[GH-ISSUE #4424] SSL Certificate Mismatch and Resolution Issues in Local Network (Nginx Proxy Manager) with Cloudflare Tunneling #2830

Open
opened 2026-02-26 07:36:55 +03:00 by kerem · 2 comments
Owner

Originally created by @mrxehmad on GitHub (Mar 8, 2025).
Original GitHub issue: https://github.com/NginxProxyManager/nginx-proxy-manager/issues/4424

I have a local network where I run various services, including Pi-hole, which is accessible via the subdomain pihole.domain.site. My domain, domain.site, is hosted externally and uses Cloudflare for tunneling. When accessing pihole.domain.site from within my local network, I encounter SSL error "ERR_SSL_UNRECOGNIZED_NAME_ALERT" in most browsers except Firefox. Additionally, some applications, like Bitwarden, fail to connect properly. However, other locally hosted services that do not rely on Cloudflare work without issues. Running an openssl s_client command shows that the wildcard SSL certificate for *.domain.site is valid and correctly issued by Let's Encrypt. This suggests that the problem may be related to how SSL certificates are being resolved or verified locally. I dont know what should i do any suggestions

`nslookup pihole.domain.site
Server: 10.1.15.103
Address: 10.1.15.103#53

Name: pihole.domain.site
Address: 10.1.15.103

openssl s_client -connect 10.1.15.103:443 -servername pihole.domain.site
CONNECTED(00000003)
depth=2 C = US, O = Internet Security Research Group, CN = ISRG Root X1
verify return:1
depth=1 C = US, O = Let's Encrypt, CN = E6
verify return:1
depth=0 CN = *.domain.site
verify return:1

Certificate chain
0 s:CN = *.domain.site
i:C = US, O = Let's Encrypt, CN = E6
a:PKEY: id-ecPublicKey, 384 (bit); sigalg: ecdsa-with-SHA384
v:NotBefore: Feb 7 04:45:45 2025 GMT; NotAfter: May 8 04:45:44 2025 GMT
1 s:C = US, O = Let's Encrypt, CN = E6
i:C = US, O = Internet Security Research Group, CN = ISRG Root X1
a:PKEY: id-ecPublicKey, 384 (bit); sigalg: RSA-SHA256
v:NotBefore: Mar 13 00:00:00 2024 GMT; NotAfter: Mar 12 23:59:59 2027 GMT

Server certificate
-----BEGIN CERTIFICATE-----
-----END CERTIFICATE-----
subject=CN = *.domain.site
issuer=C = US, O = Let's Encrypt, CN = E6

No client certificate CA names sent
Peer signing digest: SHA384
Peer signature type: ECDSA
Server Temp Key: X25519, 253 bits

SSL handshake has read 2461 bytes and written 403 bytes
Verification: OK

New, TLSv1.3, Cipher is TLS_AES_256_GCM_SHA384
Server public key is 384 bit
Secure Renegotiation IS NOT supported
Compression: NONE
Expansion: NONE
No ALPN negotiated
Early data was not sent
Verify return code: 0 (ok)


Post-Handshake New Session Ticket arrived:
SSL-Session:
Protocol : TLSv1.3
Cipher : TLS_AES_256_GCM_SHA384
Session-ID: E8C3A7DFCFAEFFF5345A0F87D9BDB957E14636CB642D1FD38E2F7A1B53F6C1DB
Session-ID-ctx:
Resumption PSK: BAEAE62386F72740AF0316A7370F1AF1177D22B3BF557DBCC9BB2D2356AA82BE98067889DBE37A0F4D46F41358C1AA51
PSK identity: None
PSK identity hint: None
SRP username: None
TLS session ticket lifetime hint: 300 (seconds)
TLS session ticket

Start Time: 1741433403
Timeout   : 7200 (sec)
Verify return code: 0 (ok)
Extended master secret: no
Max Early Data: 0

read R BLOCK

Post-Handshake New Session Ticket arrived:
SSL-Session:
Protocol : TLSv1.3
Cipher : TLS_AES_256_GCM_SHA384
Session-ID: F2F6214776466893C4414A915F59595118DD9508F34F90A85EFA30A4453F0B3E
Session-ID-ctx:
Resumption PSK: EA79D8FF9CCDF5A24ABF8D512816ABECC3F6F588A278E874EAB300C75752F622381537B29177823C2F39046B11FAD6FA
PSK identity: None
PSK identity hint: None
SRP username: None
TLS session ticket lifetime hint: 300 (seconds)
TLS session ticket:
Start Time: 1741433403
Timeout : 7200 (sec)
Verify return code: 0 (ok)
Extended master secret: no
Max Early Data: 0

