg.talentsource.rs



both have prod.q.ssl.global.fastly.net as their CNAME
they have the same A records and certificates.



Nevertheless:



https://kpmg.talentsource.rs (OK)



https://www.kpmg.talentsource.rs (CN mismatch)





https://www.ssllabs.com/ssltest/analyze.html?d=kpmg.talentsource.rs&s=151.101.65.62
https://www.ssllabs.com/ssltest/analyze.html?d=www.kpmg.talentsource.rs&s=151.101.65.62



Note: none of the two has the kpmg.talentsource.rs in neither the the CN nor the SAN



Any ideas why this is happening?










share|improve this question

























  • @TheNewOne I don't own the servers. I am just curious. Regardless of that, I am interested to know why the certificate fails, not why the server returns 500 when connected, which shouldn't require access to the server. e.g. how chrome identifies that the certificate of the first domain is good and the second's is bad?

    – user10679118
    Nov 20 '18 at 12:50













  • Removed the comments because they were misleading. The answer seems right :)

    – TheNewOne
    Nov 20 '18 at 15:47














0












0








0








Today I came across a weird case of cn mismatch. I have two domains:



kpmg.talentsource.rs and
www.kpmg.talentsource.rs



both have prod.q.ssl.global.fastly.net as their CNAME
they have the same A records and certificates.



Nevertheless:



https://kpmg.talentsource.rs (OK)



https://www.kpmg.talentsource.rs (CN mismatch)





https://www.ssllabs.com/ssltest/analyze.html?d=kpmg.talentsource.rs&s=151.101.65.62
https://www.ssllabs.com/ssltest/analyze.html?d=www.kpmg.talentsource.rs&s=151.101.65.62



Note: none of the two has the kpmg.talentsource.rs in neither the the CN nor the SAN



Any ideas why this is happening?










share|improve this question
















Today I came across a weird case of cn mismatch. I have two domains:



kpmg.talentsource.rs and
www.kpmg.talentsource.rs



both have prod.q.ssl.global.fastly.net as their CNAME
they have the same A records and certificates.



Nevertheless:



https://kpmg.talentsource.rs (OK)



https://www.kpmg.talentsource.rs (CN mismatch)





https://www.ssllabs.com/ssltest/analyze.html?d=kpmg.talentsource.rs&s=151.101.65.62
https://www.ssllabs.com/ssltest/analyze.html?d=www.kpmg.talentsource.rs&s=151.101.65.62



Note: none of the two has the kpmg.talentsource.rs in neither the the CN nor the SAN



Any ideas why this is happening?







ssl ssl-certificate






share|improve this question















share|improve this question













share|improve this question




share|improve this question








edited Nov 20 '18 at 9:47







user10679118

















asked Nov 20 '18 at 9:26









user10679118user10679118

62




62













  • @TheNewOne I don't own the servers. I am just curious. Regardless of that, I am interested to know why the certificate fails, not why the server returns 500 when connected, which shouldn't require access to the server. e.g. how chrome identifies that the certificate of the first domain is good and the second's is bad?

    – user10679118
    Nov 20 '18 at 12:50













  • Removed the comments because they were misleading. The answer seems right :)

    – TheNewOne
    Nov 20 '18 at 15:47



















  • @TheNewOne I don't own the servers. I am just curious. Regardless of that, I am interested to know why the certificate fails, not why the server returns 500 when connected, which shouldn't require access to the server. e.g. how chrome identifies that the certificate of the first domain is good and the second's is bad?

    – user10679118
    Nov 20 '18 at 12:50













  • Removed the comments because they were misleading. The answer seems right :)

    – TheNewOne
    Nov 20 '18 at 15:47

















@TheNewOne I don't own the servers. I am just curious. Regardless of that, I am interested to know why the certificate fails, not why the server returns 500 when connected, which shouldn't require access to the server. e.g. how chrome identifies that the certificate of the first domain is good and the second's is bad?

– user10679118
Nov 20 '18 at 12:50







@TheNewOne I don't own the servers. I am just curious. Regardless of that, I am interested to know why the certificate fails, not why the server returns 500 when connected, which shouldn't require access to the server. e.g. how chrome identifies that the certificate of the first domain is good and the second's is bad?

– user10679118
Nov 20 '18 at 12:50















Removed the comments because they were misleading. The answer seems right :)

– TheNewOne
Nov 20 '18 at 15:47





Removed the comments because they were misleading. The answer seems right :)

– TheNewOne
Nov 20 '18 at 15:47












1 Answer
1






active

oldest

votes


















1














The certificate has a Subject Alternative Name of *.talentsource.rs (among many others unrelated one).



Per X.509/TLS rules, a * matches only one level/label, it does not cross the dot so to say. So *.talentsource.rs matches an hostname of kpmg.talentsource.rs but NOT www.kpmg.talentsource.rs, hence the browser error.



