The V2 API port serves a broken certificate by failing to include intermediate certificates
After enabling the V2 API options, the V2 API port serves the site certificate with a broken chain. This causes the certificate to be untrusted, despite being identical to the certificate served on the main https port.
This occurred immediately after enabling the V2 API, and is still occurring even after re-importing the certificate via the PRTGCertImporter tool.
An online certificate check confirms the behavior.
OpenSSL reports the error as follows:
verify error:num=20:unable to get local issuer certificate verify return:1 depth=0 CN = *.xxxxxxxxx.com verify error:num=21:unable to verify the first certificate verify return:1 depth=0 CN = *.xxxxxxxxx.com verify return:1 ... Verification error: unable to verify the first certificate
Note that the main https port continues to serve the (same) certificate with the chain intact, so it works fine. Only the alternative port used by the new v2 API and GUI is affected by the issue.
Add comment