Originally created by @mrxehmad on GitHub (Mar 8, 2025). Original GitHub issue: https://github.com/NginxProxyManager/nginx-proxy-manager/issues/4424 I have a local network where I run various services, including Pi-hole, which is accessible via the subdomain `pihole.domain.site`. My domain, `domain.site`, is hosted externally and uses Cloudflare for tunneling. When accessing `pihole.domain.site` from within my local network, I encounter SSL error "ERR_SSL_UNRECOGNIZED_NAME_ALERT" in most browsers except Firefox. Additionally, some applications, like Bitwarden, fail to connect properly. However, other locally hosted services that do not rely on Cloudflare work without issues. Running an `openssl s_client` command shows that the wildcard SSL certificate for `*.domain.site` is valid and correctly issued by Let's Encrypt. This suggests that the problem may be related to how SSL certificates are being resolved or verified locally. I dont know what should i do any suggestions `nslookup pihole.domain.site Server: 10.1.15.103 Address: 10.1.15.103#53 Name: pihole.domain.site Address: 10.1.15.103 openssl s_client -connect 10.1.15.103:443 -servername pihole.domain.site CONNECTED(00000003) depth=2 C = US, O = Internet Security Research Group, CN = ISRG Root X1 verify return:1 depth=1 C = US, O = Let's Encrypt, CN = E6 verify return:1 depth=0 CN = *.domain.site verify return:1 --- Certificate chain 0 s:CN = *.domain.site i:C = US, O = Let's Encrypt, CN = E6 a:PKEY: id-ecPublicKey, 384 (bit); sigalg: ecdsa-with-SHA384 v:NotBefore: Feb 7 04:45:45 2025 GMT; NotAfter: May 8 04:45:44 2025 GMT 1 s:C = US, O = Let's Encrypt, CN = E6 i:C = US, O = Internet Security Research Group, CN = ISRG Root X1 a:PKEY: id-ecPublicKey, 384 (bit); sigalg: RSA-SHA256 v:NotBefore: Mar 13 00:00:00 2024 GMT; NotAfter: Mar 12 23:59:59 2027 GMT --- Server certificate -----BEGIN CERTIFICATE----- -----END CERTIFICATE----- subject=CN = *.domain.site issuer=C = US, O = Let's Encrypt, CN = E6 --- No client certificate CA names sent Peer signing digest: SHA384 Peer signature type: ECDSA Server Temp Key: X25519, 253 bits --- SSL handshake has read 2461 bytes and written 403 bytes Verification: OK --- New, TLSv1.3, Cipher is TLS_AES_256_GCM_SHA384 Server public key is 384 bit Secure Renegotiation IS NOT supported Compression: NONE Expansion: NONE No ALPN negotiated Early data was not sent Verify return code: 0 (ok) --- --- Post-Handshake New Session Ticket arrived: SSL-Session: Protocol : TLSv1.3 Cipher : TLS_AES_256_GCM_SHA384 Session-ID: E8C3A7DFCFAEFFF5345A0F87D9BDB957E14636CB642D1FD38E2F7A1B53F6C1DB Session-ID-ctx: Resumption PSK: BAEAE62386F72740AF0316A7370F1AF1177D22B3BF557DBCC9BB2D2356AA82BE98067889DBE37A0F4D46F41358C1AA51 PSK identity: None PSK identity hint: None SRP username: None TLS session ticket lifetime hint: 300 (seconds) TLS session ticket Start Time: 1741433403 Timeout : 7200 (sec) Verify return code: 0 (ok) Extended master secret: no Max Early Data: 0 --- read R BLOCK --- Post-Handshake New Session Ticket arrived: SSL-Session: Protocol : TLSv1.3 Cipher : TLS_AES_256_GCM_SHA384 Session-ID: F2F6214776466893C4414A915F59595118DD9508F34F90A85EFA30A4453F0B3E Session-ID-ctx: Resumption PSK: EA79D8FF9CCDF5A24ABF8D512816ABECC3F6F588A278E874EAB300C75752F622381537B29177823C2F39046B11FAD6FA PSK identity: None PSK identity hint: None SRP username: None TLS session ticket lifetime hint: 300 (seconds) TLS session ticket: Start Time: 1741433403 Timeout : 7200 (sec) Verify return code: 0 (ok) Extended master secret: no Max Early Data: 0 ---
Author
Owner

@github-actions[bot] commented on GitHub (Sep 23, 2025):

Issue is now considered stale. If you want to keep it open, please comment 👍

<!-- gh-comment-id:3322113652 --> @github-actions[bot] commented on GitHub (Sep 23, 2025): Issue is now considered stale. If you want to keep it open, please comment :+1:
Author
Owner

