<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet type="text/xsl" href="https://devzone.nordicsemi.com/cfs-file/__key/system/syndication/rss.xsl" media="screen"?><rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/" xmlns:wfw="http://wellformedweb.org/CommentAPI/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>9151 https download</title><link>https://devzone.nordicsemi.com/f/nordic-q-a/127011/9151-https-download</link><description>HI, i have been using the nrf9151 to download my OTA&amp;#39;s it has been working fine, but since this week it stopped working for all device we have deployed, i suspect it is related to the change in certificates but i already tried to go back to a certificate</description><dc:language>en-US</dc:language><generator>Telligent Community 13</generator><lastBuildDate>Tue, 17 Feb 2026 14:48:37 GMT</lastBuildDate><atom:link rel="self" type="application/rss+xml" href="https://devzone.nordicsemi.com/f/nordic-q-a/127011/9151-https-download" /><item><title>RE: 9151 https download</title><link>https://devzone.nordicsemi.com/thread/561371?ContentTypeID=1</link><pubDate>Tue, 17 Feb 2026 14:48:37 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:fad3505e-979e-403a-8f08-efbc3ce18309</guid><dc:creator>Syed Maysum Abbas Zaidi</dc:creator><description>&lt;p&gt;Hi,&lt;/p&gt;
&lt;p&gt;Thanks for sharing the root cause of the issue and&amp;nbsp;we’re glad to hear the OTA download is now working again.&lt;/p&gt;
&lt;p&gt;Best Regards,&lt;br /&gt;Syed Maysum&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: 9151 https download</title><link>https://devzone.nordicsemi.com/thread/561341?ContentTypeID=1</link><pubDate>Tue, 17 Feb 2026 10:48:16 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:35cbeed7-a4f6-418d-94d0-c5604dff0e2b</guid><dc:creator>pauloslf</dc:creator><description>&lt;p&gt;HI,&lt;/p&gt;
&lt;p&gt;the issue was caused by a server change, basically the range http header was not being&amp;nbsp;handled, the nrf was requesting 1024 bytes and receiving a lot more, and that caused the described problems, we managed to fix the issue server side and the code we had started to work without issues.&lt;/p&gt;
&lt;p&gt;Thanks for your support&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: 9151 https download</title><link>https://devzone.nordicsemi.com/thread/561337?ContentTypeID=1</link><pubDate>Tue, 17 Feb 2026 10:28:04 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:63037707-4eaf-4f28-b6fb-59a558c54fa8</guid><dc:creator>Syed Maysum Abbas Zaidi</dc:creator><description>&lt;p&gt;Hi,&lt;/p&gt;
&lt;p&gt;Based on the additional details and the error codes (-12 ENOMEM, -34 ERANGE, -104 ECONNRESET), this does not look like a certificate validation issue, since the TLS handshake completes and your backend receives HTTPS requests.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The nRF91 modem has a documented TLS receive size limitation of around 2 kB as shown&amp;nbsp;&lt;a href="https://docs.nordicsemi.com/bundle/ncs-latest/page/nrf/libraries/networking/downloader.html#limitations"&gt;here&lt;/a&gt;. If the TLS packet (which includes HTTP headers and payload inside a single TLS record) exceeds this limit, the download can fail after the handshake. So can you try capturing the TLS traffic (for example with Wireshark) and checking the TLS record lengths being sent by the server.&lt;/p&gt;
