Looks like no one’s replied in a while. To start the conversation again, simply ask a new question.

comodo ssl certificates failing

I don't know where to begin looking for an answer to this.


I have a Comodo SSL certificate installed on my mail server, hosted in my data center, completely controlled by me. The certificate is valid until September 2019.


Yesterday morning, I (attempted to) log into my mail server from my iPhone's hotspot, and I got a warning that the certificate was no longer valid. I did not continue, because I didn't have the time to troubleshoot things.


When I got back to my house, I also got the failure - computer number 2. Beginning to troubleshoot, I went to another service I used, got a certificate failure - and found that that service also used Comodo.


So far, both machines are running 10.10.3, fully patched.


When I got to my office, on my iMac running 10.9.5, there was no failure. It's on a Comcast connection.


Back at my house, I've found that EVERY website using a Comodo certificate is now failing.


User uploaded file


User uploaded file


User uploaded file


User uploaded file

User uploaded file


The only server I can access the SSL Cert chain on is my mail server, and it is sending down the 4 certificates needed for proper security. And when verified by Comodo's certificate analyzer, it tests just fine.


I've asked others around the country to check my certificate - and nobody else sees a problem.


So this narrows down the problem to either my AT&T hotspot AND my Cox internet at my house, OR, a problem with 10.10.3.


I'm not inclined to think that both AT&T and Cox are colluding to prevent me from accessing secure sites from their connections. I'm more inclined to think something is up with my favorite OS EVER (NOT!), Yosemite.


Where do I begin looking for an answer to this problem?

iMac, OS X Yosemite (10.10.3)

Posted on May 10, 2015 6:21 AM

Reply
Question marked as Best reply

Posted on May 10, 2015 6:11 PM

Take a look at the 'COMODO RSA Certification Authority' certificate(s), which should be in your System Roots Keychain. Since your Mac(s) consider it invalid all the certificates below it in the chain will cease to be trusted.


For reference, on my OS X 10.10.3 system I have one such certificate that expires on 31 Dec 2029 at 23:59. Its trust setting is 'Use System Defaults'.


If that seems in order you could try Keychain first aid.


Next, look into Keychain preferences at the certificate tab. Are OCSP and/or CRL on? If so, does turning them off (as an experiment, there are security implications) 'fix' the issue?


C.

10 replies
Question marked as Best reply

May 10, 2015 6:11 PM in response to 4MACS-Will

Take a look at the 'COMODO RSA Certification Authority' certificate(s), which should be in your System Roots Keychain. Since your Mac(s) consider it invalid all the certificates below it in the chain will cease to be trusted.


For reference, on my OS X 10.10.3 system I have one such certificate that expires on 31 Dec 2029 at 23:59. Its trust setting is 'Use System Defaults'.


If that seems in order you could try Keychain first aid.


Next, look into Keychain preferences at the certificate tab. Are OCSP and/or CRL on? If so, does turning them off (as an experiment, there are security implications) 'fix' the issue?


C.

Jun 10, 2015 9:36 AM in response to cdhw

For extra insight:


1. Two versions of "COMODO RSA Certification Authority" exist. The first one is a self-signed root, but is not bundled in 10.10's System Roots by default. The other newer version is an intermediate that uses "AddTrust External CA Root" as the system root, and AddTrust is in the System Roots.

User uploaded file


2. In my local reproduction of this issue, the "Use System Defaults" setting for the root-version of this comodo certificate in a login keychain does not actually mark the certificate as trusted. The drop down needs to be explicitly set to Trusted. You may notice that the icon has a red "X" when using the default, which turns to a blue "+" once it's explicitly trusted.

3. If you have the root version of the comodo certificate added to your login keychain (still unsure what would have added it), it will leverage that version over the version AddTrust chain actually sent by the server, even if the root version is not marked as trusted.

Sep 15, 2016 10:49 PM in response to 4MACS-Will

The answer to use Keychain First Aid is not very helpful. Keychain First Aid has been removed from El Capitan.


As with others, I'm having this problem with any website that uses Comodo certs. They show as invalid, even though the CA cert verifies in Keychain Access and is marked as valid.


I did manage to get the websites at least working, by deleting all the certs in the login folder of Keychain Access, but the certs are still marked as invalid in Chrome.


Chrome says the cert is signed by an unknown authority.


I also get the following error:

Certificate Error

There are issues with the site's certificate chain (net::ERR_CERT_AUTHORITY_INVALID).

Nov 21, 2016 11:40 PM in response to 4MACS-Will

We contacted Comodo about this and they said it was a bug in apple mail. Apple mail takes the root cert with the furthest expiry date and does not check if there is another valid root cert with a closer date. Safari does this correctly, just not Apple mail. Comodo submitted a few years ago a new valid root cert but Apple hasn't added it yet.


I don't know if it's Comodo doing things wrong or bugs in Apple mail. But it does seem that Apple is ignoring this issue.


If a member of Apple staff reads this we would appreciate it if you could accept Comodo's new root cert or fix the bug in Apple Mail (use the furthest valid cert and not just the furthest cert).

comodo ssl certificates failing

Welcome to Apple Support Community
A forum where Apple customers help each other with their products. Get started with your Apple ID.