My domain is: www.lavishsoft.com (I do not own it, I am trying to access it)
I ran this command: certutil -f -urlfetch -verify "path_to_downloaded_certificate.crt"
It produced this output:
Issuer:
CN=R13
O=Let's Encrypt
C=US
Name Hash(sha1): 729bed1a6c02bea399c7a24c45e3dea05345d87e
Name Hash(md5): 654279274e987144c4fc0b5fc11d283f
Subject:
CN=www.lavishsoft.com
Name Hash(sha1): e73a3c30d3840d19e1963ef0e0fa19bfb4fb6664
Name Hash(md5): 0c3a2526da58efa29dc5ccdbb883f180
Cert Serial Number: 0548f4bf932e6ae710d28509b48d7f716ad0
dwFlags = CA_VERIFY_FLAGS_ALLOW_UNTRUSTED_ROOT (0x1)
dwFlags = CA_VERIFY_FLAGS_IGNORE_OFFLINE (0x2)
dwFlags = CA_VERIFY_FLAGS_FULL_CHAIN_REVOCATION (0x8)
dwFlags = CA_VERIFY_FLAGS_CONSOLE_TRACE (0x20000000)
dwFlags = CA_VERIFY_FLAGS_DUMP_CHAIN (0x40000000)
ChainFlags = CERT_CHAIN_REVOCATION_CHECK_CHAIN (0x20000000)
HCCE_LOCAL_MACHINE
CERT_CHAIN_POLICY_BASE
-------- CERT_CHAIN_CONTEXT --------
ChainContext.dwInfoStatus = CERT_TRUST_HAS_PREFERRED_ISSUER (0x100)
SimpleChain.dwInfoStatus = CERT_TRUST_HAS_PREFERRED_ISSUER (0x100)
CertContext[0][0]: dwInfoStatus=102 dwErrorStatus=0
Issuer: CN=R13, O=Let's Encrypt, C=US
NotBefore: 11/19/2025 7:53 AM
NotAfter: 2/17/2026 7:53 AM
Subject: CN=www.lavishsoft.com
Serial: 0548f4bf932e6ae710d28509b48d7f716ad0
SubjectAltName: DNS Name=www.lavishsoft.com
Cert: f6b54ff7a412f73e78fa186fe91fbe82637164ea
Element.dwInfoStatus = CERT_TRUST_HAS_KEY_MATCH_ISSUER (0x2)
Element.dwInfoStatus = CERT_TRUST_HAS_PREFERRED_ISSUER (0x100)
---------------- Certificate AIA ----------------
Verified "Certificate (0)" Time: 0 22ff89586561fc2d52f77491e9f1eff1b80be33e
[0.0] http://r13.i.lencr.org/
---------------- Certificate CDP ----------------
Failed "CDP" Time: 0 (null)
Error retrieving URL: The connection with the server was terminated abnormally 0x80072efe (WinHttp: 12030 ERROR_WINHTTP_CONNECTION_ERROR)
http://r13.c.lencr.org/81.crl
---------------- Base CRL CDP ----------------
No URLs "None" Time: 0 (null)
---------------- Certificate OCSP ----------------
No URLs "None" Time: 0 (null)
--------------------------------
CRL 187ed82fb3ea3ded:
Issuer: CN=R13, O=Let's Encrypt, C=US
ThisUpdate: 12/7/2025 12:36 AM
NextUpdate: 12/16/2025 12:36 AM
CRL: b8cc6c95f9b2b0334cd589f227d2229f7d06b0ab
Issuance[0] = 2.23.140.1.2.1
Application[0] = 1.3.6.1.5.5.7.3.2 Client Authentication
Application[1] = 1.3.6.1.5.5.7.3.1 Server Authentication
CertContext[0][1]: dwInfoStatus=102 dwErrorStatus=0
Issuer: CN=ISRG Root X1, O=Internet Security Research Group, C=US
NotBefore: 3/12/2024 7:00 PM
NotAfter: 3/12/2027 6:59 PM
Subject: CN=R13, O=Let's Encrypt, C=US
Serial: 5a00f212d8d4b480f3924157ea298305
Cert: 22ff89586561fc2d52f77491e9f1eff1b80be33e
Element.dwInfoStatus = CERT_TRUST_HAS_KEY_MATCH_ISSUER (0x2)
Element.dwInfoStatus = CERT_TRUST_HAS_PREFERRED_ISSUER (0x100)
---------------- Certificate AIA ----------------
Verified "Certificate (0)" Time: 0 cabd2a79a1076a31f21d253635cb039d4329a5e8
