<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[RequestError: unable to verify the first certificate]]></title><description><![CDATA[<p dir="auto">Hello! I'm trying to setup Surfer and get the error</p>
<pre><code class="language-json">{
    "status": "Internal Server Error",
    "message": "Issuer.discover() failed.\n    RequestError: unable to verify the first certificate\n    RequestError: unable to verify the first certificate"
}
</code></pre>
<p dir="auto">when visiting the <code>/_admin</code> page. Running v8.2.3. The only thing is i'm using manually managed DNS because it's on an internal only domain / network that I manage through technitium dns. This actually happens with a lot of apps that use OIDC for login as well like Matrix Synapse.  With Surfer, though, I can't manually manage users so I have to get the issue fixed at this point.</p>
]]></description><link>https://forum.cloudron.io/topic/13074/requesterror-unable-to-verify-the-first-certificate</link><generator>RSS for Node</generator><lastBuildDate>Sun, 19 Apr 2026 07:55:26 GMT</lastBuildDate><atom:link href="https://forum.cloudron.io/topic/13074.rss" rel="self" type="application/rss+xml"/><pubDate>Tue, 07 Jan 2025 23:27:31 GMT</pubDate><ttl>60</ttl><item><title><![CDATA[Reply to RequestError: unable to verify the first certificate on Wed, 08 Jan 2025 19:52:13 GMT]]></title><description><![CDATA[<p dir="auto"><a class="plugin-mentions-user plugin-mentions-a" href="/user/insuusvenerati" aria-label="Profile: insuusvenerati">@<bdi>insuusvenerati</bdi></a> if you use one of the automated DNS providers, you can keep your server completely private just like you have now as well. No change in setup needed, don't even have to open port 80/443 ...</p>
]]></description><link>https://forum.cloudron.io/post/99569</link><guid isPermaLink="true">https://forum.cloudron.io/post/99569</guid><dc:creator><![CDATA[joseph]]></dc:creator><pubDate>Wed, 08 Jan 2025 19:52:13 GMT</pubDate></item><item><title><![CDATA[Reply to RequestError: unable to verify the first certificate on Wed, 08 Jan 2025 19:50:41 GMT]]></title><description><![CDATA[<p dir="auto"><a class="plugin-mentions-user plugin-mentions-a" href="/user/joseph" aria-label="Profile: joseph">@<bdi>joseph</bdi></a> Thanks Joseph. I’ll work on your suggestion. Meanwhile, for kasm, this appears to be the actual solution <a href="https://kasmweb.atlassian.net/wiki/spaces/KCS/pages/28835845/How+to+add+a+custom+CA+Certificate+Authority+Chain+to+Kasm+service+containers#Scenario-2%3A-You-need-to-register-a-custom-CA-certificate-to-allow-Kasm%E2%80%99s-services-(ie%3A-kasm_api)-to-access-network-resources-that-require-acceptance-of-a-custom-CA" target="_blank" rel="noopener noreferrer nofollow ugc">https://kasmweb.atlassian.net/wiki/spaces/KCS/pages/28835845/How+to+add+a+custom+CA+Certificate+Authority+Chain+to+Kasm+service+containers#Scenario-2%3A-You-need-to-register-a-custom-CA-certificate-to-allow-Kasm’s-services-(ie%3A-kasm_api)-to-access-network-resources-that-require-acceptance-of-a-custom-CA</a>.</p>
]]></description><link>https://forum.cloudron.io/post/99568</link><guid isPermaLink="true">https://forum.cloudron.io/post/99568</guid><dc:creator><![CDATA[insuusvenerati]]></dc:creator><pubDate>Wed, 08 Jan 2025 19:50:41 GMT</pubDate></item><item><title><![CDATA[Reply to RequestError: unable to verify the first certificate on Wed, 08 Jan 2025 19:48:04 GMT]]></title><description><![CDATA[<p dir="auto"><a class="plugin-mentions-user plugin-mentions-a" href="/user/insuusvenerati" aria-label="Profile: insuusvenerati">@<bdi>insuusvenerati</bdi></a> most apps do not allow TLS verification to be turned off for OIDC . I meant "trusted" certs and not "valid" certs. Since, the api calls to OIDC happens on the backend, the cert has to be somehow inside the app containers. Currently, this is not possible with Cloudron packaging. If possible get a trusted cert and put it in the Domains view. Alternately, just use Let's Encrypt . Most apps (including surfer) won't work without them.</p>
