SDWAN - Webhook Problem w/ a Certificate Error

Today a short post regarding webhooks on vManage. The actual setup is already described by Cisco and Suchandan Reddy (Technical Marketing Engineer - Cisco SD-WAN). I will mention that the setup of an e-mail server and address is no longer neccessary in versions > 20.3, however, the webhook server’s username and password should be filled in. I usually set it to ‘dummy’/‘dummy’ as most webservers will ignore this data if not required. In this post though, I want to focus on an issue I had on two vManage instances and I’ve tried four different software versions with all the same result:

  • 20.3.4
  • 20.6.3
  • 20.8.1
  • 20.9.1


In this case the webhook stopped working unexpectely for both vManage instances and it took us a while to notice that something was out of the ordinary. To test webhook configuration and alerting I usually resort to By using a curl command in the vShell of vmanage, it’s easy to verify if the webhook is working.

Note that you use your personal link as this automatically generated by the site and you’ll not be able to view the results when using my link.

vManage:~$ curl -v -X POST -H 'Content-type: application/json'
*   Trying
* Connected to ( port 443 (#0)
* error reading ca cert file /etc/ssl/certs/ca-certificates.crt (Error in the time fields of certificate.)
* Closing connection 0
curl: (77) Problem with the SSL CA cert (path? access rights?)

It seems that there is an issue with the ca-certificates.crt file in the underlying operating system.

Diagnose & Fix

What I ended up doing was to download another certificate file, this one being from the Mozilla CA via curl.

vmanage-IRE:~$ curl --insecure > ca-certificates.crt
  % Total    % Received % Xferd  Average Speed   Time    Time     Time  Current
                                 Dload  Upload   Total   Spent    Left  Speed
100  217k  100  217k    0     0  10.1M      0 --:--:-- --:--:-- --:--:-- 10.1M

This allows curl to fetch the cacert.pem file without checking the certificate on the website. This also was a problem apparently, so I set the --insecure flag.

Then test if this solves the problem by connecting again to the webhook server, this time by manually specifying the ca-certificates file by using the --cacert ca-certificates.crt flag.

vmanage-IRE:~# curl -v -X POST -H 'Content-type: application/json' --cacert ca-certificates.crt
*   Trying
* Connected to ( port 443 (#0)
* found 140 certificates in ca-certificates.crt
* ALPN, offering http/1.1
* SSL connection using TLS1.2 / ECDHE_RSA_AES_256_GCM_SHA384
*        server certificate verification OK
*        server certificate status verification SKIPPED
*        common name: (matched)
*        server certificate expiration date OK
*        server certificate activation date OK
*        certificate public key: RSA
*        certificate version: #3
*        subject:
*        start date: Sun, 31 Jul 2022 23:09:19 GMT
*        expire date: Sat, 29 Oct 2022 23:09:18 GMT
*        issuer: C=US,O=Let's Encrypt,CN=R3
* ALPN, server did not agree to a protocol
> POST /d438e39e-eee9-4db1-a66f-0924447f2313 HTTP/1.1
> Host:
> User-Agent: curl/7.69.1
> Accept: */*
> Content-type: application/json
* Mark bundle as not supporting multiuse
< HTTP/1.1 200 OK
< Server: nginx
< Content-Type: text/plain; charset=UTF-8
< Transfer-Encoding: chunked
< Vary: Accept-Encoding
< X-Request-Id: 9090d1d6-3b04-427a-826a-8d4a28e5cc0d
< X-Token-Id: d438e39e-eee9-4db1-a66f-0924447f2313
< Cache-Control: no-cache, private
< Date: Mon, 03 Oct 2022 12:30:58 GMT
* Connection #0 to host left intact

This proves that the ca-certificates.crt file is indeed the issue. You can verify all the CAs in the original CA file (or the one you just downloaded) to see if the CA is even present or not:

openssl crl2pkcs7 -nocrl -certfile ca-certificates.crt | openssl pkcs7 -print_certs -text -noout

To actually solve this issue, you will need the help of Cisco TAC. There needs to be a token generated and then a token response needs to be entered to be able to modify the /etc/ssl/certs directory.

tools consent-token shell request duration 1440

Please copy the challenge phrase appearing between the two
asterisk lines, and use at the Response generation site:
tools consent-token shell validate-response <response>

After you gained shell access, you can use the following commands to fix the issue:

cp /etc/ssl/certs/ca-certificates.crt /etc/ssl/certs/ca-certificates.crt.backup
cp ca-certificates.crt /etc/ssl/certs/ca-certificates.crt

Verify that the read properties are still okay:

vmanage-IRE:~# ls -al /etc/ssl/certs/ca-certificates.crt
-rw-r--r-- 1 root root 191724 Apr 17 20:55 /etc/ssl/certs/ca-certificates.crt

Verify the connectivity again with a test, this time without explicitely pointing to a ca-certificates.crt file:

curl -v -X POST -H 'Content-type: application/json'

The result should be similar to when specifying the ca-certificates.crt file. As a last test, you can set up a temporary webhook in the vmanage pointing to the test webhook link and perform an action on a test device that will trigger this webhook.


It seems that the built-in ca-certificates.crt file is no longer up to date. For both vManage instances, I noticed that the last change date was in April 2022 and the webhook alerting stopped working for both somewhere at the end of August 2022. Updating the vManage to a more recent version has not solved this problem either. I’ve filed this issue as a bug with TAC and hope that they can tackle the problem in a future software update bundle.

For now though, your only solution is to open a TAC case in order to get the correct privileges for this directory. The impact of this issue seems to be limited and mostly pertain to when the vManage needs to reach out to webservices, such as webhook servers. I’ve not verified vAnalytics for example, but this service could potentially be impacted, although this might be dependent on the signing CA. For our webhook server, as well as, the signing CA is Let’s Encrypt. This CA did not directly appear in the original the CA certificates file, but the cross-signed CA does. It’s still unclear why the services stopped working as the ending dates seemed to be okay in the original file.