Unifi SSL Captive Portal Issues

Hello guys i have a cloud-hosted controller @ Linode and for some reason, I’m getting an SSL problem when the user accesses the guest wifi (Captive Portal).

But when I check the URL of the hosted controller I don’t get that error.

I run a couple of SSL CHECKER and I get this.

*DigiCert

DNS resolves unifi.domain.com to 118.174.5.16
The Certificate is not issued by DigiCert, GeoTrust, Thawte, or RapidSSL
Make sure the website you want to check is secured by a certificate from one of our product lines.

Common Name = unifi.domain.com

Subject Alternative Names = unifi.domain.com

Issuer = R3

Serial Number = 4BACD9EAB4932C324444A8761D1A8A1F8A3

SHA1 Thumbprint = B0C7E1EF8B566699DA555551576C8D64CD8041913386A936

Key Length = 2048

Signature algorithm = SHA256-RSA

Secure Renegotiation:

TLS Certificate has not been revoked
OCSP Staple:	Not Enabled
OCSP Origin:	Good
CRL Status:	Not Enabled

TLS Certificate expiration
The certificate expires May 19, 2022 (70 days from today)

Certificate Name matches unifi.domain.com

Subject	unifi.domain.com
Valid from 18/Feb/2022 to 19/May/2022
Issuer	R3
TLS Certificate is not trusted
The certificate is not signed by a trusted authority (checking against Mozilla's root store). If you bought the certificate from a trusted authority, you probably just need to install one or more Intermediate certificates. Contact your certificate provider for assistance doing this for your server platform.



Heartbleed Vulnerability
Server is not vulnerable to the Heartbleed Bug because heartbeats are not enabled on this server.

Protocol Support
TLSv1.1
TLSv1.2

TLS ciphers supported by the server
TLSv1.1
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
TLS_DHE_RSA_WITH_AES_128_CBC_SHA

TLSv1.2
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
TLS_DHE_RSA_WITH_AES_128_CBC_SHA


No known vulnerable Debian keys were found