Please fill out the fields below so we can help you better. Note: you must provide your domain name to get help. Domain names for issued certificates are all made public in Certificate Transparency logs (e.g. https://crt.sh/?q=example.com), so withholding your domain name here does not increase secrecy, but only makes it harder for us to provide help.

My domain is:

I ran this command:
sudo certbot --apache

It produced this output:
Saving debug log to /var/log/letsencrypt/letsencrypt.log
Plugins selected: Authenticator apache, Installer apache
Obtaining a new certificate
Performing the following challenges:
http-01 challenge for nepheli.ydns.eu
Waiting for verification…
Cleaning up challenges
Failed authorization procedure. nepheli.ydns.eu (http-01): urn:ietf:params:acme:error:dns :: DNS problem: SERVFAIL looking up CAA for nepheli.ydns.eu - the domain’s nameservers may be malfunctioning


  • The following errors were reported by the server:

    Domain: nepheli.ydns.eu
    Type: None
    Detail: DNS problem: SERVFAIL looking up CAA for nepheli.ydns.eu -
    the domain’s nameservers may be malfunctioning

My web server is (include version): Apache/2.4.38

The operating system my web server runs on is (include version): Raspbian 10 (Buster)
My hosting provider, if applicable, is:

I can login to a root shell on my machine (yes or no, or I don’t know): yes

I’m using a control panel to manage my site (no, or provide the name and version of the control panel):no

The version of my client is (e.g. output of certbot --version or certbot-auto --version if you’re using Certbot): certbot 0.31.0

Hi @Krasax

that looks interesting. Unboundtest reports a Servfail - https://unboundtest.com/m/CAA/nepheli.ydns.eu/KMDBT7JV

but the reason is unclear, there are some bogus results:

Jun 15 20:00:21 unbound[1025:0] info: validated DNSKEY ydns.eu. DNSKEY IN
Jun 15 20:00:21 unbound[1025:0] info: validate(nodata): sec_status_bogus

My tool doesn’t see an error - https://check-your-website.server-daten.de/?q=nepheli.ydns.eu in the ydns.eu zone:

Status: Valid Chain of trust. Parent-DS with Algorithm 13, KeyTag 42554, DigestType 2 and Digest “lc9T1RFKJ7XnmfX2lWE76vZQ33Bq+VcdwK3MX5luq0w=” validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone

but the zone is the same, so that zone is signed.

The Versign dnssec check is happy - https://dnssec-analyzer.verisignlabs.com/nepheli.ydns.eu - all is green.

DNSViz https://dnsviz.net/d/nepheli.ydns.eu/dnssec/ has one thing, may be the problem - the DNSKEY of the ydns.eu zone has only 512 bit, may be too short.

Checking directly the main domain - https://check-your-website.server-daten.de/?q=ydns.eu - the CAA is signed.

RRSIG Type 257, expiration 2020-06-25 00:00:00 validates the CAA - Result: 5|issueletsencrypt.org

Yep, it’s always the same:

Jun 15 20:00:23 unbound[1025:0] info: query response was ANSWER
Jun 15 20:00:23 unbound[1025:0] info: validated DNSKEY ydns.eu. DNSKEY IN
Jun 15 20:00:23 unbound[1025:0] info: validate(nodata): sec_status_bogus

Looks like the DNSKEY is too small.

PS: No, that’s wrong. That’s an Algorithm 13, so it’s a EC key, P-256 is used, so it’s a 256 bit public key.

1 Like

That looks wrong:

First rechecked with my own Unbound-instance:

[1592253126] libunbound[24588:0] info: validate(nodata): sec_status_bogus
nepheli.ydns.eu. has no CAA record (BOGUS (security failure))
validation failure <nepheli.ydns.eu. CAA IN>: nodata proof failed from 2a00:1328:e000:504::1:104 and

The first validated RRSIG says: The domain name nepheli.ydns.eu exists and has that A-record.

But if that domain name exists and if no CAA RR exists, there is a NoData proof required (not a NXDomain proof).

But the NSEC

RRSIG Type 47, expiration 2020-06-25 00:00:00 validates the NSEC RR that proves the not-existence of the CAA RR. Owner neoxnet.ydns.eu, NextOwner: nerd.ydns.eu.

isn’t a NoData proof, it’s a NXDomain proof.

NoData -> the owner of the NSEC must be nepheli.ydns.eu.

neoxnet.ydns.eu < nepheli.ydns.eu < nerd.ydns.eu

–>> nepheli.ydns.eu doesn’t exist.

So the zone NSEC3 list may be incomplete.

PS: Yep, rechecked manual.

get-DNS:nepheli.ydns.eu CAA+ ns1.ydns.io|6|2a00:1328:e000:504::1:104

sends a NoData-answer (NoError) and a NSEC that proves NXDomain.

1 Like

Thank you very much for your time and the long reply.
I have to say, I understood only a part of what you were saying.
So if I get you right, it tries to confirm that nepheli.ydns.eu is the owner of the domain nepheli.ydns.eu. However, in the list it looks up (is this the zone NSEC3 list?) there’s neoxnet.ydns.eu and nerd.ydns.eu with nepheli.ydns.eu missing (which I guess should be in-between them).
Is this a problem of the configuration of my server? Or of the DNS-provider?
What can I do to solve that problem?

DNSSEC has a concept of “not existing proofs”. That’s complex. Check

Authenticated Denial of Existence in the DNS


It’s not your server, it’s your dns provider. The dns software of the ydns.eu - zone needs an update.

I’ve updated my tool - https://check-your-website.server-daten.de/?q=nepheli.ydns.eu


But it looks like a subdomain service, so the owners of ydns.eu have to update their software.

If not, you can’t create a certificate. If there is a CAA record, only the listed CAs are allowed to create certificates. If there is no CAA record, every CA can create a certificate.

But in combination with DNSSEC that requires a correct authenticated denial of the existence of the CAA record. The RRs sent from the dns software aren’t correct.

PS: Ask there and send them a link to this topic.

1 Like

Since the problem was at the DNS provider, I figured the quickest solution is to change them. Now everything works properly.

Thanks again for your help!

1 Like

Yep. Some of these DNSSEC things are very old. If a dns provider doesn’t support these, that’s bad.

PS: Same with dns providers with missing or wrong CAA support.

1 Like