1 Answer
- Newest
- Most votes
- Most comments
0
In the TLS handshake process the client system time is used to test the validity of the certificate. When the client and server device date/time are off significantly it can make the certificate appear to be expired. I don't think there is a workaround for this.
Since you are using curl, have you tried the -k or --insecure syntax to ignore SSL certificate warnings?
answered a year ago
Relevant content
- Accepted Answerasked 4 years ago
- asked 4 months ago
- Accepted Answerasked 4 months ago
- AWS OFFICIALUpdated 3 years ago
- AWS OFFICIALUpdated 6 months ago
- AWS OFFICIALUpdated a year ago
- AWS OFFICIALUpdated a year ago