[0.0] http://x1.i.lencr.org/
---------------- Certificate CDP ----------------
No IDP Intersection "Base CRL (6a)" Time: 0 b02330861433775b10e7ae74557911aa623c7fca
[0.0] http://x1.c.lencr.org/
---------------- Base CRL CDP ----------------
No URLs "None" Time: 0 (null)
---------------- Certificate OCSP ----------------
No URLs "None" Time: 0 (null)
--------------------------------
CRL 6a:
Issuer: CN=ISRG Root X1, O=Internet Security Research Group, C=US
ThisUpdate: 9/2/2025 7:00 PM
NextUpdate: 8/2/2026 6:59 PM
CRL: b02330861433775b10e7ae74557911aa623c7fca
Issuance[0] = 2.23.140.1.2.1
Application[0] = 1.3.6.1.5.5.7.3.2 Client Authentication
Application[1] = 1.3.6.1.5.5.7.3.1 Server Authentication
CertContext[0][2]: dwInfoStatus=10c dwErrorStatus=0
Issuer: CN=ISRG Root X1, O=Internet Security Research Group, C=US
NotBefore: 6/4/2015 6:04 AM
NotAfter: 6/4/2035 6:04 AM
Subject: CN=ISRG Root X1, O=Internet Security Research Group, C=US
Serial: 8210cfb0d240e3594463e0bb63828b00
Cert: cabd2a79a1076a31f21d253635cb039d4329a5e8
Element.dwInfoStatus = CERT_TRUST_HAS_NAME_MATCH_ISSUER (0x4)
Element.dwInfoStatus = CERT_TRUST_IS_SELF_SIGNED (0x8)
Element.dwInfoStatus = CERT_TRUST_HAS_PREFERRED_ISSUER (0x100)
---------------- Certificate AIA ----------------
No URLs "None" Time: 0 (null)
---------------- Certificate CDP ----------------
No URLs "None" Time: 0 (null)
---------------- Certificate OCSP ----------------
No URLs "None" Time: 0 (null)
--------------------------------
Application[0] = 1.3.6.1.5.5.7.3.2 Client Authentication
Application[1] = 1.3.6.1.5.5.7.3.1 Server Authentication
Exclude leaf cert:
Chain: 025db2706415d837f421ab9aeccc1c266785747b
Full chain:
Chain: b6306cd4bbcb8ffc00412d3cb222337ee0aa672b
------------------------------------
Verified Issuance Policies:
2.23.140.1.2.1
Verified Application Policies:
1.3.6.1.5.5.7.3.2 Client Authentication
1.3.6.1.5.5.7.3.1 Server Authentication
Cert is an End Entity certificate
Leaf certificate revocation check passed
CertUtil: -verify command completed successfully.
My web server is (include version): N/A
The operating system my web server runs on is (include version): Windows 11 (Home machine)
I can login to a root shell on my machine (yes or no, or I don't know): no - I don't own the server, and that is not the problem.
I posted a similar thread back in July. At that time, it seemed like the issue was Firewall.
But, I am experiencing the same symptoms, and disabling the firewall changes nothing.
One difference I observed - the section header shows no error ...
CertContext[0][0]: dwInfoStatus=102 dwErrorStatus=0
And at the bottom, it has the revocation check succeeded. But, the application I am trying to use still fails making its internal call back to the lavishsoft domain. And although dwErrorStatus = 0, as you see above, there is still a complaint in the CDP section trying to connect to r13.