Skip to main content

TLS/SSL | Wildcard Certificates

TLS, SSL, TLS/SSL, Wildcard, Certificates, Wildcard Certificates

Updated over 2 weeks ago

Overview ๐Ÿ’ฅ

Wildcard certificates (e.g., *.domain.com) are commonly used to secure multiple subdomains under a single domain. However, if not configured correctly in Liongardโ€™s TLS/SSL Inspector, these certificates may cause inspection failuresโ€”especially when the Inspector is pointed at the root domain (domain.com) instead of a valid subdomain.

This article explains why these failures occur, how wildcard certificates work at the certificate/SAN level, and the steps required to configure your TLS/SSL Inspector to collect successfully.


Why Wildcard Certificate Failures Occur ๐Ÿค”

1๏ธโƒฃ Wildcard Certificates Do NOT Automatically Cover the Root Domain

A wildcard certificate issued for:

*.domain.com

covers only subdomains, such as:

  • www.domain.com

  • app.domain.com

  • mail.domain.com

It does not cover:

  • domain.com
    โ€‹(root / apex domain)

Unless the certificate explicitly includes the root domain as a Subject Alternative Name (SAN), the certificate is invalid for the root domain.

Certificate SAN Example

Certificate Field

Example Value

Common Name (CN)

*.domain.com

SANs

*.domain.com, www.domain.com, portal.domain.com

If domain.com is missing, the Inspector will fail when inspecting the root domain.

2๏ธโƒฃ TLS/SSL Inspector Requires a Valid, Resolvable FQDN

The Inspector validates certificates using the target FQDN.
If the FQDN:

  • does not resolve

  • is not included in the certificate SAN list

  • resolves to an IP that rejects Cloud Agent scans

โ€ฆthe inspection will fail.

This is a certificate validation rule, not a Liongard-specific limitation.

3๏ธโƒฃ DNS Misconfiguration or Missing Records

A wildcard may be valid, but if the DNS for the subdomain does not resolve properly (e.g., no A record, CNAME issues), the Inspector will time out or return no certificate.


Steps to Resolve ๐Ÿ‘จโ€๐Ÿ’ป

1๏ธโƒฃ โ€” Confirm Which Domains the Certificate Covers

Inspect the certificate using:

openssl s_client -connect www.domain.com:443

Review the SAN section:

X509v3 Subject Alternative Name: DNS:*.domain.com DNS:domain.com DNS:www.domain.com

If domain.com is NOT listed โ†’ the certificate cannot validate the root domain.


2๏ธโƒฃ โ€” Edit the TLS/SSL Inspector to Use a Valid Subdomain

Choose a working subdomain included in the wildcard certificate:

  • www.domain.com

  • app.domain.com

  • Any FQDN covered by your certificate SAN list

How to Update the Inspector:

  1. Go to Inspectors โ†’ TLS/SSL

  2. Click โ‹ฎ (three dots) next to the failing Inspector

  3. Select Edit

  4. Replace the target with a valid subdomain

  5. Save and rerun the Inspector

3๏ธโƒฃ โ€” Verify DNS Resolution

Ensure the subdomain resolves publicly:

nslookup www.domain.com

or

dig www.domain.com

You should get a valid public IP.

4๏ธโƒฃ โ€” Rerun the TLS/SSL Inspector

Once the Inspector is configured to point to a valid subdomain, the inspection should complete successfully.

Expected Outcome

Condition

Expected Result

Subdomain is included in SANs

Inspection succeeds

Root domain not included in SANs

Root inspection fails; subdomain succeeds

DNS resolves properly

Certificate retrieved

DNS broken or FQDN blocked

Inspector fails (see Additional Troubleshooting)


Additional Troubleshooting ๐Ÿš€

Use this section if the Inspector continues to fail after updating the FQDN.

1. Check DNS Resolution Errors

Issue

Explanation

Action

NXDOMAIN

Subdomain does not exist

Create proper A/CNAME record

No response

DNS provider blocking requests

Test via external DNS resolvers

Wrong IP

FQDN pointing to internal/private IP

Fix DNS to route externally

2. Review Blocklisting or Firewall Restrictions

Since TLS/SSL Inspector runs from the Liongard Cloud Agent, the hosting provider may block automated scans.

Signs include:

  • Timeout

  • Reset by peer

  • No certificate returned

Resolution:

  • Whitelist Cloud Agent IPs

  • Check WAF/CDN for anti-bot events

  • Verify SSL termination points

3. Validate Certificate Binding and Port

In some environments (e.g., load balancers, reverse proxies), the certificate is bound to a non-standard port.

Test with:

openssl s_client -connect www.domain.com:8443

If certificate appears on 8443:

โ†’ Update the Inspector to:

https://www.domain.com:8443

4. Check Certificate Chain Issues

Issues like:

  • Missing intermediate certificates

  • Expired intermediates

  • Chain misconfiguration

โ€ฆcan also cause Inspector failures.

Use SSL Labs to confirm chain health.


Wildcard Certificate Coverage ๐Ÿ“ˆ

               *.domain.com Certificate Coverage

โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”
โ”‚ domain.com โ”‚ โœ˜ NOT covered
โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜
โ–ฒ
โ”‚
โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”ผโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”
โ”‚ โ”‚ โ”‚
โ–ผ โ–ผ โ–ผ
www.domain.com app.domain.com mail.domain.com โœ” Covered

Wildcard protects only subdomains, NOT the apex.


When to Contact Liongard Support ๐Ÿฆ

Contact Support if:

  • The certificate validation still fails after using a valid subdomain

  • You cannot determine which SANs the certificate includes

  • DNS resolution behaves differently internally vs externally

  • You suspect Cloud Agent blocklisting

  • The Inspector shows unexpected or inconsistent results

Please include:

Information Needed

Why It Helps

Domain inspected

Confirms scope

Inspector error message

Identifies failure type

Certificate chain or SAN list

Confirms coverage

DNS results (nslookup / dig)

Validates FQDN resolution

Hosting provider or CDN details

Helps check anti-bot blocklisting


Disclaimers โ€ผ๏ธ

  • This behavior is expected due to certificate validation standards, not a Liongard-specific defect.

  • Wildcard certificates do not automatically cover root domains unless explicitly listed in SANs.

  • TLS/SSL Inspector requires public reachability; private domains are not supported.

  • Updates to wildcard certificate SANs require updating the Inspector target if domain coverage changes.

Did this answer your question?