@bt1v1 commented on GitHub (Oct 10, 2025):

I have a local network where I run various services, including Pi-hole, which is accessible via the subdomain pihole.domain.site. My domain, domain.site, is hosted externally and uses Cloudflare for tunneling. When accessing pihole.domain.site from within my local network, I encounter SSL error "ERR_SSL_UNRECOGNIZED_NAME_ALERT" in most browsers except Firefox. Additionally, some applications, like Bitwarden, fail to connect properly. However, other locally hosted services that do not rely on Cloudflare work without issues. Running an openssl s_client command shows that the wildcard SSL certificate for *.domain.site is valid and correctly issued by Let's Encrypt. This suggests that the problem may be related to how SSL certificates are being resolved or verified locally. I dont know what should i do any suggestions

`nslookup pihole.domain.site Server: 10.1.15.103 Address: 10.1.15.103#53

Name: pihole.domain.site Address: 10.1.15.103

openssl s_client -connect 10.1.15.103:443 -servername pihole.domain.site

CONNECTED(00000003)
depth=2 C = US, O = Internet Security Research Group, CN = ISRG Root X1
verify return:1
depth=1 C = US, O = Let's Encrypt, CN = E6
verify return:1
depth=0 CN = *.domain.site
verify return:1

Certificate chain

0 s:CN = *.domain.site
i:C = US, O = Let's Encrypt, CN = E6
a:PKEY: id-ecPublicKey, 384 (bit); sigalg: ecdsa-with-SHA384
v:NotBefore: Feb 7 04:45:45 2025 GMT; NotAfter: May 8 04:45:44 2025 GMT
1 s:C = US, O = Let's Encrypt, CN = E6
i:C = US, O = Internet Security Research Group, CN = ISRG Root X1
a:PKEY: id-ecPublicKey, 384 (bit); sigalg: RSA-SHA256
v:NotBefore: Mar 13 00:00:00 2024 GMT; NotAfter: Mar 12 23:59:59 2027 GMT

Server certificate

-----BEGIN CERTIFICATE-----
-----END CERTIFICATE-----
subject=CN = *.domain.site
issuer=C = US, O = Let's Encrypt, CN = E6

No client certificate CA names sent

Peer signing digest: SHA384
Peer signature type: ECDSA
Server Temp Key: X25519, 253 bits

SSL handshake has read 2461 bytes and written 403 bytes

Verification: OK

New, TLSv1.3, Cipher is TLS_AES_256_GCM_SHA384

Server public key is 384 bit
Secure Renegotiation IS NOT supported
Compression: NONE
Expansion: NONE
No ALPN negotiated
Early data was not sent
Verify return code: 0 (ok)
Post-Handshake New Session Ticket arrived: SSL-Session: Protocol : TLSv1.3 Cipher : TLS_AES_256_GCM_SHA384 Session-ID: E8C3A7DFCFAEFFF5345A0F87D9BDB957E14636CB642D1FD38E2F7A1B53F6C1DB Session-ID-ctx: Resumption PSK: BAEAE62386F72740AF0316A7370F1AF1177D22B3BF557DBCC9BB2D2356AA82BE98067889DBE37A0F4D46F41358C1AA51 PSK identity: None PSK identity hint: None SRP username: None TLS session ticket lifetime hint: 300 (seconds) TLS session ticket

Start Time: 1741433403
Timeout   : 7200 (sec)
Verify return code: 0 (ok)
Extended master secret: no
Max Early Data: 0

read R BLOCK

Post-Handshake New Session Ticket arrived:

SSL-Session:
Protocol : TLSv1.3
Cipher : TLS_AES_256_GCM_SHA384
Session-ID: F2F6214776466893C4414A915F59595118DD9508F34F90A85EFA30A4453F0B3E
Session-ID-ctx:
Resumption PSK: EA79D8FF9CCDF5A24ABF8D512816ABECC3F6F588A278E874EAB300C75752F622381537B29177823C2F39046B11FAD6FA
PSK identity: None
PSK identity hint: None
SRP username: None
TLS session ticket lifetime hint: 300 (seconds)
TLS session ticket:
Start Time: 1741433403
Timeout : 7200 (sec)
Verify return code: 0 (ok)
Extended master secret: no
Max Early Data: 0

I have the same problem. Did you find a fix for this?

