IMPORTANT NOTES:
- Congratulations! Your certificate and chain have been saved at
/etc/certbot/live/core.codekraft.it/fullchain.pem. Your cert will
expire on 2017-09-20. To obtain a new or tweaked version of this
certificate in the future, simply run certbot again. To
non-interactively renew *all* of your certificates, run "certbot
renew"
- If you like Certbot, please consider supporting our work by:
Donating to ISRG / Let's Encrypt: https://letsencrypt.org/donate
Donating to EFF: https://eff.org/donate-le
My web server is (include version):
Server version: Apache/2.4.25 (Linux/SUSE)
Server built: 2017-06-02 07:45:40.000000000 +0000
The operating system my web server runs on is (include version):
I just checked and I changed the comments from this:
# The staging/testing server
server = https://acme-staging.api.letsencrypt.org/directory
# The production server.
# server = https://acme-v01.api.letsencrypt.org/directory
to this:
# The staging/testing server
# server = https://acme-staging.api.letsencrypt.org/directory
# The production server.
server = https://acme-v01.api.letsencrypt.org/directory
andā¦YESSS MANN!
You saved me, I was beginning to feel really frustrated
I have the same issue. In my case, I do not have a cli.ini file under /etc/letsencrypt/. I tried creating one and inserting the server = line but I still get certificates from the staging server.
This is happening on an Ubuntu 14.04 LTS server where LetsEncrypt was previously installed by source. I just completely deleted everything related to LetsEncrypt and started using Certbotās new PPA.
The command Iām running: certbot certonly --webroot --webroot-path /var/www/ehc_simplesamlphp/www
Initially I tried with the following when testing to avoid hitting the limit: certbot --staging certonly --webroot --webroot-path /var/www/ehc_simplesamlphp/www
If you have an existing certificate from the staging server, this might somehow be trying to renew that with an equivalent certificate. Could you show me the output of certbot certificates or cat /etc/letsencrypt/renewal/*? Did you say that you actually edited a file in the latter directory?
Saving debug log to /var/log/letsencrypt/letsencrypt.log
-------------------------------------------------------------------------------
Found the following certs:
Certificate Name: account.domain.edu.zm
Domains: account.domain.edu.zm
Expiry Date: 2017-09-21 19:32:00+00:00 (VALID: 89 days)
Certificate Path: /etc/letsencrypt/live/account.domain.edu.zm/fullchain.pem
Private Key Path: /etc/letsencrypt/live/account.domain.edu.zm/privkey.pem
-------------------------------------------------------------------------------
cat /etc/letsencrypt/renewal/
root@ip-172-31-34-128:~# cat /etc/letsencrypt/renewal/*
# renew_before_expiry = 30 days
version = 0.14.2
archive_dir = /etc/letsencrypt/archive/account.domain.edu.zm
cert = /etc/letsencrypt/live/account.domain.edu.zm/cert.pem
privkey = /etc/letsencrypt/live/account.domain.edu.zm/privkey.pem
chain = /etc/letsencrypt/live/account.domain.edu.zm/chain.pem
fullchain = /etc/letsencrypt/live/account.domain.edu.zm/fullchain.pem
# Options used in the renewal process
[renewalparams]
authenticator = webroot
installer = None
account = 57fc6e2f18f77e1bc94f3909d697c19a
webroot_path = /var/www/ehc_simplesamlphp/www,
server = https://acme-v01.api.letsencrypt.org/directory
[[webroot_map]]
account.domain.edu.zm = /var/www/ehc_simplesamlphp/www
root@ip-172-31-34-128:~#
I should also note that prior to my last attempt, I executed cp -r /etc/letsencrypt /opt && rm -rf /etc/letsencrypt/* to ensure no existing configuration scripts were used.
Edit: since youāve told me your domain name I see that there are valid certificates issued for it as recently as today, so I think thereās something else strange going on. You are succeeding in getting valid Letās Encrypt certificates issued, but your web server is somehow not configured to use them and is continuing to use the test certificate instead.
Is it possible that you have another server? If not, could you take a look in your configuration files to see where they tell your web server what certificate to use?
Thank you @Schoen for your help. The issue has been resolved.
I checked my web server (Apache) configuration. I had the following referencing the LetsEncrypt certificates:
SSLCertificateFile /etc/letsencrypt/live/account.domain.edu.zm/cert.pem
SSLCertificateKeyFile /etc/letsencrypt/live/account.domain.edu.zm/privkey.pem
Include /etc/letsencrypt/options-ssl-apache.conf
SSLCertificateChainFile /etc/letsencrypt/live/account.domain.edu.zm/chain.pem
ls -l showed the files above are symbolic links to cert2.pem, chain2.pem, fullchain2.pem and privkey2.pem in the archive directory. Odd, so I checked the archive directory and found the following:
All files were issued today, the files with the number ā2ā. were issued about 20 minutes after the files with ā1ā. I took another backup of the /etc/letsencrypt directory and deleted all the symbolic links under the /etc/letsencrypt/live/account.domain.edu.zm directory and created new symbolic links referencing the files with 1, restarted apache and the HTTPS version of the site loads without errors, SSLLabs also shows that the certificate is now trusted.
Thank you lots for the assistance. I read about you and youāve done some very important work for the EFF and Internet security/privacy as a whole. Iām shocked you had the time to respond to a noob like
Iāll definitely stick around to help from time to time.
Iām glad you could solve the problem! That seems to show that thereās a way that test certs can replace real certs even without using --break-my-certs, which shouldnāt really be possibleā¦