&lt;p&gt;Best Regards,&lt;br /&gt;Syed Maysum&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: 9151 https download</title><link>https://devzone.nordicsemi.com/thread/561276?ContentTypeID=1</link><pubDate>Mon, 16 Feb 2026 16:25:49 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:06a5bcb1-3863-49d4-9d7d-45b72515e8cb</guid><dc:creator>pauloslf</dc:creator><description>&lt;p&gt;&lt;span&gt;Hi Syed,&lt;/span&gt;&lt;span&gt;Thank you for the quick response. We&amp;#39;ve already investigated the certificate chain and it appears to be correct. Here&amp;#39;s what we&amp;#39;ve found:&lt;/span&gt;&lt;span class="markdown-bold-text"&gt;&lt;span&gt;1. Server certificate chain (via&amp;nbsp;&lt;/span&gt;&lt;span&gt;&lt;span&gt;openssl s_client&lt;/span&gt;&lt;/span&gt;&lt;span&gt;):&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;div class="markdown-code-outer-container markdown-block-code"&gt;
&lt;div&gt;
&lt;div class="composer-code-block-container composer-message-codeblock display-codeblock"&gt;
&lt;div&gt;
&lt;div class="composer-code-block-content" data-mode-id="worktree-plaintext"&gt;
&lt;div data-keybinding-context="712" data-mode-id="plaintext"&gt;
&lt;div class="monaco-editor no-user-select mac  showUnused showDeprecated vs-dark" data-uri="display-codeblock://3v8ejzyxyk"&gt;
&lt;div class="overflow-guard" data-mprt="3"&gt;
&lt;div class="monaco-editor-background textAreaCover"&gt;&lt;/div&gt;
&lt;div class="margin"&gt;
&lt;div class="glyph-margin"&gt;&lt;/div&gt;
&lt;div class="margin-view-zones"&gt;&lt;/div&gt;
&lt;div class="margin-view-overlays"&gt;
&lt;div&gt;
&lt;div class="current-line"&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;&lt;/div&gt;
&lt;div&gt;&lt;/div&gt;
&lt;div&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div class="glyph-margin-widgets"&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div class="monaco-scrollable-element editor-scrollable vs-dark mac" data-mprt="6"&gt;
&lt;div class="lines-content monaco-editor-background"&gt;
&lt;div class="view-overlays"&gt;
&lt;div&gt;&lt;/div&gt;
&lt;div&gt;&lt;/div&gt;
&lt;div&gt;&lt;/div&gt;
&lt;div&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div class="view-rulers"&gt;&lt;/div&gt;
&lt;div class="view-zones"&gt;&lt;/div&gt;
&lt;div class="view-lines monaco-mouse-cursor-text" data-mprt="8"&gt;
&lt;div class="view-line"&gt;&lt;span&gt;&lt;span class="mtk1"&gt;0&amp;nbsp;s:CN&amp;nbsp;=&lt;a id="" href="https://updates.server.com/"&gt;https://updates.server.com&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="view-line"&gt;&lt;span&gt;&lt;span class="mtk1"&gt;&amp;nbsp;&amp;nbsp;i:C&amp;nbsp;=&amp;nbsp;US,&amp;nbsp;O&amp;nbsp;=&amp;nbsp;Let&amp;#39;s&amp;nbsp;Encrypt,&amp;nbsp;CN&amp;nbsp;=&amp;nbsp;R13&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="view-line"&gt;&lt;span&gt;&lt;span class="mtk1"&gt;1&amp;nbsp;s:C&amp;nbsp;=&amp;nbsp;US,&amp;nbsp;O&amp;nbsp;=&amp;nbsp;Let&amp;#39;s&amp;nbsp;Encrypt,&amp;nbsp;CN&amp;nbsp;=&amp;nbsp;R13&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="view-line"&gt;&lt;span&gt;&lt;span class="mtk1"&gt;&amp;nbsp;&amp;nbsp;i:C&amp;nbsp;=&amp;nbsp;US,&amp;nbsp;O&amp;nbsp;=&amp;nbsp;Internet&amp;nbsp;Security&amp;nbsp;Research&amp;nbsp;Group,&amp;nbsp;&lt;/span&gt;&lt;span class="mtk1"&gt;CN&amp;nbsp;=&amp;nbsp;ISRG&amp;nbsp;Root&amp;nbsp;X1&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div class="contentWidgets" data-mprt="1"&gt;&lt;/div&gt;
&lt;div class="cursors-layer cursor-line-style cursor-solid"&gt;
