Please fill out the fields below so we can help you better. Note: you must provide your domain name to get help. Domain names for issued certificates are all made public in Certificate Transparency logs (e.g. crt.sh | example.com), so withholding your domain name here does not increase secrecy, but only makes it harder for us to provide help.
My domain is: www.democracystraightup.org
I ran this command: certonly --reinstall --webroot --webroot-path=/var/www/certbot --email --staging democracy.straight.up@gmail.com --agree-tos --no-eff-email -d www.democracystraightup.org
It produced this output: Certificate is generated
My web server is (include version): nginx
The operating system my web server runs on is (include version): ubuntu
My hosting provider, if applicable, is: AWS
I can login to a root shell on my machine (yes or no, or I don't know): yes
I'm using a control panel to manage my site (no, or provide the name and version of the control panel):
The version of my client is (e.g. output of certbot --version
or certbot-auto --version
if you're using Certbot):
In browser while loading i'm getting following error
Your connection is not private
Attackers might be trying to steal your information from democracystraightup.org (for example, passwords, messages, or credit cards). Learn more
NET::ERR_CERT_AUTHORITY_INVALID
when i check with advance tab
www.democracystraightup.org
Issued by: (STAGING) Artificial Apricot R3
Expires: Sunday, February 12, 2023 at 11:53:04 AM Eastern Standard Time
“(STAGING) Pretend Pear X1” certificate is not trusted