Showing results for 
Search instead for 
Did you mean: 
Copilot Lvl 3
Message 1 of 8

Webhooks and SSL verification

Solved! Go to Solution.

We're running Jenkins with HTTPS acces using a certificate from Let's Encrypt.

The following procedure was used to generate and install the certificate:

Connecting from my browser works as it should, the browser indicates the connection is secured and verified by Let's Encrypt.


After updating the webhook in our GitHub repository from connecting over HTTP to HTTPS, GitHub fails to deliver the webhook payload with the following message:


"We couldn’t deliver this payload: Peer certificate cannot be authenticated with given CA certificates"


How come the certificate works in my browser, but doesn't work for webhooks?

7 Replies
Community Manager
Message 2 of 8

Re: Webhooks and SSL verification

All HTTPS certificates are issued by some entity. These certificates are often signed by a Certificate Authority or CA. That signature's authenticity is verified against the CA's certificate which could also be signed by another CA. This can continue in a chain until you either reach the end of the chain or reach certificate signed by a CA that the system implicitly trusts (also known as a "root CA").


For example, you can see the list of root CAs recognized by your system on macOS by using the Keychain Access app under the System Roots keychain:


Screen Shot 2019-01-25 at 10.45.18 AM.png

Different systems can have different lists of trusted root CAs. This is why your browser and our webhook system can have different results when attempting to create an HTTPS connection to the same system.


On the other hand, we haven't had any reports of Let's Encrypt certificates not being honored by our webhook system. You may want to ensure that your system is serving the entire certificate chain when establishing HTTPS connections.


If you continue to run into problems, you may want to write into private support at so they can take a deeper look at your configuration.


I hope that helps!


Copilot Lvl 2
Message 3 of 8

Re: Webhooks and SSL verification

Were you able to determine if this was this issue?

Copilot Lvl 3
Message 4 of 8

Re: Webhooks and SSL verification

I still haven't been able to determine what is the issue. indicates my server is misconfigured and provides a chain it should be using. The suggested chain only contains Let's Encrypt Authority X3, whereas the `fullchain.pem` served by Jenkins contains both my own domain cert and the Let's Encrypt Authority X3 cert. When using the suggested chain neither my browser nor GitHub successfully connect over HTTPS.

If this persists I will write into private support.

Copilot Lvl 2
Message 5 of 8

Re: Webhooks and SSL verification

Ah, interesting, I'm having the exact same issue! We're using fullchain.pem and if we use the suggested chain neither the browser nor GitHub successfully connect over HTTPS. Not sure how to proceed at this point.


If you do make progress through private support, please update here if possible.

Copilot Lvl 3
Message 6 of 8

Re: Webhooks and SSL verification

Someone posted a solution to this problem, which worked for me. You may want to give it a try.

Thanks for your help :)

Ground Controller Lvl 1
Message 7 of 8

Re: Webhooks and SSL verification

We solved this issue by starting Jenkins using the two flags: --httpsKeyStore and --httpsKeyStorePassword instead of --httpsCertificate and --httpsPrivateKey.


In the Jenkins startup logs it mentions that httpsKeyStore is the preferred method. It seems that using the old flags Jenkins was not serving the correct certificate chain.


You can generate the keystore using:

openssl pkcs12 -inkey privkey.pem -in fullchain.pem -export -out keys.pkcs12
keytool -importkeystore -srckeystore keys.pkcs12 -srcstoretype pkcs12 -destkeystore keystore


After starting jenkins using this generated keystore we no longer had issues with github webhooks (also showed that the correct chain was being served)


Copilot Lvl 3
Message 8 of 8

Re: Webhooks and SSL verification

This solution works great. Thank you!


Note that Jenkins won't start when generating the keys.pkcs12 and keystore files using two different passwords. Using the same password for both files solves this problem.