<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet type="text/xsl" href="https://devzone.nordicsemi.com/cfs-file/__key/system/syndication/rss.xsl" media="screen"?><rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/" xmlns:wfw="http://wellformedweb.org/CommentAPI/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>HTTPS POST not working in SLM</title><link>https://devzone.nordicsemi.com/f/nordic-q-a/84471/https-post-not-working-in-slm</link><description>(For some reason, I use &amp;quot;...&amp;#39; replace the original string) Here is the log for using AT to do HTTPS POST: 
 2022-02-07T12:19:39.057Z DEBUG modem &amp;gt;&amp;gt; AT#XHTTPCCON=1,&amp;quot;...&amp;quot;,443 2022-02-07T12:19:40.057Z ERROR Error: &amp;#39;AT#XHTTPCCON=1,&amp;quot;...&amp;quot;,443 &amp;#39; timed out 2022</description><dc:language>en-US</dc:language><generator>Telligent Community 13</generator><lastBuildDate>Thu, 10 Feb 2022 14:40:54 GMT</lastBuildDate><atom:link rel="self" type="application/rss+xml" href="https://devzone.nordicsemi.com/f/nordic-q-a/84471/https-post-not-working-in-slm" /><item><title>RE: HTTPS POST not working in SLM</title><link>https://devzone.nordicsemi.com/thread/352386?ContentTypeID=1</link><pubDate>Thu, 10 Feb 2022 14:40:54 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:7f0ba830-93c3-405d-b67d-45d513b66969</guid><dc:creator>TC</dc:creator><description>&lt;p&gt;Just works by upgrade mfw FW from 1.2.3 to 1.3.1.&lt;/p&gt;
&lt;p&gt;Thanks!!&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: HTTPS POST not working in SLM</title><link>https://devzone.nordicsemi.com/thread/352311?ContentTypeID=1</link><pubDate>Thu, 10 Feb 2022 12:18:08 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:b6eb2cdc-0e86-40be-b606-0af3b2bd1f17</guid><dc:creator>H&amp;#229;kon Alseth</dc:creator><description>&lt;p&gt;Hi,&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
[quote user="Tommy C. Liu"]For issue the ISRG root x1 instead of the default digicert, did yiu mean use&amp;nbsp;&lt;a href="https://letsencrypt.org/certs/isrgrootx1.pem"&gt;https://letsencrypt.org/certs/isrgrootx1.pem&lt;/a&gt;&amp;nbsp;as CA cert?&lt;br /&gt;Yes, I try but still same.[/quote]
&lt;p&gt;Yes, this is the one I used with https_client and SLM.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
[quote user="Tommy C. Liu"]You also mention &amp;quot;&lt;span&gt;Could it be that you&amp;#39;re connecting locally to that server?&amp;quot;&lt;br /&gt;Is that mean the local operator for LTE-M network may has conneting issue, just like firewall something else?&lt;/span&gt;[/quote]
&lt;p&gt;I was more thinking about the openssl command that you issued, and got a different result than me.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
[quote user="Tommy C. Liu"]1. What&amp;#39;s your SLM version and&amp;nbsp;mfw version?[/quote]
&lt;p&gt;mfw v1.3.1 and ncs v1.9.0-rc1&lt;/p&gt;
[quote user="Tommy C. Liu"]2. How to check the current mfw ver?[/quote]
&lt;p&gt;You can issue AT+CGMR to query the modem fw version.&lt;/p&gt;
[quote user="Tommy C. Liu"]3. which network operator you are cnnect to?[/quote]
&lt;p&gt;Telenor is my local network operator.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Kind regards,&lt;/p&gt;
&lt;p&gt;Håkon&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: HTTPS POST not working in SLM</title><link>https://devzone.nordicsemi.com/thread/352306?ContentTypeID=1</link><pubDate>Thu, 10 Feb 2022 12:06:30 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:e658d328-8544-419b-86d8-eee4841a2908</guid><dc:creator>TC</dc:creator><description>&lt;p&gt;That was more clear it&amp;#39;s not about CA issue.&lt;br /&gt;I&amp;#39;ll try to let trace collector works first and check wha&amp;#39;t going on.&lt;/p&gt;
&lt;p&gt;Just want to sync few information with your side:&lt;br /&gt;1. What&amp;#39;s your SLM version and&amp;nbsp;mfw version?&lt;br /&gt;2. How to check the current mfw ver?&lt;br /&gt;3. which network operator you are cnnect to?&lt;/p&gt;
&lt;p&gt;Thanks.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: HTTPS POST not working in SLM</title><link>https://devzone.nordicsemi.com/thread/352299?ContentTypeID=1</link><pubDate>Thu, 10 Feb 2022 11:29:54 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:a6834956-98f4-4bf2-bc6c-be58a5677ce4</guid><dc:creator>H&amp;#229;kon Alseth</dc:creator><description>&lt;p&gt;Hi,&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;With https_client, changed the hostname to match your wanted host.&lt;/p&gt;
&lt;p&gt;And issued the X1 root CA:&lt;/p&gt;
&lt;p&gt;&lt;a href="https://letsencrypt.org/certs/isrgrootx1.pem"&gt;https://letsencrypt.org/certs/isrgrootx1.pem&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;this is the output:&lt;/p&gt;
&lt;p&gt;&lt;pre class="ui-code" data-mode="text"&gt;*** Booting Zephyr OS build v2.7.99-ncs1-rc1  ***
HTTPS client sample started
Certificate mismatch
Provisioning certificate
Waiting for network.. OK
Connecting to gateway.dev.jawbonehealth.com
Sent 79 bytes
Received 267 bytes

