The PDU has a certificate from our internal CA, theres nothing else on the PDU that i can configure to say its from a trusted domain.
this is the cert info from git when doing a openssl s_client connect command, had to clear some info out due to sanitization.
$ openssl s_client -connect sdn9001vpdu124r1g=:443
Connecting to 172.17.1.101
CONNECTED(000001D0)
depth=0 sanitized, CN=SDN9001VPDU124R1G
verify error:num=20:unable to get local issuer certificate
verify return:1
depth=0 sanitized, CN=SDN9001VPDU124R1G
verify error:num=21:unable to verify the first certificate
verify return:1
depth=0 sanitized, CN=SDN9001VPDU124R1G
verify return:1
Certificate chain
0 s:sanitized, CN=SDN9001VPDU124R1G
i:sanitized, CN=SDN-CA2-CA
a😛KEY: rsaEncryption, 4096 (bit); sigalg: RSA-SHA256
v:NotBefore: Aug 4 15:49:23 2025 GMT; NotAfter: Aug 4 15:49:23 2027 GMT
Server certificate
—–BEGIN CERTIFICATE—–
sanitized
—–END CERTIFICATE—–
subject=sanitized, CN=SDN9001VPDU124R1G
issuer=sanitized
No client certificate CA names sent
Peer signing digest: SHA256
Peer signature type: RSA-PSS
Server Temp Key: ECDH, secp384r1, 384 bits
SSL handshake has read 2883 bytes and written 841 bytes
Verification error: unable to verify the first certificate
New, TLSv1.3, Cipher is TLS_AES_256_GCM_SHA384
TLS session ticket lifetime hint: 7200 (seconds)
TLS session ticket:
removed for sanitization
Start Time: 1754916497
Timeout : 7200 (sec)
Verify return code: 21 (unable to verify the first certificate)
Extended master secret: no
Max Early Data: 0
read R BLOCK
D0140000:error:0A000126:SSL routines::unexpected eof while reading:../openssl-3.2.4/ssl/record/rec_layer_s3.c:689: