DNS certificate is valid and installed on cloudfront distribution, but browser not recognizing

0

I let an email validated certificate expire on an S3 bucket used for static web hosting so that I could switch to a DNS-validated cert. Historically the S3 buckets was reached through x.primarydomain.com, and is named accordingly.

I successfully requested the cert, updated my DNS, the cert validated quickly, and I successfully installed it on the associated cloudfront distribution. So all good, right? No. After 24 hours the browser is resolving to an expired certificate on our 3rd party website host that handles traffic on the primary domain, primarydomain.com.

I'm thinking the problem is the existence of a wildcard A record in our DNS that is pointing to the 3rd party host's server. Does this theory make sense?

1 Antwort
3
Akzeptierte Antwort

Based on your description, it does sound like your DNS settings could be at the heart of this issue. Here are some things to check:

  1. Wildcard A Record: A wildcard A record can indeed cause problems as it will take precedence for any subdomains not explicitly defined in your DNS. If there is a wildcard A record pointing to the third party host's server, requests to your x.primarydomain.com may resolve to that server instead of your CloudFront distribution, which would then serve its own (possibly expired) certificate. You should check your DNS settings and make sure that there is an explicit A (or possibly CNAME) record pointing x.primarydomain.com to your CloudFront distribution.

  2. DNS Propagation: Even after updating your DNS records, the changes might not be immediately visible everywhere due to DNS propagation delay. It can take up to 48 hours (or even more in some rare cases) for DNS changes to propagate fully throughout the internet. If you've already waited this long and are still experiencing issues, this is likely not the problem.

  3. CloudFront Distribution Settings: Ensure that you have correctly configured your CloudFront distribution to use the custom SSL certificate. Verify that your CloudFront distribution is associated with the correct domain name (x.primarydomain.com) and that the new SSL certificate is assigned to the distribution.

  4. Certificate Validation: Also, verify the details of the SSL certificate. Ensure that it is valid, issued for x.primarydomain.com, and trusted by the browser. You can use online tools like SSL Labs' SSL Server Test to diagnose issues with your SSL configuration.

If all of the above is in order, the problem may lie somewhere else. It's always recommended to work closely with your DNS provider and AWS support when diagnosing these kinds of issues.

profile picture
EXPERTE
beantwortet vor einem Jahr
profile picture
EXPERTE
überprüft vor 9 Tagen
profile picture
EXPERTE
überprüft vor einem Jahr
  • Ivan is spot on

  • Thanks, Gary! rePost-User-7689836 If the answer is helpful, please click "Accept Answer" and upvote it.

  • Thanks so much for you thorough info. I had inadvertently deleted the CNAME record pointing to Cloudfront (insert facepalm). Restoring that fixed everything, and the wildcard A record remains with now no ill effect.

Du bist nicht angemeldet. Anmelden um eine Antwort zu veröffentlichen.

Eine gute Antwort beantwortet die Frage klar, gibt konstruktives Feedback und fördert die berufliche Weiterentwicklung des Fragenstellers.

Richtlinien für die Beantwortung von Fragen