<!-- gh-comment-id:3392487396 --> @bt1v1 commented on GitHub (Oct 10, 2025): > I have a local network where I run various services, including Pi-hole, which is accessible via the subdomain `pihole.domain.site`. My domain, `domain.site`, is hosted externally and uses Cloudflare for tunneling. When accessing `pihole.domain.site` from within my local network, I encounter SSL error "ERR_SSL_UNRECOGNIZED_NAME_ALERT" in most browsers except Firefox. Additionally, some applications, like Bitwarden, fail to connect properly. However, other locally hosted services that do not rely on Cloudflare work without issues. Running an `openssl s_client` command shows that the wildcard SSL certificate for `*.domain.site` is valid and correctly issued by Let's Encrypt. This suggests that the problem may be related to how SSL certificates are being resolved or verified locally. I dont know what should i do any suggestions > > `nslookup pihole.domain.site Server: 10.1.15.103 Address: 10.1.15.103#53 > > Name: pihole.domain.site Address: 10.1.15.103 > > ## openssl s_client -connect 10.1.15.103:443 -servername pihole.domain.site > CONNECTED(00000003) > depth=2 C = US, O = Internet Security Research Group, CN = ISRG Root X1 > verify return:1 > depth=1 C = US, O = Let's Encrypt, CN = E6 > verify return:1 > depth=0 CN = *.domain.site > verify return:1 > ## Certificate chain > 0 s:CN = *.domain.site > i:C = US, O = Let's Encrypt, CN = E6 > a:PKEY: id-ecPublicKey, 384 (bit); sigalg: ecdsa-with-SHA384 > v:NotBefore: Feb 7 04:45:45 2025 GMT; NotAfter: May 8 04:45:44 2025 GMT > 1 s:C = US, O = Let's Encrypt, CN = E6 > i:C = US, O = Internet Security Research Group, CN = ISRG Root X1 > a:PKEY: id-ecPublicKey, 384 (bit); sigalg: RSA-SHA256 > v:NotBefore: Mar 13 00:00:00 2024 GMT; NotAfter: Mar 12 23:59:59 2027 GMT > ## Server certificate > -----BEGIN CERTIFICATE----- > -----END CERTIFICATE----- > subject=CN = *.domain.site > issuer=C = US, O = Let's Encrypt, CN = E6 > ## No client certificate CA names sent > Peer signing digest: SHA384 > Peer signature type: ECDSA > Server Temp Key: X25519, 253 bits > ## SSL handshake has read 2461 bytes and written 403 bytes > Verification: OK > ## New, TLSv1.3, Cipher is TLS_AES_256_GCM_SHA384 > Server public key is 384 bit > Secure Renegotiation IS NOT supported > Compression: NONE > Expansion: NONE > No ALPN negotiated > Early data was not sent > Verify return code: 0 (ok) > Post-Handshake New Session Ticket arrived: SSL-Session: Protocol : TLSv1.3 Cipher : TLS_AES_256_GCM_SHA384 Session-ID: E8C3A7DFCFAEFFF5345A0F87D9BDB957E14636CB642D1FD38E2F7A1B53F6C1DB Session-ID-ctx: Resumption PSK: BAEAE62386F72740AF0316A7370F1AF1177D22B3BF557DBCC9BB2D2356AA82BE98067889DBE37A0F4D46F41358C1AA51 PSK identity: None PSK identity hint: None SRP username: None TLS session ticket lifetime hint: 300 (seconds) TLS session ticket > > ``` > Start Time: 1741433403 > Timeout : 7200 (sec) > Verify return code: 0 (ok) > Extended master secret: no > Max Early Data: 0 > ``` > > ## read R BLOCK > ## Post-Handshake New Session Ticket arrived: > SSL-Session: > Protocol : TLSv1.3 > Cipher : TLS_AES_256_GCM_SHA384 > Session-ID: F2F6214776466893C4414A915F59595118DD9508F34F90A85EFA30A4453F0B3E > Session-ID-ctx: > Resumption PSK: EA79D8FF9CCDF5A24ABF8D512816ABECC3F6F588A278E874EAB300C75752F622381537B29177823C2F39046B11FAD6FA > PSK identity: None > PSK identity hint: None > SRP username: None > TLS session ticket lifetime hint: 300 (seconds) > TLS session ticket: > Start Time: 1741433403 > Timeout : 7200 (sec) > Verify return code: 0 (ok) > Extended master secret: no > Max Early Data: 0 I have the same problem. Did you find a fix for this?
Sign in to join this conversation.
No milestone
No project
No assignees
1 participant
Notifications
Due date
The due date is invalid or out of range. Please use the format "yyyy-mm-dd".

No due date set.

Dependencies

No dependencies set.

Reference
starred/nginx-proxy-manager-NginxProxyManager#2830
No description provided.