<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: SSL certificate verify error: Peer certificate verification failed in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ssl-certificate-verify-error-peer-certificate-verification/m-p/4578796#M1088638</link>
    <description>&lt;P&gt;hi marvin,&lt;/P&gt;&lt;P&gt;thanks for this info! it's like the same bug i found on the expired cert:&lt;/P&gt;&lt;P&gt;&lt;A href="https://bst.cisco.com/quickview/bug/CSCvx00476" target="_blank" rel="noopener"&gt;https://bst.cisco.com/quickview/bug/CSCvx00476&lt;/A&gt;&lt;/P&gt;&lt;P&gt;will try to apply the work around. i'm just waiting and confirm TAC's response.&lt;/P&gt;</description>
    <pubDate>Sat, 26 Mar 2022 01:33:34 GMT</pubDate>
    <dc:creator>johnlloyd_13</dc:creator>
    <dc:date>2022-03-26T01:33:34Z</dc:date>
    <item>
      <title>SSL certificate verify error: Peer certificate verification failed</title>
      <link>https://community.cisco.com/t5/network-security/ssl-certificate-verify-error-peer-certificate-verification/m-p/4578525#M1088623</link>
      <description>&lt;P&gt;hi,&lt;/P&gt;&lt;P&gt;i'm seeing this a lot in our NCS 540 router logs which shows SSL certificate error.&lt;/P&gt;&lt;P&gt;i don't see any issue with smart license as everything shows as 'authorized' and router can reach SCH cloud server.&lt;/P&gt;&lt;P&gt;i also don't use any SSL/TLS cert or PKI. is this normal or some kind of bug?&lt;/P&gt;&lt;P&gt;any other useful 'show' commands i could use or is this something needs to be raised to TAC?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;RP/0/RP0/CPU0:Mar 25 05:54:38.382 UTC: http_client[208]: %SECURITY-XR_SSL-3-CERT_VERIFY_ERR_2_PARAM : SSL certificate verify error: Peer certificate verification failed - no trusted cert 'Crypto Engine' detected the 'warning' condition 'Invalid trustpoint or trustpoint not exist'&lt;/P&gt;&lt;P&gt;RP/0/RP0/CPU0:Mar 25 05:54:40.802 UTC: http_client[208]: %SECURITY-XR_SSL-3-CERT_VERIFY_ERR_2_PARAM : SSL certificate verify error: Peer certificate verification failed - no trusted cert 'Crypto Engine' detected the 'warning' condition 'Invalid trustpoint or trustpoint not exist'&lt;/P&gt;&lt;P&gt;RP/0/RP0/CPU0:Mar 25 05:54:53.199 UTC: http_client[208]: %SECURITY-XR_SSL-3-CERT_VERIFY_ERR_2_PARAM : SSL certificate verify error: Peer certificate verification failed - no trusted cert 'Crypto Engine' detected the 'warning' condition 'Invalid trustpoint or trustpoint not exist'&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;-----&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;RP/0/RP0/CPU0:NCS540#sh license status&lt;/P&gt;&lt;P&gt;Fri Mar 25 06:07:06.103 UTC&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Smart Licensing is ENABLED&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Utility:&lt;/P&gt;&lt;P&gt;&amp;nbsp; Status: DISABLED&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Data Privacy:&lt;/P&gt;&lt;P&gt;&amp;nbsp; Sending Hostname: yes&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Callhome hostname privacy: DISABLED&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Smart Licensing hostname privacy: DISABLED&lt;/P&gt;&lt;P&gt;&amp;nbsp; Version privacy: DISABLED&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Transport:&lt;/P&gt;&lt;P&gt;&amp;nbsp; Type: Callhome&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Registration:&lt;/P&gt;&lt;P&gt;&lt;FONT color="#FF0000"&gt;&amp;nbsp; Status: REGISTERED&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; Smart Account: MY_ACCOUNT&lt;/P&gt;&lt;P&gt;&amp;nbsp; Virtual Account: MY_VA&lt;/P&gt;&lt;P&gt;&amp;nbsp; Export-Controlled Functionality: ALLOWED&lt;/P&gt;&lt;P&gt;&amp;nbsp; Initial Registration: SUCCEEDED on Dec 22 2021 02:22:09 