Donate. I desperately need donations to survive due to my health

Get paid by answering surveys Click here

Click here to donate

Remote/Work from Home jobs

Mkcert SSL cert still insecure on ubuntu 14.04 server

I am trying to do some rest api testing locally and need valid ssl certificate installed on my local dev environment which runs ubuntu 14.04 server and apache2.

To do this I used Mkcert and followed the instructions here

I had no issues going through the entire tutorial, but when I go to my test url - playpen.test - and run it on https it still tells me "Your connection is not private".

When I proceed and look at the details for the invalid certificate I can see that it is using the Mkcert ssl certficate I created - see below.

Mkcert ssl certificate details for playpen.test

Can someone please help me figure out what I am doing wrong?

UPDATED 1

I ran the command below to create the .pem files:

mkcert playpen.test

which gave me the following output:

Using the local CA at "/home/ubuntu/.local/share/mkcert" ✨

Created a new certificate valid for the following names 📜
 - "playpen.test"

The certificate is at "./playpen.test.pem" and the key at "./playpen.test-key.pem"

Below is the output for openssl x509 -noout -text -in playpen.test.pem

Certificate:
Data:
    Version: 3 (0x2)
    Serial Number:
        fb:8f:30:9a:b1:d5:82:05:55:14:35:4f:09:47:86:00
Signature Algorithm: sha256WithRSAEncryption
    Issuer: O=mkcert development CA, OU=ubuntu@ubuntu
    Validity
        Not Before: Dec 27 08:01:43 2018 GMT
        Not After : Dec 27 08:01:43 2028 GMT
    Subject: O=mkcert development certificate, OU=ubuntu@ubuntu
    Subject Public Key Info:
        Public Key Algorithm: rsaEncryption
            Public-Key: (2048 bit)
            Modulus:
                00:d6:51:6d:74:39:ab:fc:24:bf:82:e9:ed:f2:48:
                57:aa:b7:28:1e:8b:8b:d5:0f:69:ee:1c:1c:43:26:
                c8:94:4d:0c:33:bf:52:3a:8a:f1:e3:da:77:07:3d:
                af:32:d8:d9:06:b8:28:2e:6c:d8:55:6e:05:d4:0d:
                2c:bd:3f:ad:db:9e:ed:70:c9:c9:58:26:7a:aa:87:
                e0:0c:e2:22:79:49:31:71:86:51:bc:38:66:2c:8b:
                ac:c6:e5:86:64:b4:b2:d2:53:13:b3:70:d8:dd:36:
                f5:bf:9c:41:8d:9d:d2:ce:e0:da:41:d5:74:bf:38:
                cb:19:4b:3d:51:77:9c:9f:12:b1:c9:22:66:34:a3:
                a9:eb:48:d2:32:e2:10:0f:49:a5:f6:44:06:49:07:
                93:1b:36:8b:f5:1b:36:b9:18:ed:81:01:1e:d6:d5:
                7f:59:05:58:a9:2f:33:b0:76:f1:c2:d2:8b:34:92:
                6b:34:ec:0d:95:cb:4b:9c:40:29:89:d5:a7:3e:39:
                de:1e:00:c9:4f:1c:91:6b:4a:0b:c4:cc:bd:cc:fd:
                2f:c3:19:3c:83:1f:0e:8d:99:01:4c:82:ab:d1:96:
                37:f6:a9:d3:29:09:67:e3:0a:f7:77:c5:66:08:73:
                19:62:41:c1:53:16:df:e8:49:b2:6b:04:88:16:18:
                db:d7
            Exponent: 65537 (0x10001)
    X509v3 extensions:
        X509v3 Key Usage: critical
            Digital Signature, Key Encipherment
        X509v3 Extended Key Usage: 
            TLS Web Server Authentication
        X509v3 Basic Constraints: critical
            CA:FALSE
        X509v3 Subject Alternative Name: 
            DNS:playpen.test
Signature Algorithm: sha256WithRSAEncryption
     .....

Comments