1. Home
  2. Troubleshooting
  3. Linux Server
  4. Cert Errors When Moving SSL Certs Between Servers

Cert Errors When Moving SSL Certs Between Servers

Why does this “ERR_CERT_COMMON_NAME_INVALID” error happen?

Break the error down and it tells you everything you need to know:

Error Certificate Common Name Invalid -> i.e., the common name on the cert does not match the domain you’re trying to use it on (common name -> domain name for simple terms).

This is telling you that externally the browser is not seeing what you think it should be seeing. This is brought about by a couple of reasons:

  1. The wrong certificate is installed;
  2. There is a misconfiguration on your server;

Let’s explore these.

Troubleshooting on a VPS / Dedicated machine

Some of these can work on a shared machine, but this is all done assuming you have full access to the machine.

Step 1: Verify Common Name

Verify two things –

  1. The certificate you’re migrating and verify it is for the right domain;
  2. What the browser is seeing remotely;

Verify the certificate you’re uploading using openssl with this command:

openssl x509 -noout -text -in /etc/letsencrypt/live/[domainname]/fullchain.pem

This will read the certificate and tell you what the common name is. If that is correct, look at what the browser is seeing by using openssl with this command:

openssl s_client -showcerts -connect [domainname]:443

This last one tells you what the browser is seeing, so it should tell you whether the common name is right or wrong.

Step 2: Verify Cert Placement and Vhosts File

The most common mistake boils down to the wrong placement and configuration of a vhosts file. To help, I have uploaded a basic vhosts file that you can use to perform a diff and confirm various elements.

Some of the key things to check for:

1. You’re referencing the right port (i.e., 443):

<VirtualHost *:80>

2. The path to the certs are correct

SSLCertificateFile /etc/letsencrypt/live/[domainname]/fullchain.pem SSLCertificateKeyFile /etc/letsencrypt/live/[domainname]/privkey.pem Include /etc/letsencrypt/options-ssl-apache.conf

3. The privkey and fullchain files have the right components (I find it much easier to simply scp the files from the old server to their new home on the new server to avoid any potential issues when copying / pasting).

Verify your Vhosts file is free of errors by running this:

# apachectl configtest

Step 3: Verify Vhosts with HTTPS is Enabled

You cannot forget to verify if the new vhosts is enabled. This simple step can cause a lot of heartburn, trust me.

A very simple way to verify what is enabled is to use this:

# apache2ctl -S

If you don’t see your domain, that’s a problem. If you see your domain, but notice the port is not 443, that is a problem.

The tips above should get close to helping resolve this error. I can’t stress the importance of Step 1, verifying what your cert is for, and what the browser is seeing goes a long way to telling you where the problem really is.

Random Tip Using cURL

There are other tools that can be extremely helpful when troubleshooting these problems, one of those is cURL.

Here is an example of a cURL command you can run that is extremely helpful in a scenario like this:

Why does this "ERR_CERT_COMMON_NAME_INVALID" error happen?
Break the error down and it tells you everything you need to know:

Error Certificate Common Name Invalid -> i.e., the common name on the cert does not match the domain you’re trying to use it on (common name -> domain name for simple terms).

This is telling you that externally the browser is not seeing what you think it should be seeing. This is brought about by a couple of reasons:

The wrong certificate is installed;
There is a misconfiguration on your server;


Let’s explore these.

Troubleshooting on a VPS / Dedicated machine
Some of these can work on a shared machine, but this is all done assuming you have full access to the machine.

Step 1: Verify Common Name
Verify two things –

The certificate you’re migrating and verify it is for the right domain;
What the browser is seeing remotely;


Verify the certificate you’re uploading using openssl with this command:


openssl x509 -noout -text -in /etc/letsencrypt/live/[domainname]/fullchain.pem  
						


This will read the certificate and tell you what the common name is. If that is correct, look at what the browser is seeing by using openssl with this command:

openssl s_client -showcerts -connect [domainname]:443
						


This last one tells you what the browser is seeing, so it should tell you whether the common name is right or wrong.

