Skip to Main Content
HCL Domino Ideas Portal

Welcome to the #dominoforever Product Ideas Forum! The place where you can submit product ideas and enhancement request. We encourage you to participate by voting on, commenting on, and creating new ideas. All new ideas will be evaluated by HCL Product Management & Engineering teams, and the next steps will be communicated. While not all submitted ideas will be executed upon, community feedback will play a key role in influencing which ideas are and when they will be implemented.

For more information and upcoming events around #dominoforever, please visit our Destination Domino Page

Status Needs Review
Workspace Domino
Categories Security
Created by Guest
Created on Nov 17, 2025

Allow not sending trusted root certificate on tls handshake

RFC 5246 (TLS 1.2) and 8446 (TLS 1.3) clearly state that sending the root certificate is unnecessary, as it is supposed to be known to clients.
https://www.rfc-editor.org/rfc/rfc5246#section-7.4.2
https://www.rfc-editor.org/rfc/rfc8446#section-4.4.2
That said, many HTTPS server analysis tools, including Qualys SSLLabs, view this as a (minor) flaw that needs to be corrected:
Qualys ssllabs: “Chain issues: Contains anchor”
Immuniweb.com/ssl: “Server sends an unnecessary root certificate - Misconfiguration or weakness”
Ionos (https://www.ionos.fr/tools/ssl-checker): “Root installed on the server. For best practices, remove the self-signed root from the server.”


Furthermore, sending an unnecessary certificate with each negotiation can degrade the performance of a heavily used server. It would be good if the server administrator could at least choose whether or not to send the root certificate.

  • Attach files