That error means the client sees a cert chain that includes a CA it doesn’t trust—most commonly a corporate proxy’s self-signed root (TLS inspection) or a misconfigured server chain. Here’s the fastest way to fix it given your AWS client + proxy setup.
0) Quick proof (run behind the proxy)
# Shows who signed what the client actually sees
openssl s_client -proxy PROXY_HOST:PROXY_PORT \
-connect YOUR_HOST:443 -servername YOUR_HOST -showcerts -verify_return_error </dev/null \
| openssl x509 -noout -subject -issuer -enddate
- If the issuer is your company/Zscaler/BlueCoat/etc → it’s proxy interception.
- If the issuer is a normal public CA but the chain still fails → your server/edge isn’t sending the proper intermediates.