The connection is being denied during the TLS handshake, before any HTTPS or secure TCP protocol layer is reached.
That’s why I shared the new information about the server presenting a self-signed certificate with no CA. The modem is rejecting it with Fatal Alert: Unknown CA, so the session is terminated before HTTPS or DTLS can come into play.
I was hoping this detail would help narrow the issue down to certificate trust rather than the higher-level protocol.
TCP approach:
AT+KCNXCFG=1,"GPRS","iot.1nce.net"
OK
AT+KSSLCRYPTO=0,8,3,25392,12,4,3,0
OK
AT+KTCPCFG=1,3,"lwm2m.eu-latest.cumulocity.com",5784
+KTCPCFG: 1
OK
AT+KTCPCNX=1
OK
+KCNX_IND: 1,1,0
+KTCP_NOTIF: 1,13
i remember for one-way authentication, a server must have CA certificate + server certificate and client needs to have the CA certificate
for mutual authentication, the server must have CA certificate + server certificate and client needs to have the CA certificate + client certificate.
So I would suggest you to set up your own HTTPS and secure TCP server to verify
Btw, have you tried to set +ksslcryto to use server authentication instead of mutual authentication?
Furthermore, i saw your +ktcpcfg is not specifying the profile for ssl…