SSL/TLS / SSL/TLS
SSL self signed certificate in certificate chain
Fix self signed certificate in certificate chain errors in Node.js, npm, Git, and corporate networks.
- Category
- SSL/TLS
- Error signature
self signed certificate in certificate chain- Quick fix
- Install the trusted root certificate and configure the affected tool to use the correct CA bundle.
- Updated
What this error means
self signed certificate in certificate chain means name resolution, origin connectivity, or TLS certificate validation failed before the application request could complete.
Why this happens
DNS and TLS failures often happen outside the application: resolver cache, authoritative records, proxy mode, origin firewall, or CA trust.
For SSL self signed certificate in certificate chain, separate DNS, CDN/proxy, origin, and certificate checks instead of changing app code first.
Common causes
- Corporate proxy intercepts HTTPS traffic
- Private registry uses an internal CA
- Local trust store does not include the signing root
- Certificate chain is misconfigured
Quick fixes
- Check the exact hostname, not just the apex domain.
- Install the trusted root certificate and configure the affected tool to use the correct CA bundle.
- Compare direct origin behavior with proxied/CDN behavior when possible.
- Retry after DNS TTL or certificate deployment has had time to propagate.
Copy-paste commands
Query DNS records
dig example.com A
dig example.com CNAME
Check HTTP response headers
curl -I https://example.com
Inspect TLS certificate chain
openssl s_client -connect example.com:443 -servername example.com </dev/null
Flush macOS DNS cache
sudo dscacheutil -flushcache; sudo killall -HUP mDNSResponder
Platform-specific fixes
macOS
- Use
dscacheutilto clear local DNS cache after changing records.
Linux
- Use
digorresolvectl queryto compare resolver answers.
Windows
- Use
ipconfig /flushdnsafter DNS changes, then retest the exact hostname.
Real-world fixes
- If Cloudflare is enabled, test whether the origin responds when accessed directly.
- If only one network fails, compare DNS resolver answers before changing server config.
- Install the trusted root certificate and configure the affected tool to use the correct CA bundle.
Step-by-step troubleshooting
- Confirm the browser, client, or log reports
self signed certificate in certificate chainfor the same hostname. - Use
digto verify the authoritative DNS answer. - Use
curl -Ito check whether the hostname reaches the expected service. - Use
openssl s_clientto inspect certificate hostname, issuer, and expiry. - If a CDN is involved, compare proxied and direct-origin behavior.
How to prevent it
- Track DNS changes with owner, TTL, and expected target.
- Monitor certificate expiry before renewal windows close.
- Keep CDN SSL mode and origin certificate configuration documented.
Related errors
- unable to get local issuer certificate
- Python SSL certificate verify failed
- npm ERR! code E401
FAQ
What should I check first?
Start with the exact self signed certificate in certificate chain line and the command, request, or workflow step that produced it. In DNS or SSL/TLS, the first useful clue is usually near the first failure line, not the final stack trace.
Can I ignore this error?
No. Treat it as a failed DNS or SSL/TLS step. A temporary bypass may help diagnosis, but the underlying cause should be fixed before shipping or publishing changes.
Why does this work locally but fail elsewhere?
Local machines often have cached credentials, old dependencies, different runtime versions, or network settings that CI and production do not share. Reproduce from a clean shell or clean install when possible.
How do I know the fix worked?
Rerun the smallest command, request, or deployment step that produced self signed certificate in certificate chain. The fix is working when that step completes without the same signature and produces the expected output.