<div dir="ltr">It's not a problem with the CN or the SANs on the certificate. The issue is a broken trust path. My guess would be they're using a new root CA that doesn't have good coverage yet.</div><div class="gmail_extra"><br><div class="gmail_quote">On Wed, Sep 30, 2015 at 2:52 PM, Sajal Kayan via Outages <span dir="ltr"><<a href="mailto:outages@outages.org" target="_blank">outages@outages.org</a>></span> wrote:<br><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div dir="ltr">Certificate validates for me (on chrome)<div>And also <a href="https://pulse.turbobytes.com/results/560c589decbe400bf8001bbf/" target="_blank">https://pulse.turbobytes.com/results/560c589decbe400bf8001bbf/</a> . Tested from multiple points. The tool does TLS validations.</div><div>Unrelated: That endpoint seems to be blackholed from china...</div><div><br></div><div>What common name do you see in the cert given to you? I see "<a href="http://a248.e.akamai.net" target="_blank">a248.e.akamai.net</a>" which is valid.</div><div><br></div><div>-Sajal</div></div><br><div class="gmail_quote"><div><div class="h5"><div dir="ltr">On Thu, Oct 1, 2015 at 4:16 AM Jim Witherell via Outages <<a href="mailto:outages@outages.org" target="_blank">outages@outages.org</a>> wrote:<br></div></div></div><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div><div class="h5"><table cellspacing="0" cellpadding="0" border="0"><tbody><tr><td valign="top"><span style="font-size:10pt;font-family:'Segoe UI',sans-serif;color:rgb(26,26,26)">e noticed SSL warnings based around Akamai's "</span><u><span style="font-size:10.0pt;font-family:"Segoe UI","sans-serif";color:blue"><a href="http://a248.e.akamai.net" style="font-size:11.001pt;line-height:140%" target="_blank">a248.e.akamai.net</a></span></u><span style="font-size:11.001pt;font-family:'Segoe UI',sans-serif;color:rgb(26,26,26);line-height:140%">"
certificate <a style="font-size:11.001pt;line-height:140%">today</a>. NET::ERR_CERT_COMMON_NAME_INVALID is the most common error we're seeing. Can anyone comment on what may be going on? Looks like the cert was renewed or issued on <a style="font-size:11.001pt;line-height:140%">8/27/2015</a>. Wonder why we are noticing the errors from multiple points on the
internet now?</span><br><p>Jim Witherell </p><p>Cincinnati OH </p></td></tr></tbody></table></div></div>_______________________________________________<br>
Outages mailing list<br>
<a href="mailto:Outages@outages.org" target="_blank">Outages@outages.org</a><br>
<a href="https://puck.nether.net/mailman/listinfo/outages" rel="noreferrer" target="_blank">https://puck.nether.net/mailman/listinfo/outages</a><br>
</blockquote></div>
<br>_______________________________________________<br>
Outages mailing list<br>
<a href="mailto:Outages@outages.org">Outages@outages.org</a><br>
<a href="https://puck.nether.net/mailman/listinfo/outages" rel="noreferrer" target="_blank">https://puck.nether.net/mailman/listinfo/outages</a><br>
<br></blockquote></div><br></div>