You need either to add www.kpmg.talentsource.rs or *.kpmg.talentsource.rs as a SAN (note that it has talentsource.rs already in the list too) in this certificate or stop using www.kpmg.talentsource.rs at all (a redirection will not solve the problem as you still need the TLS handshake to complete first before getting the HTTP Location: header, so you still need appropriate certificate).






share|improve this answer























    Your Answer






    StackExchange.ifUsing("editor", function () {
    StackExchange.using("externalEditor", function () {
    StackExchange.using("snippets", function () {
    StackExchange.snippets.init();
    });
    });
    }, "code-snippets");

    StackExchange.ready(function() {
    var channelOptions = {
    tags: "".split(" "),
    id: "1"
    };
    initTagRenderer("".split(" "), "".split(" "), channelOptions);

    StackExchange.using("externalEditor", function() {
    // Have to fire editor after snippets, if snippets enabled
    if (StackExchange.settings.snippets.snippetsEnabled) {
    StackExchange.using("snippets", function() {
    createEditor();
    });
    }
    else {
    createEditor();
    }
    });

    function createEditor() {
    StackExchange.prepareEditor({
    heartbeatType: 'answer',
    autoActivateHeartbeat: false,
    convertImagesToLinks: true,
    noModals: true,
    showLowRepImageUploadWarning: true,
    reputationToPostImages: 10,
    bindNavPrevention: true,
    postfix: "",
    imageUploader: {
    brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
    contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
    allowUrls: true
    },
    onDemand: true,
    discardSelector: ".discard-answer"
    ,immediatelyShowMarkdownHelp:true
    });


    }
    });














    draft saved

    draft discarded


















    StackExchange.ready(
    function () {
    StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fstackoverflow.com%2fquestions%2f53389858%2fweird-ssl-common-name-mismatch%23new-answer', 'question_page');
    }
    );

    Post as a guest















    Required, but never shown

























    1 Answer
    1






    active

    oldest

    votes








    1 Answer
    1






    active

    oldest

    votes









    active

    oldest

    votes






    active

    oldest

    votes









    1














    The certificate has a Subject Alternative Name of *.talentsource.rs (among many others unrelated one).



    Per X.509/TLS rules, a * matches only one level/label, it does not cross the dot so to say. So *.talentsource.rs matches an hostname of kpmg.talentsource.rs but NOT www.kpmg.talentsource.rs, hence the browser error.



    You need either to add www.kpmg.talentsource.rs or *.kpmg.talentsource.rs as a SAN (note that it has talentsource.rs already in the list too) in this certificate or stop using www.kpmg.talentsource.rs at all (a redirection will not solve the problem as you still need the TLS handshake to complete first before getting the HTTP Location: header, so you still need appropriate certificate).






    share|improve this answer




























      1














      The certificate has a Subject Alternative Name of *.talentsource.rs (among many others unrelated one).



      Per X.509/TLS rules, a * matches only one level/label, it does not cross the dot so to say. So *.talentsource.rs matches an hostname of kpmg.talentsource.rs but NOT www.kpmg.talentsource.rs, hence the browser error.



      You need either to add www.kpmg.talentsource.rs or *.kpmg.talentsource.rs as a SAN (note that it has talentsource.rs already in the list too) in this certificate or stop using www.kpmg.talentsource.rs at all (a redirection will not solve the problem as you still need the TLS handshake to complete first before getting the HTTP Location: header, so you still need appropriate certificate).






      share|improve this answer


























        1












        1








        1







        The certificate has a Subject Alternative Name of *.talentsource.rs (among many others unrelated one).



        Per X.509/TLS rules, a * matches only one level/label, it does not cross the dot so to say. So *.talentsource.rs matches an hostname of kpmg.talentsource.rs but NOT www.kpmg.talentsource.rs, hence the browser error.



        You need either to add www.kpmg.talentsource.rs or *.kpmg.talentsource.rs as a SAN (note that it has talentsource.rs already in the list too) in this certificate or stop using www.kpmg.talentsource.rs at all (a redirection will not solve the problem as you still need the TLS handshake to complete first before getting the HTTP Location: header, so you still need appropriate certificate).






        share|improve this answer













        The certificate has a Subject Alternative Name of *.talentsource.rs (among many others unrelated one).



        Per X.509/TLS rules, a * matches only one level/label, it does not cross the dot so to say. So *.talentsource.rs matches an hostname of kpmg.talentsource.rs but NOT www.kpmg.talentsource.rs, hence the browser error.



        You need either to add www.kpmg.talentsource.rs or *.kpmg.talentsource.rs as a SAN (note that it has talentsource.rs already in the list too) in this certificate or stop using www.kpmg.talentsource.rs at all (a redirection will not solve the problem as you still need the TLS handshake to complete first before getting the HTTP Location: header, so you still need appropriate certificate).







        share|improve this answer












        share|improve this answer



        share|improve this answer










        answered Nov 20 '18 at 15:11









        Patrick MevzekPatrick Mevzek

        3,70591529




        3,70591529
































            draft saved

            draft discarded




















































            Thanks for contributing an answer to Stack Overflow!


            • Please be sure to answer the question. Provide details and share your research!

            But avoid



            • Asking for help, clarification, or responding to other answers.

            • Making statements based on opinion; back them up with references or personal experience.


            To learn more, see our tips on writing great answers.




            draft saved


            draft discarded














            StackExchange.ready(
            function () {
            StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fstackoverflow.com%2fquestions%2f53389858%2fweird-ssl-common-name-mismatch%23new-answer', 'question_page');
            }
            );

            Post as a guest















            Required, but never shown





















































            Required, but never shown














            Required, but never shown












            Required, but never shown







            Required, but never shown

































            Required, but never shown














            Required, but never shown












            Required, but never shown







            Required, but never shown







            Popular posts from this blog

            Guess what letter conforming each word

            Port of Spain

            Run scheduled task as local user group (not BUILTIN)