NET::ERR_CERT_COMMON_NAME_INVALID Fix

How to fix certificate hostname mismatch warnings by checking SAN coverage, DNS targets, and the actual endpoint serving the certificate.

Diagnose your site now

Problem

Browsers show NET::ERR_CERT_COMMON_NAME_INVALID, indicating the certificate does not match the current hostname.

Symptoms

  • Users hit a certificate warning page instead of the site.
  • SSL checks report SAN mismatch or hostname mismatch.
  • Only some hostnames fail, such as www or a specific subdomain.

Top 3 Causes

  1. The hostname is missing from SAN - The certificate does not cover the actual domain being used.
  2. DNS or proxy routing points to the wrong endpoint - The request reaches a server that serves a different certificate.
  3. Wildcard coverage was misunderstood - The wildcard does not cover the hostname pattern you assumed.

Diagnose with DechoNet

  • SSL Check to inspect the SAN list and confirm the hostname mismatch.
  • DNS Lookup to verify the domain resolves to the intended IP or proxy target.
  • HTTP Check to confirm the final hostname and redirect flow.

Resolution Checklist

  • Confirm the active hostname appears in the SAN list returned by SSL Check.
  • Validate www, apex, and subdomain hostnames separately.
  • Verify DNS points to the intended service endpoint.
  • If using a CDN or reverse proxy, ensure the correct certificate is bound at the edge.
  • Re-run SSL Check using the exact hostname that was failing.

When to Escalate

  • Escalate internally if your certificate issuance pipeline is generating the wrong hostname set.
  • Escalate to the CDN or hosting provider if you cannot control which certificate is attached to the active endpoint.

Related Tools

Related Guides

Share this guide

[Ad] Guide Detail Inline
← Back to All Guides