All fixlets I've tested that download from download.microsoft.com have stopped working, displaying
Download error: "HTTP Error 60: SSL peer certificate or SSH remote key was not OK: SSL certificate problem: unable to get local issuer certificate"
We're running BigFix 11.0.5.203 on Windows Server 2022, and we aren't behind a proxy. Looking at the logs, it seems this started happening ~1 week ago.
Running .\openssl.exe s_client -connect download.microsoft.com:443 -showcerts does seem to fail as well from our root server:
Connecting to 69.192.23.118
CONNECTED(000001F0)
depth=0 C=US, ST=WA, L=Redmond, O=Microsoft Corporation, CN=akamai.download.microsoft.com
verify error:num=20:unable to get local issuer certificate
verify return:1
depth=0 C=US, ST=WA, L=Redmond, O=Microsoft Corporation, CN=akamai.download.microsoft.com
verify error:num=21:unable to verify the first certificate
verify return:1
depth=0 C=US, ST=WA, L=Redmond, O=Microsoft Corporation, CN=akamai.download.microsoft.com
verify return:1
---
Certificate chain
0 s:C=US, ST=WA, L=Redmond, O=Microsoft Corporation, CN=akamai.download.microsoft.com
i:C=US, O=Microsoft Corporation, CN=Microsoft TLS G2 ECC CA OCSP 02
a:PKEY: EC, (prime256v1); sigalg: ecdsa-with-SHA384
v:NotBefore: Jan 13 14:38:56 2026 GMT; NotAfter: Jul 12 14:38:56 2026 GMT
-----BEGIN CERTIFICATE-----
<trimmed>
-----END CERTIFICATE-----
---
Server certificate
subject=C=US, ST=WA, L=Redmond, O=Microsoft Corporation, CN=akamai.download.microsoft.com
issuer=C=US, O=Microsoft Corporation, CN=Microsoft TLS G2 ECC CA OCSP 02
---
No client certificate CA names sent
Peer signing digest: SHA256
Peer signature type: ecdsa_secp256r1_sha256
Peer Temp Key: ECDH, prime256v1, 256 bits
---
SSL handshake has read 2299 bytes and written 1681 bytes
Verification error: unable to verify the first certificate
---
New, TLSv1.2, Cipher is ECDHE-ECDSA-AES256-GCM-SHA384
Protocol: TLSv1.2
Server public key is 256 bit
Secure Renegotiation IS supported
No ALPN negotiated
SSL-Session:
Protocol : TLSv1.2
Cipher : ECDHE-ECDSA-AES256-GCM-SHA384
Session-ID: DE7896737BA3ABA5394C583654C4723E0A55E812A6E53C8D45EED54D949BF2E0
Session-ID-ctx:
Master-Key: B592EDB54D3A34A52C40C7CC01140CD9E94E2CCBD2CB1117F9280E170F7B001E91175C6ED626DCC1565E4C6A88B64FB4
PSK identity: None
PSK identity hint: None
SRP username: None
TLS session ticket lifetime hint: 83100 (seconds)
TLS session ticket:
<trimmed>
Start Time: 1769301713
Timeout : 7200 (sec)
Verify return code: 21 (unable to verify the first certificate)
Extended master secret: no
---
closed
In a browser on the root server, downloading from download.microsoft.com completes with no problem or complaint about certs, e.g. https://download.microsoft.com/download/78744b7f-00ec-4595-95d1-0863f0ef69e8/excel2016-kb5002820-fullfile-x86-glb.exe from "MS25-DEC: Security Update for Microsoft Excel 2016 - Excel 2016 - KB5002820 (Superseded)"
Setting _BESRelay_Download_UntrustedSites=1 does resolve the issue, but we don't want to have this setting enabled. I'm not quite sure what to do — does anyone have any ideas?