Hello!
We are experiencing problems issuing certificates on two Plesk servers. Same error. Many users with this error found that their IP addresses were blocked by LE. Is it possible to check ours?
My domain is: elgift.pp.ua
I ran this command: Plesk LetsEncrypt plugin
It produced this output:
POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/279255327316 failed: cURL error 35: OpenSSL SSL_connect: Connection was reset in connection to acme-v02.api.letsencrypt.org:443 (see libcurl - Error Codes) for https://acme-v02.api.letsencrypt.org/acme/authz-v3/279255327316
My web server is (include version): IIS 8.5.9600.16384 / IIS 10.0.20348.1.
The operating system my web server runs on is (include version): Windows Server 2012R2 / Windows Server 2022
I can login to a root shell on my machine (yes or no, or I don't know): Yes
I'm using a control panel to manage my site (no, or provide the name and version of the control panel): Plesk Obsidian 18.0.56 Update #3
IP: 188.42.151.19, 188.42.151.10
The output of openssl s_client -connect acme-v02.api.letsencrypt.org:443
:
Summary
CONNECTED(00000138)
depth=1 C = US, O = Let's Encrypt, CN = R3
verify error:num=20:unable to get local issuer certificate
verify return:1
depth=0 CN = acme-v02.api.letsencrypt.org
verify return:1
---
Certificate chain
0 s:CN = acme-v02.api.letsencrypt.org
i:C = US, O = Let's Encrypt, CN = R3
1 s:C = US, O = Let's Encrypt, CN = R3
i:C = US, O = Internet Security Research Group, CN = ISRG Root X1
---
Server certificate
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
subject=CN = acme-v02.api.letsencrypt.org
issuer=C = US, O = Let's Encrypt, CN = R3
---
No client certificate CA names sent
Peer signing digest: SHA256
Peer signature type: RSA-PSS
Server Temp Key: X25519, 253 bits
---
SSL handshake has read 3348 bytes and written 410 bytes
Verification error: unable to get local issuer certificate
---
New, TLSv1.3, Cipher is TLS_AES_256_GCM_SHA384
Server public key is 2048 bit
Secure Renegotiation IS NOT supported
Compression: NONE
Expansion: NONE
No ALPN negotiated
Early data was not sent
Verify return code: 20 (unable to get local issuer certificate)
---
---
Post-Handshake New Session Ticket arrived:
SSL-Session:
Protocol : TLSv1.3
Cipher : TLS_AES_256_GCM_SHA384
Session-ID: 5E1E1816F1374390180619D36FF65F053310FC26126F682E75D6ADBBBE828B59
Session-ID-ctx:
Resumption PSK: 3326A7204E387DCD3CE5F489DEEB7525140F67D905EDA3E3E0F66F7F8463B80663D9AC9ED4F8D26FFA041440F913564C
PSK identity: None
PSK identity hint: None
SRP username: None
TLS session ticket lifetime hint: 86400 (seconds)
TLS session ticket:
0000 - f5 e4 86 c4 85 5e 75 0b-06 ec 1d 85 32 44 fc fb .....^u.....2D..
0010 - 9b 0c 42 84 9c d5 11 7d-c0 33 c4 22 00 1d b6 ca ..B....}.3."....
Start Time: 1698913193
Timeout : 7200 (sec)
Verify return code: 20 (unable to get local issuer certificate)
Extended master secret: no
Max Early Data: 0
---
read R BLOCK
---
Post-Handshake New Session Ticket arrived:
SSL-Session:
Protocol : TLSv1.3
Cipher : TLS_AES_256_GCM_SHA384
Session-ID: 7F9C89F77A90AE3EC1664376881866F829AF1840BEDDA09ECDBF914E224C8C20
Session-ID-ctx:
Resumption PSK: 47EC11D0351B8E9475066927738167EFA2AA302842F6A32DF4AD0F8204627820FDAE5A29B9985E313526006C78A8451A
PSK identity: None
PSK identity hint: None
SRP username: None
TLS session ticket lifetime hint: 86400 (seconds)
TLS session ticket:
0000 - 19 75 a3 0a 93 75 e5 9f-3e b4 a7 71 2b 13 6f 6e .u...u..>..q+.on
0010 - 8c 97 dc a8 fb dc 20 f5-35 3d e4 80 6c ff f2 93 ...... .5=..l...
Start Time: 1698913193
Timeout : 7200 (sec)
Verify return code: 20 (unable to get local issuer certificate)
Extended master secret: no
Max Early Data: 0
---
read R BLOCK