ECS with ALB and SSL certificate issue: net::ERR_CERT_COMMON_NAME_INVALID











up vote
0
down vote

favorite












I have an aws ECS setup and using ALB for the load balancer. The container task is running on port 8080. I have also added an HTTPS listener with SSL Certificate from ACM, which forwards the requests to the container.



Now I have one issue here. When using curl or postman to contact the load balancer's DNS name, I get the response from the app perfectly. But when using the very same DNS name in my frontend and running in frontend app locally (localhost:3000), and the request is generated from Chrome I get the following error:
net::ERR_CERT_COMMON_NAME_INVALID



How can I resolve this issue?



I also tried deploying the app to my test env, so instead of localhost, I have https://example.com which now matches the Domain name of the Certificate (*.example.com). But still same results.










share|improve this question






















  • Can you post the complete output of curl -vvv "URL" here?
    – Mohit Kumar
    Nov 8 at 20:22










  • I get this now: curl: (35) schannel: SNI or certificate check failed: SEC_E_WRONG_PRINCIPAL (0x80090322) - The target principal name is incorrect.
    – shwz
    Nov 9 at 8:51

















up vote
0
down vote

favorite












I have an aws ECS setup and using ALB for the load balancer. The container task is running on port 8080. I have also added an HTTPS listener with SSL Certificate from ACM, which forwards the requests to the container.



Now I have one issue here. When using curl or postman to contact the load balancer's DNS name, I get the response from the app perfectly. But when using the very same DNS name in my frontend and running in frontend app locally (localhost:3000), and the request is generated from Chrome I get the following error:
net::ERR_CERT_COMMON_NAME_INVALID



How can I resolve this issue?



I also tried deploying the app to my test env, so instead of localhost, I have https://example.com which now matches the Domain name of the Certificate (*.example.com). But still same results.










share|improve this question






















  • Can you post the complete output of curl -vvv "URL" here?
    – Mohit Kumar
    Nov 8 at 20:22










  • I get this now: curl: (35) schannel: SNI or certificate check failed: SEC_E_WRONG_PRINCIPAL (0x80090322) - The target principal name is incorrect.
    – shwz
    Nov 9 at 8:51















up vote
0
down vote

favorite









up vote
0
down vote

favorite











I have an aws ECS setup and using ALB for the load balancer. The container task is running on port 8080. I have also added an HTTPS listener with SSL Certificate from ACM, which forwards the requests to the container.



Now I have one issue here. When using curl or postman to contact the load balancer's DNS name, I get the response from the app perfectly. But when using the very same DNS name in my frontend and running in frontend app locally (localhost:3000), and the request is generated from Chrome I get the following error:
net::ERR_CERT_COMMON_NAME_INVALID



How can I resolve this issue?



I also tried deploying the app to my test env, so instead of localhost, I have https://example.com which now matches the Domain name of the Certificate (*.example.com). But still same results.










share|improve this question













I have an aws ECS setup and using ALB for the load balancer. The container task is running on port 8080. I have also added an HTTPS listener with SSL Certificate from ACM, which forwards the requests to the container.



Now I have one issue here. When using curl or postman to contact the load balancer's DNS name, I get the response from the app perfectly. But when using the very same DNS name in my frontend and running in frontend app locally (localhost:3000), and the request is generated from Chrome I get the following error:
net::ERR_CERT_COMMON_NAME_INVALID



How can I resolve this issue?



I also tried deploying the app to my test env, so instead of localhost, I have https://example.com which now matches the Domain name of the Certificate (*.example.com). But still same results.







amazon-web-services google-chrome docker amazon-ecs aws-alb






share|improve this question













share|improve this question











share|improve this question




share|improve this question










asked Nov 8 at 11:03









shwz

7111




7111












  • Can you post the complete output of curl -vvv "URL" here?
    – Mohit Kumar
    Nov 8 at 20:22










  • I get this now: curl: (35) schannel: SNI or certificate check failed: SEC_E_WRONG_PRINCIPAL (0x80090322) - The target principal name is incorrect.
    – shwz
    Nov 9 at 8:51




















  • Can you post the complete output of curl -vvv "URL" here?
    – Mohit Kumar
    Nov 8 at 20:22










  • I get this now: curl: (35) schannel: SNI or certificate check failed: SEC_E_WRONG_PRINCIPAL (0x80090322) - The target principal name is incorrect.
    – shwz
    Nov 9 at 8:51


















Can you post the complete output of curl -vvv "URL" here?
– Mohit Kumar
Nov 8 at 20:22




Can you post the complete output of curl -vvv "URL" here?
– Mohit Kumar
Nov 8 at 20:22












I get this now: curl: (35) schannel: SNI or certificate check failed: SEC_E_WRONG_PRINCIPAL (0x80090322) - The target principal name is incorrect.
– shwz
Nov 9 at 8:51






I get this now: curl: (35) schannel: SNI or certificate check failed: SEC_E_WRONG_PRINCIPAL (0x80090322) - The target principal name is incorrect.
– shwz
Nov 9 at 8:51



















active

oldest

votes











Your Answer






StackExchange.ifUsing("editor", function () {
StackExchange.using("externalEditor", function () {
StackExchange.using("snippets", function () {
StackExchange.snippets.init();
});
});
}, "code-snippets");

StackExchange.ready(function() {
var channelOptions = {
tags: "".split(" "),
id: "1"
};
initTagRenderer("".split(" "), "".split(" "), channelOptions);

StackExchange.using("externalEditor", function() {
// Have to fire editor after snippets, if snippets enabled
if (StackExchange.settings.snippets.snippetsEnabled) {
StackExchange.using("snippets", function() {
createEditor();
});
}
else {
createEditor();
}
});

function createEditor() {
StackExchange.prepareEditor({
heartbeatType: 'answer',
convertImagesToLinks: true,
noModals: true,
showLowRepImageUploadWarning: true,
reputationToPostImages: 10,
bindNavPrevention: true,
postfix: "",
imageUploader: {
brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
allowUrls: true
},
onDemand: true,
discardSelector: ".discard-answer"
,immediatelyShowMarkdownHelp:true
});


}
});














 

draft saved


draft discarded


















StackExchange.ready(
function () {
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fstackoverflow.com%2fquestions%2f53206421%2fecs-with-alb-and-ssl-certificate-issue-neterr-cert-common-name-invalid%23new-answer', 'question_page');
}
);

Post as a guest















Required, but never shown






























active

oldest

votes













active

oldest

votes









active

oldest

votes






active

oldest

votes
















 

draft saved


draft discarded



















































 


draft saved


draft discarded














StackExchange.ready(
function () {
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fstackoverflow.com%2fquestions%2f53206421%2fecs-with-alb-and-ssl-certificate-issue-neterr-cert-common-name-invalid%23new-answer', 'question_page');
}
);

Post as a guest















Required, but never shown





















































Required, but never shown














Required, but never shown












Required, but never shown







Required, but never shown

































Required, but never shown














Required, but never shown












Required, but never shown







Required, but never shown







Popular posts from this blog

Schultheiß

Liste der Kulturdenkmale in Wilsdruff

Android Play Services Check