Title
Create new category
Edit page index title
Edit category
Edit link
Troubleshooting errors when configuring HTTPS communication for webserver
This article applies to all MetaDefender Storage Security releases deployed on Windows and Linux.
Issue:
The MetaDefender Storage Security (MDSS) web GUI is inaccessible via HTTPS despite enabling HTTPS and uploading SSL certificates. Symptoms include:
- The HTTPS enablement script reports SSL certificate validation failure.
- The web browser shows an endless loading loop when trying to connect via HTTPS.
Root Cause:
Depending on the error message when running
mdss.ps1 -u enable_https:- "WARNING: Invalid certificate structure!" indicates the SSL certificate is not in the correct PEM format required by MDSS, causing SSL certificate validation to fail (e.g. if the certificate is in DER format, it will cause this error).
- "WARNING: Invalid key structure!" indicates the private key might have been extracted from a .pfx file with a passphrase, which MDSS does not currently support.
The internal CA certificate also needs to be installed in the Windows "Trusted Root Certification Authorities" store to be trusted by MDSS (or
/etc/mdss/ca_certificates/on Linux).
Resolution:
Verify that the SSL certificate and private key are in PEM format, indicated by headers such as "-----BEGIN CERTIFICATE-----" and "-----BEGIN PRIVATE KEY-----".
If extracting the certificate and private key from the .pfx file, use OpenSSL commands to extract without a passphrase:
- Extract certificate:
openssl pkcs12 -in certificate.pfx -clcerts -nokeys -out ssl.crt - Extract private key without passphrase:
openssl pkcs12 -in certificate.pfx -nocerts -out ssl.key -nodes
- Extract certificate:
Validate the certificate and key formats using OpenSSL:
- Verify certificate:
openssl x509 -in ssl.crt -text -noout - Verify private key:
openssl rsa -in ssl.key -check(should output "RSA key ok")
- Verify certificate:
Confirm that the MD5 hashes of the certificate and private key match:
openssl x509 -noout -modulus -in ssl.crt | openssl md5openssl rsa -noout -modulus -in ssl.key | openssl md5
Ensure the internal CA root certificate is installed in the Windows "Trusted Root Certification Authorities" store so MDSS can trust the certificate chain (or
/etc/mdss/ca_certificates/on Linux).Disable HTTPS on MDSS before re-enabling it manually:
- Run:
mdss.ps1 -u disable_https(Windows) - Copy the validated
ssl.crtandssl.keyfiles toC:\Program Files\OPSWAT\MetaDefender Storage Security\config\nginx\certificateson Windows (or/etc/mdss/webclient/ on Linux) - Run:
mdss.ps1 -u enable_https(Windows)
- Run:
Access the MDSS web console via HTTPS URL:
https://If issues persist, generate and upload a support package for further investigation.
If Further Assistance is required, please proceed to log a support case or chat with our support engineer.
