Cn showing server name and not account name

Please fill out the fields below so we can help you better. Note: you must provide your domain name to get help. Domain names for issued certificates are all made public in Certificate Transparency logs (e.g. https://crt.sh/?q=example.com), so withholding your domain name here does not increase secrecy, but only makes it harder for us to provide help.

My domain is:vcstulsa.org

I ran this command:tried to reissue cert in DirectAdmin

It produced this output: Weekly Rate limit of 200 for 'vcstulsa.org' has been reached. The problem appears to be that it has been trying to renew the cert but the cn is shoing the hostname of the server and not the name for the account of the website.

My web server is (include version):Litespeed v-Enterpise 6.3

The operating system my web server runs on is (include version):Almalinux

My hosting provider, if applicable, is:KnownHost

I can login to a root shell on my machine (yes or no, or I don't know):yes

I'm using a control panel to manage my site (no, or provide the name and version of the control panel):yes, DirectAdmin

The version of my client is (e.g. output of certbot --version or certbot-auto --version if you're using Certbot):

Why do you care about this? What do you expect the cn to show, and why do you expect this?

7 Likes

I expect cn to show the domain name of the site, that is what all my working sites show.

In my logs it looks like it has the right domain. error is:

ftp.vcstulsa.org was skipped due to unreachable http://ftp.vcstulsa.org/.well-known/acme-challenge/letsencrypt_bb0c32c9ed2c752dc117ee32f5ca6dd1 file.
mail.vcstulsa.org was skipped due to unreachable http://mail.vcstulsa.org/.well-known/acme-challenge/letsencrypt_0e574dd85d7bec63475e07f3f31e29cb file.
pop.vcstulsa.org was skipped due to unreachable http://pop.vcstulsa.org/.well-known/acme-challenge/letsencrypt_7c6657d382225a25703151011a367e3e file.
smtp.vcstulsa.org was skipped due to unreachable http://smtp.vcstulsa.org/.well-known/acme-challenge/letsencrypt_a2ad3750a156ff0b77ba6f34d6171fea file.
webmail.vcstulsa.org was skipped due to unreachable http://webmail.vcstulsa.org/.well-known/acme-challenge/letsencrypt_609069637743ea881cc7a7abf26eef83 file.
2024/07/17 19:54:57 [INFO] [vcstulsa.org, www.vcstulsa.org] acme: Obtaining SAN certificate
2024/07/17 19:54:57 Could not obtain certificates:
acme: error: 429 :: POST :: https://acme-v02.api.letsencrypt.org/acme/new-order :: urn:ietf:params:acme:error:rateLimited :: Error creating new order :: too many certificates (5) already issued for this exact set of domains in the last 168 hours: vcstulsa.org,www.vcstulsa.org, retry after 2024-07-19T05:31:55Z: see https://letsencrypt.org/docs/duplicate-certificate-limit/
Failed to issue new certificate

I have tried to turn off mail. and webmail. and other but it just keeps saying that the 200 limit has been reached

Exactly--you've created five identical certs within the past week. Why don't you use one of them?

I don't know what configuration problem on your end is causing this, but it has nothing to do with the CN on your certificate. I don't know what "200 limit" you're referring to; the limit is five identical certs, and 50 certs/domain, per week--you've hit the first of those.

8 Likes

Welcome to the Let's Encrypt Community! :slightly_smiling_face:

Unfortunately, some technologies (inappropriately) use the (long-obsolete) CN field in a certificate for identification/verification purposes. Unless you're affected by this erroneous behavior, the CN should just be ignored. I believe there's a good chance that Let's Encrypt (and probably other CAs in the near future) will omit the CN field entirely from issued certificates.

5 Likes

:hushed:

That's a lot of certs...

https://crt.sh/?dNSName=vcstulsa.org&deduplicate=Y

5 Likes

Ok, For some reason my certificate does not work. The date seems to be valid but the cert is not so I figured it was the cn issue since all my other certs the cn is the same as the website domain and not the host servers hostname. Are you thinking that becuase I do not have a cname for ftp, pop, webmaile etc that it is failing to create the cert and that once the rate limit is lifted (which shows 5:31 tomorrrow morning) then I can make sure I only select the main domain and the cert should issue correctly?

The cert will "work" for all the subject alternative names (SANs) listed on the cert, which can be seen in the crt.sh link I provided in my last post.

5 Likes

What exactly isn't "working"? Let's start there.

5 Likes

The cert from 7/14 looks like it covers most/all of the domain names you need?

Your more recent certificates only cover one or two domain names.

5 Likes

Are you alright with using an ECDSA key pair (rather than an RSA key pair)? Right now you're using an ECDSA key pair, which could cause problems depending upon your context.

4 Likes

I personally dont care which key pair is used. I use DirectAdmin on my webserver. In the Admin SSL section it shows all the websites and their certs and the status. If I click on a working account it shows the cert and the cn=correctdomainname.com. On this account it doesn't. I seems that maybe it tried to renew a cert and is failing because it can't find those cnames and doesnt issue the cert, even for the valid cnames.
I just threw up a positive ssl cert because the client needed the site up so it is working now. However, before I did that if you went to the site and inspected the cert the common name would show the servers host name. So it appears that there was not a cert at all on that account, it kept trying to renew all the cnames and since several of them didnt work it didnt issue and then never got a valid cert for the cnames that were there.

now that I have installed a paid postivessl cert on the site if I go to DirectAdmin - AdminSSL - and click on the green info icon it does show the correct cn=vcstulsa.org where before it was showing cn=serverhostname

No cert issued by Let's Encrypt is going to have this. Again, no modern application cares what the cn field says (so whatever your problem is, it's very unlikely it's this), but this suggests it's some kind of default, self-signed cert, and that certainly could cause problems.

7 Likes

I concur with @danb35's conclusion. I think you had a default (likely self-signed/"snakeoil") certificate with the hostname as the CN. My previous observations still hold.

For any active host/domain name that needs to be secured by the platform, but doesn't have a valid certificate installed, a default/self-signed/snakeoil certificate will usually be generated and installed simply so that HTTPS will function rather than crashing. That means "insecurely function", not "securely function". You were observing a symptom of the actual problem in this scenario.

5 Likes

Ok, that makes sense. When this cert is about to expire I will go in and make sure it is set to only generate a certificate for valid cnames and see if that does the trick. I think you guys are right and I think that if it finds invalid cnames it doesnt end up issuing any of them. I may set up a sample domain and test that theory. It must be right because it tried to get a cert over 200 times and still the cert area showed empty so it obviously was not getting anything. Also, if I set it to a wildcard cert it would probably work as well.

1 Like

@tagteamcomputing

Has the above been addressed already? Why is there a brand new duplicate cert almost daily? For a very long time already?

1 Like

I am not sure. This was a site i moved from a cpanel server to DirectAdmin server so I think what must have happened was the cert was fine for a while until the cpanel one expired and then when it tried to renew it tried to do all those cnames, which I don't have and didn't specify, and so it failed and kept trying and I didn't get the notification because for some reason the email didnt send and I am not a bit time providor so I only check on the server if there is a problem. Have to do my day job, that is kind of a side job

This topic was automatically closed 30 days after the last reply. New replies are no longer allowed.