]]></description><link>https://forum.cloudron.io/post/99567</link><guid isPermaLink="true">https://forum.cloudron.io/post/99567</guid><dc:creator><![CDATA[joseph]]></dc:creator><pubDate>Wed, 08 Jan 2025 19:48:04 GMT</pubDate></item><item><title><![CDATA[Reply to RequestError: unable to verify the first certificate on Wed, 08 Jan 2025 19:37:52 GMT]]></title><description><![CDATA[<p dir="auto">Enabling debug mode on the oidc provider config on Kasm side fixes the issue. <a href="https://kasmweb.com/docs/latest/guide/oidc.html#configuration" target="_blank" rel="noopener noreferrer nofollow ugc">https://kasmweb.com/docs/latest/guide/oidc.html#configuration</a></p>
]]></description><link>https://forum.cloudron.io/post/99566</link><guid isPermaLink="true">https://forum.cloudron.io/post/99566</guid><dc:creator><![CDATA[insuusvenerati]]></dc:creator><pubDate>Wed, 08 Jan 2025 19:37:52 GMT</pubDate></item><item><title><![CDATA[Reply to RequestError: unable to verify the first certificate on Wed, 08 Jan 2025 19:20:49 GMT]]></title><description><![CDATA[<p dir="auto">Here’s an error stacktrace from KasmWorkspaces which is external and I have configured for oidc with cloudron</p>
<pre><code>
Unhandled exception occurred
Traceback (most recent call last):
  File "urllib3/connectionpool.py", line 466, in _make_request
  File "urllib3/connectionpool.py", line 1095, in _validate_conn
  File "urllib3/connection.py", line 730, in connect
  File "urllib3/connection.py", line 909, in _ssl_wrap_socket_and_match_hostname
  File "urllib3/util/ssl_.py", line 469, in ssl_wrap_socket
  File "urllib3/util/ssl_.py", line 513, in _ssl_wrap_socket_impl
  File "ssl.py", line 455, in wrap_socket
  File "ssl.py", line 1041, in _create
  File "ssl.py", line 1319, in do_handshake
ssl.SSLCertVerificationError: [SSL: CERTIFICATE_VERIFY_FAILED] certificate verify failed: unable to get local issuer certificate (_ssl.c:1000)

</code></pre>
<p dir="auto">I get similar SSL errors with other apps when oidc is used. Internal or not</p>
]]></description><link>https://forum.cloudron.io/post/99565</link><guid isPermaLink="true">https://forum.cloudron.io/post/99565</guid><dc:creator><![CDATA[insuusvenerati]]></dc:creator><pubDate>Wed, 08 Jan 2025 19:20:49 GMT</pubDate></item><item><title><![CDATA[Reply to RequestError: unable to verify the first certificate on Wed, 08 Jan 2025 19:15:43 GMT]]></title><description><![CDATA[<p dir="auto"><a class="plugin-mentions-user plugin-mentions-a" href="/user/joseph" aria-label="Profile: joseph">@<bdi>joseph</bdi></a> Depends on what you mean by valid certs <img src="https://forum.cloudron.io/assets/plugins/nodebb-plugin-emoji/emoji/android/1f642.png?v=665e13d50c8" class="not-responsive emoji emoji-android emoji--slightly_smiling_face" style="height:23px;width:auto;vertical-align:middle" title=":)" alt="🙂" /> I added mkcert certs to Cloudron and have the CA trusted on my Mac so there aren’t errors in the browser. I just need to somehow ensure the other apps trust these certs as well</p>
]]></description><link>https://forum.cloudron.io/post/99564</link><guid isPermaLink="true">https://forum.cloudron.io/post/99564</guid><dc:creator><![CDATA[insuusvenerati]]></dc:creator><pubDate>Wed, 08 Jan 2025 19:15:43 GMT</pubDate></item><item><title><![CDATA[Reply to RequestError: unable to verify the first certificate on Wed, 08 Jan 2025 08:37:10 GMT]]></title><description><![CDATA[<p dir="auto"><a class="plugin-mentions-user plugin-mentions-a" href="/user/insuusvenerati" aria-label="Profile: insuusvenerati">@<bdi>insuusvenerati</bdi></a> since you said manual DNS on an internal network, does your Cloudron have valid certs to start with? In general, it will be very hard to make all the tools and mobile apps and internal API calls work without valid certs.</p>
]]></description><link>https://forum.cloudron.io/post/99519</link><guid isPermaLink="true">https://forum.cloudron.io/post/99519</guid><dc:creator><![CDATA[joseph]]></dc:creator><pubDate>Wed, 08 Jan 2025 08:37:10 GMT</pubDate></item></channel></rss>