Closed dontcrash closed 1 year ago
This would probably be better for https://support.signal.org, but Signal uses a pinned certificate for connections to chat.signal.org and other Signal servers, so that organizations who are not Signal can't issue valid certificates for those connections. The pinned certificate is a custom root certificate, so it won't look valid to your firewall.
You can see the certificates we're validating against in each of the apps, e.g. https://github.com/signalapp/Signal-iOS-Private/blob/main/SignalServiceKit/Resources/Certificates/signal-messenger.cer. I won't go as far as to say you should add this to your firewall as an exception, but it's an option.
I completely forgot we have a blog post that explains this much better than I can :-) https://signal.org/blog/certifiably-fine/
I completely forgot we have a blog post that explains this much better than I can :-) https://signal.org/blog/certifiably-fine/
Excellent write-up! Thank you very much.
Unsure of the best place for this, after inspecting traffic coming from my iOS device through my Sophos firewall, it was dropping connections for Signal, specifically because the cert used for chat.signal.org does not have a common name and the issuer is not trusted. Can someone shed some light on this?
Here is the cert I captured:
Common Name (CN)
Organisation (O)
Organisational Unit (OU)
Common Name (CN) Signal Messenger
Organisation (O) Signal Messenger, LLC
Organisational Unit (OU)
Issued On Saturday, 28 October 2023 at 02:01:25
Expires On Wednesday, 27 November 2024 at 07:50:10
Certificate 15464570bd75fcf948126c5849b96c8002597919a16af2e0d1d2760ec4bd31e1
Public key 82152d577d994e6fa698903e3923ef661376eecfd7195b8e042d46feab5522d8