Certbot manual works fine, but hosting provider says cert is invalid

I've been using certbot in manual mode for quite some time now with no problems. I use the following command line in a personal computer running Ubuntu:

sudo certbot certonly --manual

And then I'd go interactively from there, specifying the domain names, uploading the http challenges and so on. I used to include a lot of domains in a single cert, but yesterday I included only two (translite.com.br,www.translite.com.br)

I sent the cert files to the hosting provider as usual, but they say the cert is invalid.

I've already tried uninstalling/reinstalling certbot, to no avail. They still say the cert is invalid!

did you install your certificate?

What did you send? What (format, files) are they asking for?

4 Likes

Hi @Mordaz, and welcome to the LE community forum :slight_smile:

Please explain that step in more detail.

3 Likes

No, I do not install the certificate myself. I send the cert files to my hosting provider (Site5.com) and they do it.

I usually send all files under /etc/letsencrypt/live/translite.com.br :

cert.pem
chain.pem
fullchain.pem
privkey.pem
README

certbot asks me to create files and place them under /.well-known/acme-challenge/

I'm using the http challenge validation instead of dns

So, the way most shared hosting providers should work is by them automatically getting the certificate themselves every couple months, and you shouldn't need to do anything at all. So the process you're using, of doing authentication manually and sending them files, is the most complicated, difficult, and error-prone way that one can secure a site using Let's Encrypt. But not all hosting providers have figured that out yet, for some reason.

In any event, without more detail than "the cert is invalid", I don't think that there's much that people can do. In what way is it invalid? Does it use an ECDSA key and their system is so ancient and backwards that they only know how to handle RSA keys? Is it from an older run somehow and is actually an expired certificate? Do they just not know how to install this particular intermediate chain into their system? A lot of possibilities, and if they don't know what's wrong then we can only guess.

4 Likes

Then...
You are using the system that needs the cert to get the new cert.
What part does Site5 play in this?
I mean: All they really need to do is reload/restart the web server [for you, if you can't].
The new cert should be reached via the exact same path.
And there may be no need to do this manually [automated is the preferable method].

2 Likes

I'd place my bet on it being this one, since looking at the CT Logs, the prior certificates for translite.com.br were RSA, and your newer ones are ECDSA. So you may need to add --key-type RSA to your certbot command to get a certificate that they know how to deal with. But changing to a more competent hosting company might be easier.

5 Likes

It sounds like you have root access to that server.
What service(s) use the cert?
Who manages the service(s)?

2 Likes

@rg305 This user is running certbot on their personal computer, not on their web server.

2 Likes

How can they do HTTP-01 authentication?

2 Likes

By uploading the file to the server. That's what manual mode of certbot is kind of for.

2 Likes

huh?
My best guess is that they use system #1 via A record to obtain a cert [HTTP-01 auth].
Then send that cert to Site5 for some other purpose [like MX record use] on system #2.

Otherwise, they are on the same system and have root access to it.

In hindsight/review, none of that makes much sense either - it must be one system only.

2 Likes

Here are some other ideas of why it might be invalid. But, we really need more details from your hosting provider about the reason

  1. Maybe they need all the domain names in the same cert like you have been providing them in the past (see below).
  2. Maybe they check the cert against the public CT logs at crt.sh. Which is currently way behind and is not showing your recent cert. The info below comes from a different CT log system

4 Likes

I'll try that!

???
LOL

2 Likes

I'll try adding '--key-type RSA' first.

Changing to a better hosting company will have to wait. I still have a couple of years paid in advance...

1 Like

I can install Certbot on my system and try to get a certificate for one of your domains using the manual plugin. If I then tell you to put some challenges in the correct location, I'll get a certificate for your domain. That wouldn't be much different than installing Certbot on a totally unrelated computer (e.g. at home) and then put the challenge files on the correct server using e.g. a cPanel file management system or perhaps using FTP.

2 Likes

@Osiris, I suppose you are correct about that being possible.
But why do it that way? When they have enough rights to add and remove software.
Unless... that part happened outside the server - hmm...
Lots of pieces too vague/missing to this puzzle.

2 Likes

This person said in the very first post that certbot was running on a personal computer and then one of the steps was uploading the http challenge.

4 Likes