DNS certificate is valid and installed on cloudfront distribution, but browser not recognizing

0

I let an email validated certificate expire on an S3 bucket used for static web hosting so that I could switch to a DNS-validated cert. Historically the S3 buckets was reached through x.primarydomain.com, and is named accordingly.

I successfully requested the cert, updated my DNS, the cert validated quickly, and I successfully installed it on the associated cloudfront distribution. So all good, right? No. After 24 hours the browser is resolving to an expired certificate on our 3rd party website host that handles traffic on the primary domain, primarydomain.com.

I'm thinking the problem is the existence of a wildcard A record in our DNS that is pointing to the 3rd party host's server. Does this theory make sense?

1개 답변
3
수락된 답변

Based on your description, it does sound like your DNS settings could be at the heart of this issue. Here are some things to check:

  1. Wildcard A Record: A wildcard A record can indeed cause problems as it will take precedence for any subdomains not explicitly defined in your DNS. If there is a wildcard A record pointing to the third party host's server, requests to your x.primarydomain.com may resolve to that server instead of your CloudFront distribution, which would then serve its own (possibly expired) certificate. You should check your DNS settings and make sure that there is an explicit A (or possibly CNAME) record pointing x.primarydomain.com to your CloudFront distribution.

  2. DNS Propagation: Even after updating your DNS records, the changes might not be immediately visible everywhere due to DNS propagation delay. It can take up to 48 hours (or even more in some rare cases) for DNS changes to propagate fully throughout the internet. If you've already waited this long and are still experiencing issues, this is likely not the problem.

  3. CloudFront Distribution Settings: Ensure that you have correctly configured your CloudFront distribution to use the custom SSL certificate. Verify that your CloudFront distribution is associated with the correct domain name (x.primarydomain.com) and that the new SSL certificate is assigned to the distribution.

  4. Certificate Validation: Also, verify the details of the SSL certificate. Ensure that it is valid, issued for x.primarydomain.com, and trusted by the browser. You can use online tools like SSL Labs' SSL Server Test to diagnose issues with your SSL configuration.

If all of the above is in order, the problem may lie somewhere else. It's always recommended to work closely with your DNS provider and AWS support when diagnosing these kinds of issues.

profile picture
전문가
답변함 일 년 전
profile picture
전문가
검토됨 9일 전
profile picture
전문가
검토됨 일 년 전
  • Ivan is spot on

  • Thanks, Gary! rePost-User-7689836 If the answer is helpful, please click "Accept Answer" and upvote it.

  • Thanks so much for you thorough info. I had inadvertently deleted the CNAME record pointing to Cloudfront (insert facepalm). Restoring that fixed everything, and the wildcard A record remains with now no ill effect.

로그인하지 않았습니다. 로그인해야 답변을 게시할 수 있습니다.

좋은 답변은 질문에 명확하게 답하고 건설적인 피드백을 제공하며 질문자의 전문적인 성장을 장려합니다.

질문 답변하기에 대한 가이드라인

관련 콘텐츠