&amp;gt;        HTTP/1.1 401 Unauthorized

Finished, closing socket.
&lt;/pre&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Similar with SLM (reused sec_tag 42, which has X1 CA):&lt;/p&gt;
&lt;p&gt;&lt;pre class="ui-code" data-mode="text"&gt;AT#XHTTPCCON=1,&amp;quot;gateway.dev.jawbonehealth.com&amp;quot;,443,42

#XHTTPCCON: 1

OK

AT#XHTTPCREQ=&amp;quot;GET&amp;quot;,&amp;quot;/get?foo1=bar1&amp;amp;foo2=bar2&amp;quot;,&amp;quot;&amp;quot;

OK

#XHTTPCREQ: 0

#XHTTPCRSP:0,1

#XHTTPCRSP:0,1
&lt;/pre&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Kind regards,&lt;/p&gt;
&lt;p&gt;Håkon&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: HTTPS POST not working in SLM</title><link>https://devzone.nordicsemi.com/thread/352285?ContentTypeID=1</link><pubDate>Thu, 10 Feb 2022 10:39:24 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:eb30f09c-3c11-4197-9b12-9462961ce2f4</guid><dc:creator>TC</dc:creator><description>&lt;p&gt;For issue the ISRG root x1 instead of the default digicert, did yiu mean use&amp;nbsp;&lt;a href="https://letsencrypt.org/certs/isrgrootx1.pem"&gt;https://letsencrypt.org/certs/isrgrootx1.pem&lt;/a&gt;&amp;nbsp;as CA cert?&lt;br /&gt;Yes, I try but still same.&lt;/p&gt;
&lt;p&gt;You also mention &amp;quot;&lt;span&gt;Could it be that you&amp;#39;re connecting locally to that server?&amp;quot;&lt;br /&gt;Is that mean the local operator for LTE-M network may has conneting issue, just like firewall something else?&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Thanks&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: HTTPS POST not working in SLM</title><link>https://devzone.nordicsemi.com/thread/352266?ContentTypeID=1</link><pubDate>Thu, 10 Feb 2022 09:44:58 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:5592d1e0-afbc-4697-bc55-4e72b9e249cb</guid><dc:creator>TC</dc:creator><description>&lt;p&gt;Hi&amp;nbsp;&lt;br /&gt;I just found the different openssl version may cause the different result, I can get the similar result with yours in another computer.&lt;br /&gt;So, looks like server return 3 CA certs, and, I can pick either one for CA certificate in sec_tag, right?&lt;br /&gt;If it is, would you mind to try in your side for&amp;nbsp;AT#XHTTPCCON=1,&amp;quot;gateway.dev.jawbonehealth.com&amp;quot;,443,sec_tag?&lt;br /&gt;I&amp;nbsp;believe I already try those CA certs but still not connected.&lt;/p&gt;
&lt;p&gt;&lt;br /&gt;Thanks&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: HTTPS POST not working in SLM</title><link>https://devzone.nordicsemi.com/thread/352255?ContentTypeID=1</link><pubDate>Thu, 10 Feb 2022 09:27:53 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:dbe2d078-4399-4827-882a-b3d4abad29ec</guid><dc:creator>H&amp;#229;kon Alseth</dc:creator><description>&lt;p&gt;Hi,&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Could it be that you&amp;#39;re connecting locally to that server?&lt;/p&gt;
&lt;p&gt;Here&amp;#39;s what I get when I run the exact same command:&lt;/p&gt;
&lt;p&gt;&lt;pre class="ui-code" data-mode="text"&gt;openssl s_client -showcerts -connect gateway.dev.jawbonehealth.com:443 
CONNECTED(00000003)
depth=2 C = US, O = Internet Security Research Group, CN = ISRG Root X1
verify return:1
depth=1 C = US, O = Let&amp;#39;s Encrypt, CN = R3
verify return:1
depth=0 CN = gateway.dev.jawbonehealth.com
verify return:1
---
Certificate chain
 0 s:CN = gateway.dev.jawbonehealth.com
   i:C = US, O = Let&amp;#39;s Encrypt, CN = R3
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
 1 s:C = US, O = Let&amp;#39;s Encrypt, CN = R3
   i:C = US, O = Internet Security Research Group, CN = ISRG Root X1
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
 2 s:C = US, O = Internet Security Research Group, CN = ISRG Root X1
   i:O = Digital Signature Trust Co., CN = DST Root CA X3
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
---
Server certificate
subject=CN = gateway.dev.jawbonehealth.com