Step 2: Verify Cert Placement and Vhosts File
The most common mistake boils down to the wrong placement and configuration of a vhosts file. To help, I have uploaded a basic vhosts file that you can use to perform a diff and confirm various elements.

Some of the key things to check for:

1. You're referencing the right port (i.e., 443):

<VirtualHost *:80>
						


2. The path to the certs are correct

SSLCertificateFile /etc/letsencrypt/live/[domainname]/fullchain.pem                                                     
SSLCertificateKeyFile /etc/letsencrypt/live/[domainname]/privkey.pem                                                    
Include /etc/letsencrypt/options-ssl-apache.conf 
						


3. The privkey and fullchain files have the right components (I find it much easier to simply scp the files from the old server to their new home on the new server to avoid any potential issues when copying / pasting).

Verify your Vhosts file is free of errors by running this:

# apachectl configtest
						
Step 3: Verify Vhosts with HTTPS is Enabled
You cannot forget to verify if the new vhosts is enabled. This simple step can cause a lot of heartburn, trust me.

A very simple way to verify what is enabled is to use this:

# apache2ctl -S 
						


If you don't see your domain, that's a problem. If you see your domain, but notice the port is not 443, that is a problem.

The tips above should get close to helping resolve this error. I can't stress the importance of Step 1, verifying what your cert is for, and what the browser is seeing goes a long way to telling you where the problem really is.

Random Tip Using cURL
There are other tools that can be extremely helpful when troubleshooting these problems, one of those is cURL.

Here is an example of a cURL command you can run that is extremely helpful in a scenario like this:

$ curl -vvv "https://defragged.org" | more
The output will give you something like this:

Trying [IP Address]:443...        
* TCP_NODELAY set                                                                                                    
* Connected to defragged.org ([IP Address]) port 443 (#0)                                                           
* ALPN, offering h2                                                                                                  
* ALPN, offering http/1.1                                                                                            
* successfully set certificate verify locations:                                                                     
*   CAfile: /etc/ssl/certs/ca-certificates.crt                                                                         
CApath: /etc/ssl/certs                                                                                             
} [5 bytes data]                                                                                                     
* TLSv1.3 (OUT), TLS handshake, Client hello (1):                                                                    
} [512 bytes data]                                                                                                   
* TLSv1.3 (IN), TLS handshake, Server hello (2):                                                                     
{ [122 bytes data]                                                                                                   
* TLSv1.3 (IN), TLS handshake, Encrypted Extensions (8):                                                             
{ [25 bytes data]                                                                                                    
* TLSv1.3 (IN), TLS handshake, Certificate (11):                                                                     
{ [4024 bytes data]                                                                                                  
* TLSv1.3 (IN), TLS handshake, CERT verify (15):                                                                     
{ [264 bytes data]                                                                                                   
* TLSv1.3 (IN), TLS handshake, Finished (20):                                                                        
{ [52 bytes data]                                                                                                    
* TLSv1.3 (OUT), TLS change cipher, Change cipher spec (1):                                                          
} [1 bytes data]                                                                                                     
* TLSv1.3 (OUT), TLS handshake, Finished (20):                                                                       
} [52 bytes data]                                                                                                    
* SSL connection using TLSv1.3 / TLS_AES_256_GCM_SHA384                                                              
* ALPN, server accepted to use http/1.1                                                                              
* Server certificate:                                                                                                
*  subject: CN=defragged.org                                                                                         
*  start date: May 25 15:28:22 2021 GMT                                                                              
*  expire date: Aug 23 15:28:22 2021 GMT                                                                             
*  subjectAltName: host "defragged.org" matched cert's "defragged.org"                                               
*  issuer: C=US; O=Let's Encrypt; CN=R3                                                                              
*  SSL certificate verify ok. 
						


This basic command is giving you a lot of valuable information. It's identifying the server, and it's showing you the certs common name as well.

This basic command is giving you a lot of valuable information. It’s identifying the server, and it’s showing you the certs common name as well.

Updated on November 21, 2024
Was this article helpful?

Related Articles

Leave a Comment