UTC&lt;/P&gt;&lt;P&gt;&amp;nbsp; Last Renewal Attempt: None&lt;/P&gt;&lt;P&gt;&amp;nbsp; Next Renewal Attempt: Jun 20 2022 02:22:10 UTC&lt;/P&gt;&lt;P&gt;&amp;nbsp; Registration Expires: Dec 22 2022 02:17:06 UTC&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;License Authorization:&lt;/P&gt;&lt;P&gt;&lt;FONT color="#FF0000"&gt;&amp;nbsp; Status: AUTHORIZED on Mar 25 2022 06:06:51 UTC&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; Last Communication Attempt: PENDING on Mar 25 2022 06:06:51 UTC&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Failure reason: Waiting for reply&lt;/P&gt;&lt;P&gt;&amp;nbsp; Next Communication Attempt: Mar 26 2022 05:10:04 UTC&lt;/P&gt;&lt;P&gt;&amp;nbsp; Communication Deadline: May 04 2022 06:53:46 UTC&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Export Authorization Key:&lt;/P&gt;&lt;P&gt;&amp;nbsp; Features Authorized:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;none&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Miscellaneus:&lt;/P&gt;&lt;P&gt;&amp;nbsp; Custom Id: &amp;lt;empty&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;-----&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;RP/0/RP0/CPU0:NCS540#ping vrf Mgmt-intf tools.cisco.com&lt;/P&gt;&lt;P&gt;Fri Mar 25 06:04:44.403 UTC&lt;/P&gt;&lt;P&gt;Type escape sequence to abort.&lt;/P&gt;&lt;P&gt;Sending 5, 100-byte ICMP Echos to 72.163.4.38, timeout is 2 seconds:&lt;/P&gt;&lt;P&gt;!!!!!&lt;/P&gt;&lt;P&gt;Success rate is 100 percent (5/5), round-trip min/avg/max = 102/102/103 ms&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;RP/0/RP0/CPU0:NCS540#telnet vrf Mgmt-intf tools.cisco.com 80 source-interface MgmtEth0/RP0/CPU0/0&lt;/P&gt;&lt;P&gt;Trying tools.cisco.com(2001:420:1101:5::a)...&lt;/P&gt;&lt;P&gt;&amp;nbsp;Use specified source interface(MgmtEth0_RP0_CPU0_0).&lt;/P&gt;&lt;P&gt;Global address not present, using link local address as source address&lt;/P&gt;&lt;P&gt;Not able to get link local addressCan't use MgmtEth0_RP0_CPU0_0 as source interface for IPv6.&lt;/P&gt;&lt;P&gt;Trying tools.cisco.com(173.37.145.8)...&lt;/P&gt;&lt;P&gt;&amp;nbsp;Use specified source interface(MgmtEth0_RP0_CPU0_0).&lt;/P&gt;&lt;P&gt;&amp;nbsp;Use 10.10.4.1 as local address.&lt;/P&gt;&lt;P&gt;&lt;FONT color="#FF0000"&gt;Connected to tools.cisco.com.&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 25 Mar 2022 13:33:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssl-certificate-verify-error-peer-certificate-verification/m-p/4578525#M1088623</guid>
      <dc:creator>johnlloyd_13</dc:creator>
      <dc:date>2022-03-25T13:33:16Z</dc:date>
    </item>
    <item>
      <title>Re: SSL certificate verify error: Peer certificate verification failed</title>
      <link>https://community.cisco.com/t5/network-security/ssl-certificate-verify-error-peer-certificate-verification/m-p/4578542#M1088627</link>
      <description>&lt;P&gt;Logs are genreated before time, but Register time show after that time, so i am thinking the device is registered ? or still issue.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;how does your call home config look like :&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;source-interface XXXXXXX (if you using VRF interface ?)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;also try :&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;(config)# crypto ca trustpool policy  &lt;BR /&gt;(config-trustpool)#crl optional &lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 25 Mar 2022 13:58:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssl-certificate-verify-error-peer-certificate-verification/m-p/4578542#M1088627</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2022-03-25T13:58:50Z</dc:date>
    </item>
    <item>