issuer=C = US, O = Let&amp;#39;s Encrypt, CN = R3

---
No client certificate CA names sent
Peer signing digest: SHA256
Peer signature type: RSA-PSS
Server Temp Key: X25519, 253 bits
---
SSL handshake has read 4603 bytes and written 401 bytes
Verification: OK
---
New, TLSv1.3, Cipher is TLS_AES_256_GCM_SHA384
Server public key is 2048 bit
Secure Renegotiation IS NOT supported
Compression: NONE
Expansion: NONE
No ALPN negotiated
Early data was not sent
Verify return code: 0 (ok)
---
---
Post-Handshake New Session Ticket arrived:
SSL-Session:
    Protocol  : TLSv1.3
    Cipher    : TLS_AES_256_GCM_SHA384
    Session-ID: E3EE2D025F3D2BBBEFC906ECC4C8845B9F5F5A6E35169678823EB3B7E37CDF97
    Session-ID-ctx: 
    Resumption PSK: 47FC953FC2901D28B1FCB680495CF9104C991004EC4FE53B99B7362141A8E7257448481B33BC16007F567CD971802F29
    PSK identity: None
    PSK identity hint: None
    SRP username: None
    TLS session ticket lifetime hint: 600 (seconds)
    TLS session ticket:
    0000 - d6 c4 8f 9a e7 b0 38 45-2a 44 9f 95 f5 41 da 18   ......8E*D...A..
    0010 - b5 16 4f 00 8d 59 93 76-04 44 87 9d e2 31 bc cb   ..O..Y.v.D...1..

    Start Time: 1644484574
    Timeout   : 7200 (sec)
    Verify return code: 0 (ok)
    Extended master secret: no
    Max Early Data: 0
---
read R BLOCK
---
Post-Handshake New Session Ticket arrived:
SSL-Session:
    Protocol  : TLSv1.3
    Cipher    : TLS_AES_256_GCM_SHA384
    Session-ID: 7EE212D109C7E6CDE3912EF11AAC41DBF8889390369EA0C188C8976430409E7F
    Session-ID-ctx: 
    Resumption PSK: CD270E207A219AD3F6FBD8E5E02A16D4FDB6F5D348DB2CFCD1BF026D7852F6B7750F96FBF7259F5C14FBB06F6E182245
    PSK identity: None
    PSK identity hint: None
    SRP username: None
    TLS session ticket lifetime hint: 600 (seconds)
    TLS session ticket:
    0000 - 55 8e b6 2f 6d 59 91 54-03 af 67 18 15 74 0c 98   U../mY.T..g..t..
    0010 - ae 85 d7 d4 ff dc a3 0f-b1 c1 08 87 23 ce ba fd   ............#...

