Custom CA
See original GitHub issueFollowing the guide http://docs.aws.amazon.com/iot/latest/developerguide/iot-dg.pdf, I’m trying to use my own CA (self signed according to the instruction in the guide) to issue certificates.
This is the error I am getting:
Error: unable to get local issuer certificate
at Error (native)
at TLSSocket.<anonymous> (_tls_wrap.js:1065:38)
at emitNone (events.js:80:13)
at TLSSocket.emit (events.js:179:7)
at TLSSocket._init.ssl.onclienthello.ssl.oncertcb.TLSSocket._finishInit (_tls_wrap.js:593:8)
at TLSWrap.ssl.onclienthello.ssl.oncertcb.ssl.onnewsession.ssl.onhandshakedone (_tls_wrap.js:425:38)
Issue Analytics
- State:
- Created 7 years ago
- Reactions:1
- Comments:6
Top Results From Across the Web
Self Signed Certificate with Custom Root CA - gists · GitHub
Self Signed Certificate with Custom Root CA. GitHub Gist: instantly ... Generate the certificate using the mydomain csr and key along with the...
Read more >How to Create Your Own SSL Certificate Authority for Local ...
In this article, we'll walk through creating your own certificate authority (CA) for your local servers so that you can run HTTPS sites ......
Read more >Generate self-signed certificate with a custom root CA
Create your own custom Certificate Authority; Create a self-signed certificate signed by your custom CA; Upload a self-signed root certificate ...
Read more >Custom CA (Nessus) - Docs Tenable
The Custom CA page shows a text box that you can use to upload a custom certificate authority (CA) in Nessus. For more...
Read more >About Custom CA Root Certificates | Rancher Manager
Services that Rancher needs to access are sometimes configured with a certificate from a custom/internal CA root, also known as self signed ...
Read more >
Top Related Medium Post
No results found
Top Related StackOverflow Question
No results found
Troubleshoot Live Code
Lightrun enables developers to add logs, metrics and snapshots to live code - no restarts or redeploys required.
Start Free
Top Related Reddit Thread
No results found
Top Related Hackernoon Post
No results found
Top Related Tweet
No results found
Top Related Dev.to Post
No results found
Top Related Hashnode Post
No results found
I think I found the issue. the
rootCA.pem
is always the same as it is the certificate used to verify AWS IoT MQTT broker.I got this issue when I was using the VeriSign Class 3 Public Primary G5 root CA certificate (which I got when I registered thing in
us-east-2
) instead of Amazon Root CA 1 (which I got when I registered thing inap-south-1
) I think they are using different rootCa for different regions, so even if you have one downloaded already,you need to make sure thats the one they give you when you use the “One Click Certificate creation”