      <title>Re: SSL certificate verify error: Peer certificate verification failed</title>
      <link>https://community.cisco.com/t5/network-security/ssl-certificate-verify-error-peer-certificate-verification/m-p/4578655#M1088633</link>
      <description>&lt;P&gt;You might be affected by this field notice:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/field-notices/723/fn72323.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/field-notices/723/fn72323.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;You can add the new certificate as noted in the FN in order to resolve that potential issue.&lt;/P&gt;</description>
      <pubDate>Fri, 25 Mar 2022 17:17:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssl-certificate-verify-error-peer-certificate-verification/m-p/4578655#M1088633</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2022-03-25T17:17:39Z</dc:date>
    </item>
    <item>
      <title>Re: SSL certificate verify error: Peer certificate verification failed</title>
      <link>https://community.cisco.com/t5/network-security/ssl-certificate-verify-error-peer-certificate-verification/m-p/4578794#M1088637</link>
      <description>&lt;P&gt;hi balaji,&lt;/P&gt;&lt;P&gt;the device is REGISTERED per my initial post.&lt;/P&gt;&lt;P&gt;the call home config has the 'source-interface' and i can ping and telnet to SCH again per my initial post.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;RP/0/RP0/CPU0:NCS540#sh run | b crypto ca&lt;/P&gt;&lt;P&gt;Fri Mar 25 07:01:41.650 UTC&lt;/P&gt;&lt;P&gt;Building configuration...&lt;/P&gt;&lt;P&gt;crypto ca trustpoint Trustpool&lt;/P&gt;&lt;P&gt;&lt;FONT color="#FF0000"&gt;crl optional&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;RP/0/RP0/CPU0:NCS540#sh run call-home&lt;/P&gt;&lt;P&gt;Fri Mar 25 05:56:11.052 UTC&lt;/P&gt;&lt;P&gt;call-home&lt;/P&gt;&lt;P&gt;&amp;nbsp;vrf Mgmt-intf&lt;/P&gt;&lt;P&gt;&amp;nbsp;service active&lt;/P&gt;&lt;P&gt;&amp;nbsp;contact smart-licensing&lt;/P&gt;&lt;P&gt;&lt;FONT color="#FF0000"&gt;&amp;nbsp;source-interface MgmtEth0/RP0/CPU0/0&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;profile CiscoTAC-1&lt;/P&gt;&lt;P&gt;&amp;nbsp; active&lt;/P&gt;&lt;P&gt;&amp;nbsp; destination address http &lt;A href="https://tools.cisco.com/its/service/oddce/services/DDCEService" target="_blank"&gt;https://tools.cisco.com/its/service/oddce/services/DDCEService&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; destination transport-method http&lt;/P&gt;&lt;P&gt;&amp;nbsp;!&lt;/P&gt;</description>
      <pubDate>Sat, 26 Mar 2022 01:29:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssl-certificate-verify-error-peer-certificate-verification/m-p/4578794#M1088637</guid>
      <dc:creator>johnlloyd_13</dc:creator>
      <dc:date>2022-03-26T01:29:21Z</dc:date>
    </item>
    <item>
      <title>Re: SSL certificate verify error: Peer certificate verification failed</title>
      <link>https://community.cisco.com/t5/network-security/ssl-certificate-verify-error-peer-certificate-verification/m-p/4578796#M1088638</link>
      <description>&lt;P&gt;hi marvin,&lt;/P&gt;&lt;P&gt;thanks for this info! it's like the same bug i found on the expired cert:&lt;/P&gt;&lt;P&gt;&lt;A href="https://bst.cisco.com/quickview/bug/CSCvx00476" target="_blank" rel="noopener"&gt;https://bst.cisco.com/quickview/bug/CSCvx00476&lt;/A&gt;&lt;/P&gt;&lt;P&gt;will try to apply the work around. i'm just waiting and confirm TAC's response.&lt;/P&gt;</description>
      <pubDate>Sat, 26 Mar 2022 01:33:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssl-certificate-verify-error-peer-certificate-verification/m-p/4578796#M1088638</guid>
      <dc:creator>johnlloyd_13</dc:creator>
      <dc:date>2022-03-26T01:33:34Z</dc:date>
    </item>
  </channel>
</rss>