&lt;div class="cursor  monaco-mouse-cursor-text "&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class="invisible scrollbar horizontal"&gt;
&lt;div class="slider"&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div class="invisible scrollbar vertical"&gt;
&lt;div class="slider"&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;&lt;/div&gt;
&lt;div class="overlayWidgets" data-mprt="4"&gt;&lt;/div&gt;
&lt;div class="minimap slider-mouseover" data-mprt="9"&gt;
&lt;div class="minimap-shadow-hidden"&gt;&lt;/div&gt;
&lt;div class="minimap-slider"&gt;
&lt;div class="minimap-slider-horizontal"&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class="blockDecorations-container"&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div class="overflowingContentWidgets" data-mprt="2"&gt;&lt;/div&gt;
&lt;div class="overflowingOverlayWidgets" data-mprt="5"&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;p&gt;&lt;span class="markdown-bold-text"&gt;&lt;span&gt;2. Modem credentials (&lt;/span&gt;&lt;span&gt;&lt;span&gt;AT%CMNG=1&lt;/span&gt;&lt;/span&gt;&lt;span&gt;):&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span class="mtk1"&gt;%CMNG:&amp;nbsp;42,0,&amp;quot;BD6681410FB05ECD2B414AFA3B02E285132CD&lt;/span&gt;&lt;span class="mtk1"&gt;289F9CAD......&amp;quot;&lt;/span&gt;&lt;/p&gt;
&lt;div class="markdown-code-outer-container markdown-block-code"&gt;
&lt;div class="composer-code-block-container composer-message-codeblock display-codeblock"&gt;
&lt;div class="composer-code-block-content" data-mode-id="worktree-plaintext"&gt;
&lt;div data-keybinding-context="713" data-mode-id="plaintext"&gt;
&lt;div class="monaco-editor no-user-select mac  showUnused showDeprecated vs-dark" data-uri="display-codeblock://81yuse9qt7"&gt;
&lt;div class="overflow-guard" data-mprt="3"&gt;
&lt;div class="monaco-scrollable-element editor-scrollable vs-dark mac" data-mprt="6"&gt;
&lt;div class="lines-content monaco-editor-background"&gt;
&lt;div class="contentWidgets" data-mprt="1"&gt;&lt;span&gt;Security tag 42 (type 0 = CA cert) contains the&amp;nbsp;&lt;/span&gt;&lt;span class="markdown-bold-text"&gt;&lt;span&gt;ISRG Root X1&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&amp;nbsp;certificate, which is the root CA for the R13 intermediate. The chain should validate correctly.&lt;/span&gt;&lt;/div&gt;
&lt;div class="contentWidgets" data-mprt="1"&gt;&lt;span class="markdown-bold-text"&gt;&lt;span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="contentWidgets" data-mprt="1"&gt;&lt;span class="markdown-bold-text"&gt;&lt;span&gt;3. Additional diagnostics that suggest this is NOT a certificate issue:&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;ul&gt;
&lt;li data-indent="0"&gt;&lt;span class="markdown-bold-text"&gt;&lt;span&gt;HTTP downloads&lt;/span&gt;&lt;span&gt;&amp;nbsp;work perfectly&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&amp;nbsp;-- when we&lt;/span&gt;&lt;span&gt;&amp;nbsp;bypass&lt;/span&gt;&lt;span&gt;&amp;nbsp;TLS and&lt;/span&gt;&lt;span&gt;&amp;nbsp;use&lt;/span&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;span&gt;&lt;span&gt;http://&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&amp;nbsp;with&lt;/span&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;span&gt;&lt;span&gt;AT&lt;/span&gt;&lt;span&gt;#DOWNLOADFW&lt;/span&gt;&lt;/span&gt;&lt;span&gt;, the&lt;/span&gt;&lt;span&gt;&amp;nbsp;firmware&lt;/span&gt;&lt;span&gt;&amp;nbsp;downloads successfully.