    Start Time: 1644484574
    Timeout   : 7200 (sec)
    Verify return code: 0 (ok)
    Extended master secret: no
    Max Early Data: 0
---
read R BLOCK
closed
&lt;/pre&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;If you are having issues with SLM + modem tracing, you can try to use https_client instead and issue the ISRG root x1 instead of the default digicert.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Kind regards,&lt;/p&gt;
&lt;p&gt;Håkon&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: HTTPS POST not working in SLM</title><link>https://devzone.nordicsemi.com/thread/352210?ContentTypeID=1</link><pubDate>Thu, 10 Feb 2022 06:47:28 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:8290d101-56f9-4f37-be4d-e7b2f01167c6</guid><dc:creator>TC</dc:creator><description>&lt;p&gt;Is it possible to run&amp;nbsp;&lt;span&gt;&amp;nbsp;LTE TraceCollector v2 preview with LTE Link Monitor? &lt;br /&gt;If not, how can I send the AT command to nRF9160.&lt;br /&gt;I still can not see any trace, and the filesize in side panel not growth.&lt;br /&gt;&lt;br /&gt;Here are steps for using trace collector:&lt;br /&gt;1. program&amp;nbsp;&lt;/span&gt;&lt;span class="s1"&gt;nrf9160_dk_board_controller_fw.hex to nRF52 in nRF9160DK.&lt;br /&gt;2. program SLM (with&amp;nbsp;&lt;/span&gt;&lt;span class="s1"&gt;CONFIG_NRF_MODEM_LIB_TRACE_ENABLED=y) to nRF91 in&amp;nbsp;&lt;span&gt;nRF9160DK.&lt;br /&gt;3. connect nrf9160 DK in&amp;nbsp;TraceCollector, then start tracing with LIVE&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span class="s1"&gt;&lt;span&gt;No trace shows in Wireshark...&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;br /&gt;&lt;br /&gt;I try&amp;nbsp;to use openssl to get the CA cert, but AT#XHTTPCCON still not&amp;nbsp;connected after update the seg_tag. &lt;br /&gt;Just wonder what&amp;#39;s the &amp;quot;Kubernetes Ingress Controller Fake Certificate&amp;quot; means in the following?&lt;br /&gt;&lt;pre class="ui-code" data-mode="text"&gt;openssl s_client -showcerts -connect gateway.dev.jawbonehealth.com:443 
CONNECTED(00000005)
depth=0 O = Acme Co, CN = Kubernetes Ingress Controller Fake Certificate
verify error:num=20:unable to get local issuer certificate
verify return:1
depth=0 O = Acme Co, CN = Kubernetes Ingress Controller Fake Certificate
verify error:num=21:unable to verify the first certificate
verify return:1
---
Certificate chain
 0 s:/O=Acme Co/CN=Kubernetes Ingress Controller Fake Certificate
   i:/O=Acme Co/CN=Kubernetes Ingress Controller Fake Certificate
-----BEGIN CERTIFICATE-----
MIIDbzCCAlegAwIBAgIQfStz7642v8lUvvWCwhUJ/jANBgkqhkiG9w0BAQsFADBL
.....&lt;/pre&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: HTTPS POST not working in SLM</title><link>https://devzone.nordicsemi.com/thread/352146?ContentTypeID=1</link><pubDate>Wed, 09 Feb 2022 15:46:54 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:74a5d959-2193-48dc-9a4c-99ba74c67138</guid><dc:creator>H&amp;#229;kon Alseth</dc:creator><description>&lt;p&gt;Hi,&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
[quote user="Tommy C. Liu"]Is there any other tool can verify if this is a CA issue?[/quote]
&lt;p&gt;I usually use openssl to see what the CA root of a specific domain is:&lt;/p&gt;
&lt;p&gt;&lt;pre class="ui-code" data-mode="text"&gt;openssl s_client -showcerts -connect some.domain:443&lt;/pre&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;To have a deeper look at what is happening on the nRF side, a modem trace or a live pcap capture using the LTE TraceCollector v2 preview can help aid the debugging process.&lt;/p&gt;
[quote user="Tommy C. Liu"]For create the https connection, only the CA certificate need to be update in certificate manger, right?[/quote]
