我正在为PCI DSS准备服务器。没有其他问题,但我无法解决。 PCI扫描程序(https://www.hackerguardian.com/)表示无法信任SSL证书:
SSL Certificate Cannot Be Trusted 443 / tcp / www
我已从链中删除了所有其他证书,只留下一个完全为此服务器购买的证书。它由COMODO签署,被认为是值得信赖的。这是证书转储:
openssl x509 -in /usr/local/psa/var/certificates/cert-f1nb7M -text -noout
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
e6:3c:e1:95:56:07:3c:f7:4c:5e:b3:bd:06:6d:37:f0
Signature Algorithm: sha256WithRSAEncryption
Issuer: C=GB, ST=Greater Manchester, L=Salford, O=COMODO CA Limited, CN=COMODO RSA Extended Validation Secure Server CA
Validity
Not Before: Nov 17 00:00:00 2015 GMT
Not After : Dec 3 23:59:59 2017 GMT
Subject: serialNumber=04045342/1.3.6.1.4.1.311.60.2.1.3=GB/businessCategory=Private Organization, C=GB/postalCode=BN27 2BY,
ST=East Sussex, L=Hailsham/street=Station Road/street=Unit 10 Swan Business Centre, O=Fuss 3 Solutions Ltd,
OU=COMODO EV SSL, CN=www.fuss3inkandtoner.co.uk
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
Public-Key: (2048 bit)
Modulus:
...................
Exponent: 65537 (0x10001)
X509v3 extensions:
X509v3 Authority Key Identifier:
keyid:39:DA:FF:CA:28:14:8A:A8:74:13:08:B9:E4:0E:A9:D2:FA:7E:9D:69
X509v3 Subject Key Identifier:
D1:C0:72:40:F1:A4:47:A6:FF:32:C4:56:6F:EF:F5:1E:40:6A:72:DC
X509v3 Key Usage: critical
Digital Signature, Key Encipherment
X509v3 Basic Constraints: critical
CA:FALSE
X509v3 Extended Key Usage:
TLS Web Server Authentication, TLS Web Client Authentication
X509v3 Certificate Policies:
Policy: 1.3.6.1.4.1.6449.1.2.1.5.1
CPS: https://secure.comodo.com/CPS
X509v3 CRL Distribution Points:
Full Name:
URI:http://crl.comodoca.com/COMODORSAExtendedValidationSecureServerCA.crl
Authority Information Access:
CA Issuers - URI:http://crt.comodoca.com/COMODORSAExtendedValidationSecureServerCA.crt
OCSP - URI:http://ocsp.comodoca.com
X509v3 Subject Alternative Name:
DNS:www.fuss3inkandtoner.co.uk, DNS:fuss3inkandtoner.co.uk
1.3.6.1.4.1.11129.2.4.2:
............
Signature Algorithm: sha256WithRSAEncryption
...............
证书是真实的,它没有过期且域名匹配。我尝试了其他在线诊断工具,如https://www.ssllabs.com/ssltest/analyze.html?d=fuss3inkandtoner.co.uk,每个人都说证书很好。除了hackersguardian.com之外的所有人,我需要通过PCI合规性。
我不是系统管理员,而且此证书是由其他人安装的(我认为托管支持的系统管理员)。我需要你就如何解决这个问题提出建议。提前谢谢。
答案 0 :(得分:0)
这是假阳性。当COMODO(hackerguardian.com)的安全扫描程序报告由COMODO(!)发出的错误证书时,这是一件非常奇怪的事。
答案 1 :(得分:0)
此工具将澄清您遇到的问题:https://decoder.link/sslchecker/?hostname=www.hackerguardian.com&port=443
与证书一起安装的CA捆绑包格式错误(订单不正确)。证书本身良好且有效,但无法根据CA捆绑验证其有效性,因此可以预期。
这是正确的一个包:http://helpdesk.ssls.com/hc/en-us/article_attachments/201576002/COMODO_OV_SHA-256_bundle.crt
您可以将其传递给您的托管,以便他们可以为您重新安装。之后,一切都会好的。相信我:)。