Please fill out the fields below so we can help you better. Note: you must provide your domain name to get help. Domain names for issued certificates are all made public in Certificate Transparency logs (e.g. crt.sh | example.com), so withholding your domain name here does not increase secrecy, but only makes it harder for us to provide help.
My domain is:
californiaregionalcollaborative.org
I ran this command: certbot renew
It produced this output:
Saving debug log to /var/log/letsencrypt/letsencrypt.log
Processing /etc/letsencrypt/renewal/californiaregionalcollaborative.org.conf
Simulating renewal of an existing certificate for californiaregionalcollaborative.org
Certbot failed to authenticate some domains (authenticator: standalone). The Certificate Authority reported these problems:
Domain: californiaregionalcollaborative.org
Type: connection
Detail: 164.67.110.64: Fetching http://lsc-acme-cntrl.lsnet.ucla.edu/.well-known/acme-challenge/: Error getting validation data
Hint: The Certificate Authority failed to download the challenge files from the temporary standalone webserver started by Certbot on port 80. Ensure that the listed domains point to this machine and that it can accept inbound connections from the internet.
My web server is (include version):
apache 2.4
The operating system my web server runs on is (include version):
RHEL 8.6
My hosting provider, if applicable, is:
ON PREMISES
I can login to a root shell on my machine (yes or no, or I don't know):
YES
I'm using a control panel to manage my site (no, or provide the name and version of the control panel):
NO
The version of my client is (e.g. output of certbot --version
or certbot-auto --version
if you're using Certbot):
1.30.0
I moved my certbot client from the web server where I created and deployed the SSL certificate to a different vm with no apache installed only certbot . From this vm I can run the command : certbot certificates and I get the correct result :
Found the following certs:
Certificate Name: californiaregionalcollaborative.org
Serial Number: 43f072e829eb58bb0ae77a390256504be2a
Key Type: RSA
Domains: californiaregionalcollaborative.org
Expiry Date: 2022-11-06 20:06:37+00:00 (VALID: 24 days)
Certificate Path: /etc/letsencrypt/live/californiaregionalcollaborative.org/fullchain.pem
Private Key Path: /etc/letsencrypt/live/californiaregionalcollaborative.org/privkey.pem
This VM where I run certbot renew is not the same for the DNS for californiaregionalcollaborative.org and this is why I'm getting the error mentioned before.
My question is : Can I run certbot client from a vm that does not have the DNS authority for the SSL certificate I'm trying to renew and is not a web server?
Googling around I found the article Automate cert renewal from different server which is similar to what I want to run my certbot client except that this vm does not have any web server do the redirect 301 doesn't make it sense to me.
What I want is a central certbot client server where I can perform renewal and deploy these certs to my web farm with an ansible script I already have in place. I'm already doing this using the sectigo ACME automation and I thought that the same concept would apply to this situation.
Thank you for all the help you can provide.
Marcello