1 Answer
- Newest
- Most votes
- Most comments
0
In the TLS handshake process the client system time is used to test the validity of the certificate. When the client and server device date/time are off significantly it can make the certificate appear to be expired. I don't think there is a workaround for this.
Since you are using curl, have you tried the -k or --insecure syntax to ignore SSL certificate warnings?
answered a year ago
Relevant content
- asked 2 months ago
- Accepted Answerasked 3 months ago
- AWS OFFICIALUpdated 3 years ago
- AWS OFFICIALUpdated 5 months ago
- AWS OFFICIALUpdated a year ago
- AWS OFFICIALUpdated a year ago