Reputation: 69
I am currently trying to secure a Wildfly 10 application server to accept SSL only. The server is in my local network. The server is part of my private domain. I have issued an SSL SAN certificate from my CA and configured Wildfly to use the certificate. I installed my CA as trusted CA in my Firefox browser. When I request a page from the Wildfly via SSL with just its basename (hostname without domain), Firefox reports a secure connection. But when I try to request a page via a fully qualified domain name it reports an ambigious certificate. The certificate was created via a wizard from my CA, so misspelled content tags should be not an issue. I double checked the values.
I am using a SAN certifiate, so that both requests (wfly10-ssl, wfly10-ssl.mydomain.local) should be reported as secure connections. When I inspect the certificate it reports both names as valid.
Does anybody have an idea where I am going wrong?
private domain: mydomain.local
server name (plain): wfly10-ssl
server name (fqdn): wfly10-ssl.mydomain.local
Certificate content (partial):
Common Name / CN = wfly10-ssl.mydomain.local
Subject Alternative Name / SAN = DNS=wfly10-ssl
https://wfly10-ssl:8443/ -> SSL OK
https://wfly10-ssl.mydomain.local:8443/ -> SSL failure, certificate is valid only for: wfly10-ssl
Best regards, CB
Upvotes: 0
Views: 1080
Reputation: 704
The CN is ignored when there is a SAN available. This is according to the specification RFC 6125:
A client MUST NOT seek a match for a reference identifier of CN-ID if the presented identifiers include a DNS-ID, SRV-ID, URI-ID, or any application-specific identifier types supported by the client.
See also this comment in the Firefox source code.
Upvotes: 2