Confused about how to create auto renew for ssl cetificate

Please fill out the fields below so we can help you better. Note: you must provide your domain name to get help. Domain names for issued certificates are all made public in Certificate Transparency logs (e.g. crt.sh | example.com), so withholding your domain name here does not increase secrecy, but only makes it harder for us to provide help.

My domain is: rogerwoolger.org

I ran this command: na

It produced this output: na

My web server is (include version): I don't understand how to find this

The operating system my web server runs on is (include version):

My hosting provider, if applicable, is: tsohost.com

I can login to a root shell on my machine (yes or no, or I don't know): I dont know

I'm using a control panel to manage my site (no, or provide the name and version of the control panel): yes cpanel, where do I find the name ?

The version of my client is (e.g. output of certbot --version or certbot-auto --version if you're using Certbot): I am sorry I do not understand techy language. I can follow step by step instructions. I did some months ago install ssl certif then I had to move my account to a different package in tsohost and now I do not know how to install automatic renewal ssl certif.

I have gone to certsage to get new ssl certif and it states - urn:ietf:params:acme:error:unauthorized
199.59.243.200: Invalid response from http://rogerwoolger.com/.well-known/acme-challenge/i4og19dP3Sqr2Yer_kBQk-qQwIsj7phfrDrzWsY2CrA:
anyhelp with what I do now ?

1 Like

There is no autorenew for you. If you like shared hosting, you should look for a company that gets a certificate automagically for you. There are several.

Right now, I think your best bet would be enrolling in cloudflare, enabling their cdn, and install one of their origin certificates on your server.

1 Like

can you help with this -

Firestar

1

1h

Please fill out the fields below so we can help you better. Note: you must provide your domain name to get help. Domain names for issued certificates are all made public in Certificate Transparency logs (e.g. crt.sh | example.com), so withholding your domain name here does not increase secrecy, but only makes it harder for us to provide help.

My domain is: rogerwoolger.org

I ran this command: na

It produced this output: na

My web server is (include version): I don't understand how to find this

The operating system my web server runs on is (include version):

My hosting provider, if applicable, is: tsohost.com

I can login to a root shell on my machine (yes or no, or I don't know): I dont know

I'm using a control panel to manage my site (no, or provide the name and version of the control panel): yes cpanel, where do I find the name ?

The version of my client is (e.g. output of certbot --version or certbot-auto --version if you're using Certbot): I am sorry I do not understand techy language. I can follow step by step instructions. I did some months ago install ssl certif then I had to move my account to a different package in tsohost and now I do not know how to install automatic renewal ssl certif.

I have gone to certsage to get new ssl certif and it states - urn:ietf:params:acme:error:unauthorized
199.59.243.200: Invalid response from http://rogerwoolger.com/.well-known/acme-challenge/i4og19dP3Sqr2Yer_kBQk-qQwIsj7phfrDrzWsY2CrA:

1 Like

Hi again :slightly_smiling_face:

I'm noticing both a .org and a .com here. Are you entering .com into CertSage when you should be entering .org?

2 Likes

Cloudflare terminates TLS/SSL and thus decrypts all of its clients' traffic, thus acting as a man-in-the-middle. Some people (myself included) don't want to be in bed with Cloudflare in this way.

2 Likes

Neither do I, but they provide a valuable service.

I can like them or not but I still trust them more than a random shared hosting provider, if somebody has to have my keys.

2 Likes

The hosting provider still needs to have the private key for the backend server in order for SSL to work. In the case of Cloudflare Origin CA certificates, BOTH Cloudflare AND the hosting provider have the private key for the backend server, not that it much matters since Cloudflare already has decrypted copies of all traffic anyhow. TSOHost is owned by GoDaddy, one of the largest hosting providers on Earth.

2 Likes

I wouldn't trust GoDaddy either, but at the end it's a matter of threat model: TLS is usually meant to protect your users, not you. It doesn't matter if cloudflare or GoDaddy have your keys, it's in-transit interception you usually want to avoid.

2 Likes

Fair enough. I've been a GoDaddy user for decades and have never heard of them having a breach, but to each their own. :wink:

3 Likes

I don't know them from a technical standpoint. But their marketing and business practices just irk me too much.

2 Likes

You're not alone in your feelings there. :upside_down_face:

2 Likes

Hi yes you are right I have redone the certsage and this is ok. Now how do I renew then as the file certsage.php is already in the website ? thanks.

2 Likes

The "renewal process" is simply acquiring a new certificate and installing it into cPanel in the exact same way you originally did. You're just replacing the expiring certificate and its private key with the new certificate and its private key. If you already have certsage.php installed, great! You don't need to install it again. Just use it! :slightly_smiling_face:

CertSage should overwrite any existing certificate and its private key in the CertSage folder with the new certificate and its private key. Once that's done, you just need to install those into cPanel.

3 Likes

Right now it looks like a default, self-signed (snake oil) certificate is installed for rogerwoolger.org.

2 Likes

Hi not sure what that means, but does not sound good. I find it hard to know where actually to go as all the websites are under one primary domain. Under the cpanel which is for a primary domain, I am not sure why the certif are being listed in the primary file and not the domain rogerwoolger.org ?
image

1 Like

It looks like you got a new cert for the .org site several hours ago. Are you still having trouble accessing that site securely?

Note to other volunteers: The site is sending the "short chain" (R3) so possibly that hosting service has that as default.

I see your .com site is using an ECDSA cert chain (E1) and expires in less than 3 weeks. It is unusual to have that kind of cert from a hosting service. You should work with them to ensure that cert is updated too.

3 Likes

Hi I have managed to cert the rogerwoolger.org site but I am having issues with my other website regresyondmp.com Ihave successfully got the certif CertSage but when I go to the cpanel nothing is there except for the old certif I uploaded in jan this year. any ideas of where/ and what to do ? is it because of too many folders called cert

1 Like

FYI to all:
.com and .org are being hosted at two separate IPs:
[we can ignore that .com within this thread]

Name:    rogerwoolger.org
Address: 92.205.8.227

Name:    rogerwoolger.com
Address: 199.59.243.200
3 Likes

Maybe the latest cert is in the CertSage folder right under public_html? (just a guess)

3 Likes

If you go to the file manager in cPanel and edit the certsage.php file located in the webroot folder of whichever domain is of interest, you will find a dataDirectory variable at the top inside the certsage.php file that will indicate where the relevant CertSage folder is located relative to that webroot folder. By default, the CertSage folder is located in the parent folder of the webroot folder where certsage.php is located.

4 Likes