I have created a self-signed SSL certificate for the localhost CN. Firefox accepts this certificate after initially complaining about it, as expected. Chrome and IE, however, refuse to accept it, even after adding the certificate to the system certificate store under Trusted Roots. Even though the certificate is listed as correctly installed when I click "View certificate information" in Chrome's HTTPS popup, it still insists the certificate cannot be trusted.
What am I supposed to do to get Chrome to accept the certificate and stop complaining about it?
Linux
If you're using Linux, you can also follow this official wiki pages:
Basically:
Now, the following command will add the certificate (where YOUR_FILE is your exported file):
To list all your certificates, run the following command:
If it still doesn't work, you could be affected by this bug: Issue 55050: Ubuntu SSL error 8179
P.S. Please also make sure that you have
libnss3-tools
, before you can use above commands.If you don't have, please install it by:
As a bonus, you can use the following handy scripts:
Usage:
Troubleshooting
Run Chrome with
--auto-ssl-client-auth
parametergoogle-chrome --auto-ssl-client-auth
This is something that keeps coming up -- especially for Google Chrome on Mac OS X Yosemite!
Thankfully, one of our development team sent me this link today, and the method works reliably, whilst still allowing you to control for which sites you accept certificates.
https://www.reddit.com/r/sysadmin/comments/3ercx4/chrome_shortcut_past_the_your_connection_is_not/cthporl
jersully posts:
When clicking the little crossed out lock icon next to the URL, you'll get a box looking like this:
After clicking the Certificate information link, you'll see the following dialog:
It tells you which certificate store is the correct one, it's the Trusted Root Certification Authorities store.
You can either use one of the methods outlined in the other answers to add the certificate to that store or use:
ROOT
is the internal name of the certificate store mentioned earlier.cert.pem
is the name of your self-signed certificate.Click anywhere on the page and type a BYPASS_SEQUENCE
"
thisisunsafe
" is a BYPASS_SEQUENCE for Chrome version 65"
badidea
" Chrome version 62 - 64."
danger
" used to work in earlier versions of ChromeYou don't need to look for input field, just type it. It feels strange but it is working.
I tried it on Mac High Sierra.
To double check if they changed it again go to Latest chromium Source Code
To look for BYPASS_SEQUENCE, at the moment it looks like that:
Now they have it camouflaged, but to see the real BYPASS_SEQUENCE you can run following line in a browser console.
WINDOWS JUN/2017 Windows Server 2012
I followed @Brad Parks answer. On Windows you should import rootCA.pem in Trusted Root Certificates Authorities store.
I did the following steps:
Where v3.ext is:
Then, in my case I have a self hosted web app, so I need to bind certificate with IP address and port, certificate should be on MY store with private key information, so I exported to pfx format.
With mmc console (File/Add or Remove Snap-ins/Certificates/Add/Computert Account/LocalComputer/OK) I imported pfx file in Personal store.
Later I used this command to bind certificate (you could also use HttpConfig tool):
certhash=Certificate Thumprint
appid=GUID (your choice)
First I tried to import the certificate "device.crt" on Trusted Root Certificates Authorities in different ways but I'm still getting same error:
But I realized that I should import certificate of root authority not certificate for domain. So I used mmc console (File/Add or Remove Snap-ins/Certificates/Add/Computert Account/LocalComputer/OK) I imported rootCA.pem in Trusted Root Certificates Authorities store.
Restart Chrome and et voilà it works.
With localhost:
Or with IP address:
The only thing I could not achieve is that, it has obsolete cipher (red square on picture). Help is appreciated on this point.
With makecert it is not possible add SAN information. With New-SelfSignedCertificate (Powershell) you could add SAN information, it also works.
This worked for me:
Chrome Settings > Show advanced settings > HTTPS/SSL > Manage Certificates
.Authorities
tab and scroll down to find your certificate under the Organization Name that you gave to the certificate.You should get the nice green lock on your pages now.
EDIT: I tried this again on a new machine and the certificate did not appear on the Manage Certificates window just by continuing from the red untrusted certificate page. I had to do the following:
https://
is crossed out in red), click the lock > Certificate Information. NOTE: on newer versions of chrome, you have to openDeveloper Tools > Security
, and selectView certificate
.Details tab > Export
. ChoosePKCS #7, single certificate
as the file format.Authorities tab > Import
and choose the file to which you exported the certificate, and make sure to choosePKCS #7, single certificate
as the file type.