My domain is:
mx.rg47c.dk
I ran this command:
certbot-auto --nginx renew
It produced this output:
I cannot get it right now, as I have had too many failed authorizations recently in order to try to fix it
For another domain on the same reverse proxy, I get:
Failed authorization procedure. owncloud.rg47c.dk (http-01): urn:ietf:params:acme:error:unauthorized :: The client lacks sufficient authorization :: Invalid response from http://owncloud.rg47c.dk/.well-known/acme-challenge/IpDp_BMW1fYFHqYeU97T5VJ3-6d7CuL49_IetJkO5AQ: “\r\n404 Not Found\r\n<body bgcolor=“white”>\r\n
404 Not Found
\r\n”
My web server is (include version):
nginx 1.10.2
The operating system my web server runs on is (include version):
CentOS Linux release 7.3.1611
My hosting provider, if applicable, is:
I can login to a root shell on my machine (yes or no, or I don’t know):
Yes
I’m using a control panel to manage my site (no, or provide the name and version of the control panel):
No
I use nginx as a reverse proxy in order to host multiple SSL sites on a single public IP.
So the config for my website looks like:
server {
listen 80;
server_name mx.rg47c.dk;
return 301 https://$server_name$request_uri;
}
server {
listen 443 ssl http2;
server_name mx.rg47c.dk;
ssl_certificate /etc/letsencrypt/live/mx.rg47c.dk/fullchain.pem;
ssl_certificate_key /etc/letsencrypt/live/mx.rg47c.dk/privkey.pem;
ssl_session_timeout 1d;
ssl_session_cache shared:SSL:50m;
ssl_session_tickets off;
ssl_protocols TLSv1.1 TLSv1.2;
ssl_ciphers 'ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-DSS-AES128-GCM-SHA256:kEDH+AESGCM:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA:ECDHE-ECDSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-DSS-AES128-SHA256:DHE-RSA-AES256-SHA256:DHE-DSS-AES256-SHA:DHE-RSA-AES256-SHA:!aNULL:!eNULL:!EXPORT:!DES:!RC4:!3DES:!MD5:!PSK';
ssl_prefer_server_ciphers on;
ssl_dhparam /etc/letsencrypt/dhparam.pem;
add_header Strict-Transport-Security max-age=15768000;
ssl_stapling on;
ssl_stapling_verify on;
ssl_trusted_certificate /etc/letsencrypt/live/mx.rg47c.dk/chain.pem;
root /var/www/example.com/html;
index index.php;
access_log /var/log/nginx/mx.rg47c.dk.log;
location / {
proxy_pass https://192.168.xxx.yy:443/;
proxy_set_header Proxy "";
proxy_set_header Accept-Encoding "";
proxy_set_header Host $host;
proxy_set_header X-Real-IP $remote_addr;
proxy_set_header X-Forwarded-Proto $scheme;
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
add_header Front-End-Https on;
add_header Strict-Transport-Security "max-age=63072000; includeSubdomains; preload";
client_max_body_size 1024M;
proxy_read_timeout 600s;
proxy_send_timeout 600s;
proxy_connect_timeout 600s;
}
}
The problem is, that certificate renewal has been working for over an year - but now it suddenly doesn’t work anymore.
Is there a way, where I can enable the " /.well-known/acme-challenge/" location to be on the local server, so that it isn’t redirected to the other internal server - so I can get things up and running again ?