72

I have a problem with a website that has an SSL certificate which doesn't correspond to the website domain. Chrome gives me a warning for this website (and rightly so), which I have to ignore manually. Every time I restart Chrome, I need to ignore the certificate issue again.

I've tried adding the certificate as a trusted one with certutil, using C,, and P,, trustargs, but it doesn't work. I can't find a set of trustargs that will tell it to ignore which domain is using the certificate.

Is there a way to tell Chrome (or certutil) to trust this certificate whatever domain uses it?

raphink
  • 3,781
  • 2
  • 27
  • 32

5 Answers5

63

This is a summary of the answers from the thread
Disable Google Chrome warning if security certificate is not trusted.

You can avoid the message for trusted sites by installing the certificate.
This can be done by clicking on the warning icon in the address bar, then click
Certificate Information -> Details Tab -> Export...
Save the certificate.

Use Chrome's Preferences -> Under The Hood -> Manage Certificates -> Import.
On the "Certificate Store" screen of the import, choose "Place all certificates in the following store" and browse for "Trusted Root Certification Authorities." Restart Chrome.

harrymc
  • 455,459
  • 31
  • 526
  • 924
16

Using Chrome Version 23.0.1271.97 on Linux:

  1. First click on the certificate warning and export the certificate to your file system. (Connection > Certificate Information > Details > Export)
  2. Then use certutil in order to add this saved certificate as a trusted peer:

    certutil -d sql:$HOME/.pki/nssdb -A -t P -n <certificate nickname> -i <certificate filename>
    
  3. Restart Chrome and you're done.

Tundrome
  • 161
  • 1
  • 3
  • 2
    This worked for me, thanks! I had to run this first (opensuse linux): `sudo zypper install mozilla-nss-tools` – gatoatigrado Sep 27 '13 at 08:09
  • This is a great answer, if you want to understand better how it works, use `certutil -H -A`, and maybe read about trust flags in NSS Database: https://blogs.oracle.com/meena/entry/notes_about_trust_flags – Tomasz Gandor Nov 25 '15 at 08:24
  • to install certutil i used sudo apt-get install libnss3-tools – shatulsky Jul 20 '23 at 14:15
11

The only way I got it working in Chromium with Ubuntu Linux is using this certutil commandline:

certutil -d sql:$HOME/.pki/nssdb -A -t "CP,CP," -n CertNickName -i cert_file.crt
Treviño
  • 487
  • 4
  • 5
4

Please have a look at this thread:
Can't convince Chrome that my Tivo's self signed certificate is ok.

The article remarks that:

You need to specify the "C,," trust flags to work around the NSS bug.

If this thread does relate to your problem, it looks like this is a known bug in Chrome, where the "P,," trust flags is not working: libpkix ignores the P (trusted peer) trust flag

I hope this helps (I'm answering a bit blindly, since I'm not on Linux).

harrymc
  • 455,459
  • 31
  • 526
  • 924
  • Thanks, it seems to be related to my problem, and hence a bug in Chrome. I'll consider your suggestion as an answer to my question, even though it doesn't really fix my problem :-) – raphink Feb 15 '10 at 09:23
0

Google Chrome in Linux doesn’t have a SSL certificate manager, it relies on the NSS Shared DB. In order to add SSL certificates to the database you will have to use the command line. I will explain how you can add the CAcert certificates and a very easy way to add self-signed certificates.

Please have a look at this thread: blog.avirtualhome.com/2010/02/02/adding-ssl-certificates-to-google-chrome-linux-ubuntu/

Jonathan Day
  • 1,581
  • 3
  • 12
  • 16
k din
  • 25
  • 1