SEC_ERROR_CA_CERT_INVALID — Firefox treats the intermediate/root CA cert as invalid. Causes: expired CA cert, malformed DER encoding, deprecated CA (Symantec 2018), root removed from NSS. Fix: replace chain with a fresh intermediate, or switch CA. Let's Encrypt ISRG Root X1 is 2026-valid with no issues.
Below: causes, fixes, FAQ.
ssl_certificate fullchain.pem; (fullchain, not cert alone)SSL/TLS is the encryption protocol that protects data between the browser and server. Our tool analyzes the certificate, chain of trust, TLS version, and knownvulnerabilities.
Issuer, validity period, signature algorithm, covered domains (SAN), and validation type (DV/OV/EV).
Full chain verification: from leaf certificate through intermediates to root CA.
Protocol version (TLS 1.2/1.3), cipher suites, Perfect Forward Secrecy (PFS) support.
Set up a monitor — get Telegram and email alerts 30/14/7 days before expiration.
SSL certificate monitoring
TLS config audit
HTTPS as ranking factor
customer trust
www and subdomains.Strict-Transport-Security header forces browsers to always use HTTPS.SSL certificate monitoring, check history and alerts 30 days before expiry.
Sign up freeActive. 2021 → 2035. Cross-signed the old DST Root (expired 2024), but X1 self-trust in 99% of modern stacks.
Fullchain includes intermediate. nginx does not fetch intermediate automatically; it ships only the leaf cert → Firefox fails validation.
Firefox uses NSS (separate from OS), ~420 roots. Chrome uses OS trust (Windows/macOS) or the Chrome Root Store.
OpenSSL ca.cnf + valid extensions. Import .crt via about:preferences#privacy → View Certificates → Import.