I requested a new certificate for a domain, and it did not come down signed as ISRG Root X1. I discovered the -preferred-chain after I first requested this. This cert shows up in browsers as not trusted.
I have tried pulling a new cert with --issue --force with --preferred-chain "ISRG Root X1", but it still does not come back signed ISRG Root X1.
When looking at the cert that does not work in the browser certificate viewer, I just see my domain name in the hierarchy in the cert that doesn't work. Other Let's Encrypt certs that work have ISRG Root X1 -> Let's Encrypt -> domain name in the hierarchy. It's like the cert was not signed with the CA. Am I reading that right?
This non-working cert shows the issuer as: CN = R11 / O = Let's Encrypt / C = US
Another cert that I have that works on a different device shows: CN = ISRG Root X1 / O = Internet Security Research Group / C = US
No, your certificate is fine (R10 and R11 are valid issuers and they chain to ISRG Root X1) but you may not be serving the correct chain, we can't tell without knowing your domain to check.
You mentioned a browser but don't tell us which one, different ones do different things, you also didn't tell us which web server you are using. I'm sensing that your site might be a secret?
Try not to use --force because that renews certs that don't yet need to be renewed.
I don't see anything listening on port 443 with HTTPS from the public Internet. So I am not sure what you mean by Apache was working there.
I do see that you've got three RSA certificates Signed by either R10 or R11 which is expected. Those intermediates in turn are signed by X1. This is normal.
On your private network can you show the output of this
openssl s_client -connect (domain):(port)
Use the appropriate domain you use on your private network or its local IP address. And the port you typically use. I assume 443
That is pretty normal apart from the failure to validate
But, it looks like your system does not have the ISRG Root X1 cert in its CA root store.
What kind of system did you issue that command on? Please give the operating system and version. Also any unusual items that might apply (custom builds and so on).
They may have used my earlier suggested format. We need to know more about their system.
If they didn't send out the intermediate then how did openssl find it? Do you think they added it manually to their CA store?
Between this fullchain and the openssl chain display I think the most likely reason for failure is a very out of date CA Store. Or even a damaged store.
I really appreciate everyone's help so far on this. As I mentioned earlier in my thread, the server that I am working with is not the server that is exposed to the Internet.
I am working on the advice that was given to check my CA store. I am working on that now.