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li data-indent="0"&gt;&lt;span class="markdown-bold-text"&gt;&lt;span&gt;The TLS handshake appears to succeed&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&amp;nbsp;-- our&lt;/span&gt;&lt;span&gt;&amp;nbsp;backend&lt;/span&gt;&lt;span&gt;&amp;nbsp;(behind&lt;/span&gt;&lt;span&gt;&amp;nbsp;nginx) receives 8&lt;/span&gt;&lt;span&gt;+ HTTP requests from&lt;/span&gt;&lt;span&gt;&amp;nbsp;the modem during&lt;/span&gt;&lt;span&gt;&amp;nbsp;a&lt;/span&gt;&lt;span&gt;&amp;nbsp;single&lt;/span&gt;&lt;span&gt;&amp;nbsp;download&lt;/span&gt;&lt;span&gt;&amp;nbsp;attempt&lt;/span&gt;&lt;span&gt;, meaning&lt;/span&gt;&lt;span&gt;&amp;nbsp;the T&lt;/span&gt;&lt;span&gt;LS connection&lt;/span&gt;&lt;span&gt;&amp;nbsp;is established and&lt;/span&gt;&lt;span&gt;&amp;nbsp;the HTTP&lt;/span&gt;&lt;span&gt;&amp;nbsp;GET request reaches&lt;/span&gt;&lt;span&gt;&amp;nbsp;the server&lt;/span&gt;&lt;span&gt;.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li data-indent="0"&gt;&lt;span class="markdown-bold-text"&gt;&lt;span&gt;Error codes change with server&lt;/span&gt;&lt;span&gt;&amp;nbsp;TLS configuration&lt;/span&gt;&lt;span&gt;:&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul class="nested"&gt;
&lt;li class="nested" data-indent="2"&gt;&lt;span&gt;T&lt;/span&gt;&lt;span&gt;LS 1.3&amp;nbsp;&lt;/span&gt;&lt;span&gt;(CHA&lt;/span&gt;&lt;span&gt;CHA20-POLY1305)&lt;/span&gt;&lt;span&gt;:&lt;/span&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;span&gt;&lt;span&gt;+&lt;/span&gt;&lt;span&gt;D&lt;/span&gt;&lt;span&gt;L&lt;/span&gt;&lt;span&gt;:&lt;/span&gt;&lt;span&gt;&amp;nbsp;3&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;&amp;nbsp;-&lt;/span&gt;&lt;span&gt;34&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&amp;nbsp;(ERANGE&lt;/span&gt;&lt;span&gt;)&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul class="nested"&gt;
&lt;li class="nested" data-indent="2"&gt;&lt;span&gt;TLS 1.&lt;/span&gt;&lt;span&gt;2 (AES12&lt;/span&gt;&lt;span&gt;8-GCM&lt;/span&gt;&lt;span&gt;, default&lt;/span&gt;&lt;span&gt;&amp;nbsp;record&lt;/span&gt;&lt;span&gt;&amp;nbsp;size):&amp;nbsp;&lt;/span&gt;&lt;span&gt;&lt;span&gt;+DL:&amp;nbsp;&lt;/span&gt;&lt;span&gt;3, -12&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&amp;nbsp;(EN&lt;/span&gt;&lt;span&gt;OMEM)&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul class="nested"&gt;
&lt;li class="nested" data-indent="2"&gt;&lt;span&gt;TLS&lt;/span&gt;&lt;span&gt;&amp;nbsp;1.2 (AES&lt;/span&gt;&lt;span&gt;12&lt;/span&gt;&lt;span&gt;8-GCM, ssl&lt;/span&gt;&lt;span&gt;_buffer_size&amp;nbsp;&lt;/span&gt;&lt;span&gt;4k):&amp;nbsp;&lt;/span&gt;&lt;span&gt;&lt;span&gt;+DL:&amp;nbsp;&lt;/span&gt;&lt;span&gt;3, -104&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&amp;nbsp;(E&lt;/span&gt;&lt;span&gt;CONN&lt;/span&gt;&lt;span&gt;RESET)&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li data-indent="0"&gt;&lt;span class="markdown-bold-text"&gt;&lt;span&gt;Mo&lt;/span&gt;&lt;span&gt;dem firmware&lt;/span&gt;&lt;span&gt;:&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;span&gt;&lt;span&gt;m&lt;/span&gt;&lt;span&gt;fw&lt;/span&gt;&lt;span&gt;_nrf&lt;/span&gt;&lt;span&gt;91x1_2.0.2&lt;/span&gt;&lt;/span&gt;&lt;span&gt;, Application&lt;/span&gt;&lt;span&gt;&amp;nbsp;firmware:&amp;nbsp;&lt;/span&gt;&lt;span&gt;&lt;span&gt;1.4&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li