Hello guys i have a cloud-hosted controller @ Linode and for some reason, I’m getting an SSL problem when the user accesses the guest wifi (Captive Portal).
But when I check the URL of the hosted controller I don’t get that error.
I run a couple of SSL CHECKER and I get this.
*DigiCert
DNS resolves unifi.domain.com to 118.174.5.16
The Certificate is not issued by DigiCert, GeoTrust, Thawte, or RapidSSL
Make sure the website you want to check is secured by a certificate from one of our product lines.
Common Name = unifi.domain.com
Subject Alternative Names = unifi.domain.com
Issuer = R3
Serial Number = 4BACD9EAB4932C324444A8761D1A8A1F8A3
SHA1 Thumbprint = B0C7E1EF8B566699DA555551576C8D64CD8041913386A936
Key Length = 2048
Signature algorithm = SHA256-RSA
Secure Renegotiation:
TLS Certificate has not been revoked
OCSP Staple: Not Enabled
OCSP Origin: Good
CRL Status: Not Enabled
TLS Certificate expiration
The certificate expires May 19, 2022 (70 days from today)
Certificate Name matches unifi.domain.com
Subject unifi.domain.com
Valid from 18/Feb/2022 to 19/May/2022
Issuer R3
TLS Certificate is not trusted
The certificate is not signed by a trusted authority (checking against Mozilla's root store). If you bought the certificate from a trusted authority, you probably just need to install one or more Intermediate certificates. Contact your certificate provider for assistance doing this for your server platform.
Heartbleed Vulnerability
Server is not vulnerable to the Heartbleed Bug because heartbeats are not enabled on this server.
Protocol Support
TLSv1.1
TLSv1.2
TLS ciphers supported by the server
TLSv1.1
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
TLS_DHE_RSA_WITH_AES_128_CBC_SHA
TLSv1.2
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
TLS_DHE_RSA_WITH_AES_128_CBC_SHA
No known vulnerable Debian keys were found