Yes, we are using apache.
We had a 000-default.conf and conf file for each subdomain.
I don't understand the question about challenge request being redirect to HTTPS.
Please provide the FQDN that is having trouble.
and the output of: sudo apachectl -t -D DUMP_VHOSTS
In the error message shown by the ACME client; Does it show that it failed to retrieve the challenge file from HTTP://YOUR.SITE/... or HTTPS://YOUR.SITE/... ?
All our subdomains work similarly by replacing naceo
sudo apachectl -t -D DUMP_VHOSTS
VirtualHost configuration:
51.255.95.18:80 is a NameVirtualHost
default server auboudoirdautrefois.yumi-software.com (/etc/apache2/sites-enabled/auboudoirdautrefois.conf:11)
port 80 namevhost auboudoirdautrefois.yumi-software.com (/etc/apache2/sites-enabled/auboudoirdautrefois.conf:11)
port 80 namevhost auxdoubsoeurs.yumi-software.com (/etc/apache2/sites-enabled/auxdoubsoeurs.conf:11)
port 80 namevhost evalacheray.yumi-software.com (/etc/apache2/sites-enabled/evalacheray.conf:11)
port 80 namevhost formefficience.yumi-software.com (/etc/apache2/sites-enabled/formefficience.conf:11)
port 80 namevhost naceo.yumi-software.com (/etc/apache2/sites-enabled/naceo.conf:11)
port 80 namevhost nlpaysage.yumi-software.com (/etc/apache2/sites-enabled/nlpaysage.conf:11)
port 80 namevhost regalpanier.yumi-software.com (/etc/apache2/sites-enabled/regalpanier.conf:11)
port 80 namevhost www.yumi-software.com (/etc/apache2/sites-enabled/www.conf:11)
port 80 namevhost www.yumi-software.com (/etc/apache2/sites-enabled/www.yumi-software.com.conf:1)
port 80 namevhost yudev.yumi-software.com (/etc/apache2/sites-enabled/yudev.conf:11)
51.255.95.18:443 is a NameVirtualHost
default server auboudoirdautrefois.yumi-software.com (/etc/apache2/sites-enabled/auboudoirdautrefois.conf:23)
port 443 namevhost auboudoirdautrefois.yumi-software.com (/etc/apache2/sites-enabled/auboudoirdautrefois.conf:23)
port 443 namevhost auxdoubsoeurs.yumi-software.com (/etc/apache2/sites-enabled/auxdoubsoeurs.conf:23)
port 443 namevhost evalacheray.yumi-software.com (/etc/apache2/sites-enabled/evalacheray.conf:23)
port 443 namevhost formefficience.yumi-software.com (/etc/apache2/sites-enabled/formefficience.conf:23)
port 443 namevhost naceo.yumi-software.com (/etc/apache2/sites-enabled/naceo.conf:36)
port 443 namevhost nlpaysage.yumi-software.com (/etc/apache2/sites-enabled/nlpaysage.conf:23)
port 443 namevhost regalpanier.yumi-software.com (/etc/apache2/sites-enabled/regalpanier.conf:23)
port 443 namevhost www.yumi-software.com (/etc/apache2/sites-enabled/www.conf:23)
port 443 namevhost www.yumi-software.com (/etc/apache2/sites-enabled/www.yumi-software.com.conf:13)
port 443 namevhost yudev.yumi-software.com (/etc/apache2/sites-enabled/yudev.conf:23)
*:80 localhost.localdomain (/etc/apache2/sites-enabled/000-default.conf:1)
In the error message shown by the ACME client; Does it show that it failed to retrieve the challenge file from HTTP://YOUR.SITE/... or HTTPS://YOUR.SITE/... ?
Actually that error shows that the redirect did work - the link is for HTTPS.
What failed was the contents (404).
But that implies that all code to avoid the challenge path missed their target.
Create new order error. Le_OrderFinalize not found. {
"type": "urn:ietf:params:acme:error:rateLimited",
"detail": "Error creating new order :: too many certificates (5) already issued for this exact set of domains in the last 168 hours: nlpaysage.yumi-software.com: see https://letsencrypt.org/docs/rate-limits/",
"status": 429
}
We had too many errors before this, so now we can't issue the certificates. Is there any way to bypass the rate limit for failures ? It seems to be 5 per domain per hour, but it doesn't seem to reset.
We also have a folder in /etc/letsencrypt/live that was generated when we used certbot.
Maybe our website is still pointing to the old certbot certificates ?
@Yumi Now that we know where the latest cert files are: /root/.acme.sh/naceo.yumi-software.com/fullchain.cer /root/.acme.sh/naceo.yumi-software.com/naceo.yumi-software.com.key
The next step is to view/edit the website config that uses the cert.