An unexpected error occurred: requests.exceptions.SSLError: HTTPSConnectionPool(host='acme-v02.api.letsencrypt.org', port=443): Max retries exceeded with url: /directory (Caused by SSLError(SSLError(1, '[SSL: CERTIFICATE_VERIFY_FAILED] certificate verify failed (_ssl.c:897)'),))
web server: Apache/2.4.37 (rocky)
operating system: Rocky Linux 8
hosting provider: DigitalOcean
root shell on my machine: Yes
using a control panel: No
certbot 1.22.0
Other notes: Certbot was working fine when the domain name was "meza-dev.io" (which I still own) but ever since I changed the domain name to "meza.wiki" I can not get certbot to make a cert.
Someone in a similar thread said it could be a TLS certificate error on the system itself and to run "openssl s_client -connect server:port" which resulted in:
"140610276710208:error:2008F002:BIO routines:BIO_lookup_ex:system lib:crypto/bio/b_addr.c:730:Servname not supported for ai_socktype connect:errno=0"
Not sure if this is relevant, I'm mostly an applications guy and am just starting to learn the server config and admin side of things. The server seems to work well in every other regard.
It's actually the same server. I just changed the hostname on the digitalocean droplet to "meza.wiki" and pointed the new domain to it. I don't think I have any control over the IP address DigitalOcean assigns me.
Interesting! .. It's actually the same server. I just changed the hostname on the digitalocean droplet to "meza.wiki" and pointed the new domain to it. I don't think I have any control over the IP address DigitalOcean assigns me. Are you thinking there is a clear diagnosis and an easy solution to my issue?
traceroute to acme-v02.api.letsencrypt.org (172.65.32.248), 30 hops max, 60 byte packets
1 * * *
2 10.74.194.214 (10.74.194.214) 1.221 ms 1.215 ms 1.211 ms
3 138.197.251.8 (138.197.251.8) 1.182 ms 138.197.251.0 (138.197.251.0) 1.418 ms 138.197.251.10 (138.197.251.10) 1.184 ms
4 138.197.248.16 (138.197.248.16) 13.472 ms 138.197.248.58 (138.197.248.58) 1.118 ms 1.067 ms
5 138.197.244.36 (138.197.244.36) 1.361 ms 138.197.244.32 (138.197.244.32) 1.247 ms 138.197.244.36 (138.197.244.36) 1.343 ms
6 192.241.164.73 (192.241.164.73) 1.878 ms 1.932 ms 1.610 ms
7 172.70.228.4 (172.70.228.4) 2.257 ms 162.158.156.5 (162.158.156.5) 1.520 ms 1.506 ms
8 172.65.32.248 (172.65.32.248) 1.511 ms 1.353 ms 1.246 ms
@rg305, I can't install snapd. It would violate the system's security plan... Continued thanks for your assistance, insights and help.
@Osiris, I've got OpenSSL 1.1.1k FIPS 25 Mar 2021. It is what the system considers up to date. Is that old to you?
I have to believe that, since certbot work when the exact same system simply had a different name, and that everything else seems fine, it must be some minor issue in the configuration (not the version) of some component - such as the certbot account and or user cache of something?
Something looks really wrong here. Can you show the certificates you omitted? Those are not secret. Anybody can see them by issuing the same command. But, I am wondering if the real ones are being substituted with something else.
What is odd is the chain only has 2 certs which is what we expect. But, the depth level 2 is showing the ISRG Root X1 cross-sign with DST Root CA X3.
There shouldn't be any reason for your system to show that. At least, I can't think of one. I tried with an older openssl than yours and one more current and neither shows it like yours.
I don't understand this either. I know that browsers can build their own chain from either cached intermediates from other sites or use the Authority Information Access extension from the send intermediate. But as far as I know, OpenSSL does not do this.
So I'm also puzzled where the DST Root X3 signed by ISRG Root X1 intermediate cert suddenly comes from.. It was not in the chain send by the ACME API.
Anyway, I do think we can conclude that OPs server doesn't contain the ISRG Root X1 root certificate, right?