question-mark
Stuck on an issue?

Lightrun Answers was designed to reduce the constant googling that comes with debugging 3rd party libraries. It collects links to all the places you might be looking at while hunting down a tough bug.

And, if you’re still stuck at the end, we’re happy to hop on a call to see how we can help out.

Certificate error since Chrome 58 - NET::ERR_CERT_COMMON_NAME_INVALID

See original GitHub issue

Issue details

Since Chrome 58, self-signed certificates can cause the following message to appear…

Your connection is not private

Attackers might be trying to steal your information from localhost (for example, passwords, messages or credit cards). NET::ERR_CERT_COMMON_NAME_INVALID

This server could not prove that it is localhost; its security certificate is from [missing_subjectAltName]. This may be caused by a misconfiguration or an attacker intercepting your connection.

Details on why this has suddenly started happening can be found here - https://textslashplain.com/2017/03/10/chrome-deprecates-subject-cn-matching/

Info on creating certificates with the SubjectAltName set correctly can be found here - http://fbcs.co.uk/self-signed-multiple-domain-ssl-certificates/

Steps to reproduce/test case

Update to Chrome 58

Please specify which version of Browsersync, node and npm you’re running

  • Browsersync [ dev-master ]
  • Node [ 6.9.1 ]
  • Npm [ 3.10.8 ]

Affected platforms

  • linux
  • windows
  • OS X
  • freebsd
  • solaris
  • other (please specify which)

Browsersync use-case

  • API
  • Gulp
  • Grunt
  • CLI

If CLI, please paste the entire command below

{cli command here}

for all other use-cases, (gulp, grunt etc), please show us exactly how you’re using Browsersync

gulp.task('browser-sync', function() {
		browserSync.init({
			ui: false,
			proxy: "https://www.xxxxxx.dev",
			injectChanges: true,
			ghostMode: false
		});
	});

Issue Analytics

  • State:open
  • Created 6 years ago
  • Reactions:9
  • Comments:14 (2 by maintainers)

github_iconTop GitHub Comments

2reactions
glambertcommented, Jun 27, 2017

In the mean time, you can allow-insecure-localhost in chrome flags:

chrome://flags/#allow-insecure-localhost

Found here: https://productforums.google.com/d/msg/chrome/sTyLejkD8NQ/bhAhmHIzAgAJ

2reactions
shakyShanecommented, May 15, 2017

Great, thanks - I’ll look into it then 😃

Read more comments on GitHub >

github_iconTop Results From Across the Web

9 Methods to Fix NET::ERR_CERT_COMMON_NAME_INVALID
1. Verify That Your SSL Certificate Is Correct ... The most basic cause of the NET::ERR_CERT_COMMON_NAME_INVALID error is that your site's domain ...
Read more >
Viewing website in Chrome 58 shows a "NET
Cause. From Chrome 58, Chrome ignores the "Common Name" attribute within the certificate, and only uses the "Subject Alternative Name".
Read more >
Security Changes in Chrome 58 - What You Need to Know
If you notice any sites returning the error “NET::ERR_CERT_COMMON_NAME_INVALID,” it's likely due to the certificate not using SANs properly.
Read more >
ERR_CERT_COMMON_NAME_I...
Can not get rid of `net::ERR_CERT_COMMON_NAME_INVALID` error in chrome with self-signed certificates · Add a text representation of your ...
Read more >
How to Fix Error NET::ERR_CERT_COMMON_NAME_INVALID
Learn how to fix NET:: ERR_CERT_COMMON_NAME_INVALID as a website owner and visitor. Start your online journey today with Hostinger web ...
Read more >

github_iconTop Related Medium Post

No results found

github_iconTop Related StackOverflow Question

No results found

github_iconTroubleshoot Live Code

Lightrun enables developers to add logs, metrics and snapshots to live code - no restarts or redeploys required.
Start Free

github_iconTop Related Reddit Thread

No results found

github_iconTop Related Hackernoon Post

No results found

github_iconTop Related Tweet

No results found

github_iconTop Related Dev.to Post

No results found

github_iconTop Related Hashnode Post

No results found