data-indent="0"&gt;&lt;span class="markdown-bold-text"&gt;&lt;span&gt;This was working&amp;nbsp;2&amp;nbsp;weeks ago&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&amp;nbsp;with&lt;/span&gt;&lt;span&gt;&amp;nbsp;the same mo&lt;/span&gt;&lt;span&gt;dem firmware&lt;/span&gt;&lt;span&gt;. The server&lt;/span&gt;&lt;span&gt;&amp;nbsp;runs&lt;/span&gt;&lt;span&gt;&amp;nbsp;nginx&lt;/span&gt;&lt;span&gt;&amp;nbsp;1.28 and&lt;/span&gt;&lt;span&gt;&amp;nbsp;we&lt;/span&gt;&lt;span&gt;&amp;nbsp;suspect&lt;/span&gt;&lt;span&gt;&amp;nbsp;an&lt;/span&gt;&lt;span&gt;&amp;nbsp;OpenSSL update&lt;/span&gt;&lt;span&gt;&amp;nbsp;may have changed TLS record&lt;/span&gt;&lt;span&gt;&amp;nbsp;sizes&lt;/span&gt;&lt;span&gt;.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;span class="markdown-bold-text"&gt;&lt;span&gt;Our&lt;/span&gt;&lt;span&gt;&amp;nbsp;current&lt;/span&gt;&lt;span&gt;&amp;nbsp;theory&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&amp;nbsp;is that the server&amp;#39;s T&lt;/span&gt;&lt;span&gt;LS record&lt;/span&gt;&lt;span&gt;/fragment&lt;/span&gt;&lt;span&gt;&amp;nbsp;size is&lt;/span&gt;&lt;span&gt;&amp;nbsp;too large for the modem&amp;#39;s&lt;/span&gt;&lt;span&gt;&amp;nbsp;receive&lt;/span&gt;&lt;span&gt;&amp;nbsp;buffer&amp;nbsp;&lt;/span&gt;&lt;span&gt;(similar&lt;/span&gt;&lt;span&gt;&amp;nbsp;to&lt;/span&gt;&lt;span&gt;&amp;nbsp;EM&lt;/span&gt;&lt;span&gt;SG&lt;/span&gt;&lt;span&gt;SIZE issues&lt;/span&gt;&lt;span&gt;&amp;nbsp;reported&lt;/span&gt;&lt;span&gt;&amp;nbsp;by&lt;/span&gt;&lt;span&gt;&amp;nbsp;other&lt;/span&gt;&lt;span&gt;&amp;nbsp;n&lt;/span&gt;&lt;span&gt;RF91&lt;/span&gt;&lt;span&gt;&amp;nbsp;users)&lt;/span&gt;&lt;span&gt;.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;We trying upgrading the modem to 2.0.4 (last available version) but the issue remains&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Best&lt;/span&gt;&lt;span&gt;&amp;nbsp;regards&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Paulo&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: 9151 https download</title><link>https://devzone.nordicsemi.com/thread/561271?ContentTypeID=1</link><pubDate>Mon, 16 Feb 2026 15:48:46 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:2df9aa8a-e31c-4b6c-88c4-985dc9fa8701</guid><dc:creator>Syed Maysum Abbas Zaidi</dc:creator><description>&lt;p&gt;Hi,&lt;/p&gt;
&lt;p&gt;This most likely looks like a TLS/certificate issue on the modem side. A common cause is that the server’s certificate chain has changed (for example due to a CA rotation or expiry), and the nRF9151 no longer trusts your HTTPS server, so the TLS handshake fails. Similar issues have been seen when HTTPS suddenly stopped working until the CA in the device was updated. So please try the following&lt;/p&gt;
&lt;p&gt;1. Inspect the certificate chain presented by &lt;a href="https://updates.server.com"&gt;https://updates.server.com&lt;/a&gt; (using a browser certificate viewer or openssl s_client) and identify the root CA used.&lt;br /&gt;2.&amp;nbsp;On the device, list the currently stored certificates using:&amp;nbsp;AT%CMNG=1&lt;span&gt;&lt;br /&gt;3. If the root CA used by the server is not present in the modem then delete the old CA and&amp;nbsp;write the correct root CA that matches your server’s current chain.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Best Regards,&lt;br /&gt;Syed Maysum&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item></channel></rss>