&lt;p&gt;That is correct.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Kind regards,&lt;/p&gt;
&lt;p&gt;Håkon&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: HTTPS POST not working in SLM</title><link>https://devzone.nordicsemi.com/thread/352133?ContentTypeID=1</link><pubDate>Wed, 09 Feb 2022 15:19:18 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:bab2ed04-b5e0-4a78-b24d-cf704ac65b23</guid><dc:creator>TC</dc:creator><description>&lt;p&gt;Hi&lt;br /&gt;Is there any other tool can verify if this is a CA issue?&lt;br /&gt;For create the https connection, only the CA certificate need to be update in certificate manger, right?&lt;br /&gt;&lt;br /&gt;Thanks&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: HTTPS POST not working in SLM</title><link>https://devzone.nordicsemi.com/thread/351977?ContentTypeID=1</link><pubDate>Wed, 09 Feb 2022 08:52:02 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:7da2fd5b-f05d-47c5-a795-7abc79963ada</guid><dc:creator>H&amp;#229;kon Alseth</dc:creator><description>&lt;p&gt;Hi,&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;That domain uses let&amp;#39;s encrypt. Are you issuing ISRG Root X1 from here?&lt;/p&gt;
&lt;p&gt;&lt;a href="https://letsencrypt.org/certificates/"&gt;https://letsencrypt.org/certificates/&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Kind regards,&lt;/p&gt;
&lt;p&gt;Håkon&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: HTTPS POST not working in SLM</title><link>https://devzone.nordicsemi.com/thread/351962?ContentTypeID=1</link><pubDate>Wed, 09 Feb 2022 07:56:12 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:2126df3f-a10f-4fe2-aa37-dbc076839857</guid><dc:creator>TC</dc:creator><description>&lt;p&gt;I apply our CA to certificate manager, but still CANNOT create connection.&lt;/p&gt;
&lt;p&gt;&lt;pre class="ui-code" data-mode="text"&gt;AT#XHTTPCCON=1,&amp;quot;gateway.dev.jawbonehealth.com&amp;quot;,443,5568
#XHTTPCCON: 0
ERROR&lt;/pre&gt;&lt;br /&gt;&lt;span class="tx"&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;Both the example.com and goole.com were connected with it&amp;#39;s CA.&lt;br /&gt;&lt;br /&gt;&lt;pre class="ui-code" data-mode="text"&gt;AT#XHTTPCCON=1,&amp;quot;example.com&amp;quot;,443,1234
%CESQ: 20,1,3,0
#XHTTPCCON: 1
OK&lt;/pre&gt;&lt;/p&gt;
&lt;p&gt;&lt;br /&gt;&lt;pre class="ui-code" data-mode="text"&gt;AT#XHTTPCCON=1,&amp;quot;google.com&amp;quot;,443,1235
#XHTTPCCON: 1
OK&lt;/pre&gt;&lt;/p&gt;
&lt;p&gt;&lt;br /&gt;Is there any log option can debug further?&lt;/p&gt;
&lt;pre&gt;&lt;/pre&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: HTTPS POST not working in SLM</title><link>https://devzone.nordicsemi.com/thread/351790?ContentTypeID=1</link><pubDate>Tue, 08 Feb 2022 12:28:45 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:53e3bbcb-1bd0-4770-a77a-f3011d1138f9</guid><dc:creator>H&amp;#229;kon Alseth</dc:creator><description>&lt;p&gt;Hi,&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;When you&amp;#39;re issuing this:&lt;/p&gt;
[quote user=""]AT#XHTTPCCON=1,&amp;quot;...&amp;quot;,443[/quote]
&lt;p&gt;It assumes that it is a http connection to a https service.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Once you send something that isn&amp;#39;t considered https, the server closes the connection, and therefore you get the error on the next command.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;If you want to run https connection, you will have to provide a sec_tag to the initial connection. You shall place your CA root for your domain in this sec_tag.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Kind regards,&lt;/p&gt;
&lt;p&gt;Håkon&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item></channel></rss>