My web server is (include version): apache 2
The operating system my web server runs on is (include version): Ubuntu 22.04
My hosting provider, if applicable, is: no
I can login to a root shell on my machine (yes or no, or I don't know): no
I'm using a control panel to manage my site (no,
The version of my client is (e.g. output of certbot --version
or certbot-auto --version
if you're using Certbot): certbot 1.21.0
got this:
apachectl -S
AH00526: Syntax error on line 33 of /etc/apache2/sites-enabled/000-default-le-ssl.conf:
SSLCertificateFile: file '/etc/letsencrypt/live/ekoninfochecker.efri.uniri.hr/fullchain.pem' does not exist or is empty
Action '-S' failed.
sudo certbot certificates shows
Saving debug log to /var/log/letsencrypt/letsencrypt.log
Found the following certs:
Certificate Name: ekoninfochecker.efri.uniri.hr
Serial Number: 4c6920a96979091d360c1c8ff71546f3396
Key Type: ECDSA
Domains: ekoninfochecker.efri.uniri.hr
Expiry Date: 2024-08-01 18:01:33+00:00 (VALID: 87 days)
Certificate Path: /etc/letsencrypt/live/ekoninfochecker.efri.uniri.hr/fullchain.pem
Private Key Path: /etc/letsencrypt/live/ekoninfochecker.efri.uniri.hr/privkey.pem
SSL Checker gives ok, SSL Certificate Checker - Diagnostic Tool | DigiCert.com gives ok,
Check SSL Certificate - GeoCerts gives ok
Chrome: Your connection is not private
Attackers might be trying to steal your information from 31.147.206.21 (for example, passwords, messages, or credit cards). Learn more
NET::ERR_CERT_COMMON_NAME_INVALID
Common Name (CN)
ekoninfochecker.efri.uniri.hr
Organization (O)
Organizational Unit (OU)
Common Name (CN)
R3
Organization (O)
Let's Encrypt
Organizational Unit (OU)
Issued On
Friday, May 3, 2024 at 8:01:34 PM
Expires On
Thursday, August 1, 2024 at 8:01:33 PM
Certificate
623282b720c2f7d0937e7e6c204cbeb174b365ee1915995353d52d9137d5f9e6
Public Key
cce991425d535f8413382d06dfc937290cd113c5051328dcb265147757522df8
Hello @dcisic , welcome to the Let's Encrypt community.
I am not sure what I am sharing directly applies,
but the site https://ekoninfochecker.efri.uniri.hr
(a Doman Name)
is being redirected to (https://31.147.206.21/
(an IP Address)
Let’s Encrypt offers Domain Validation (DV) certificates ; an NOT IP Addresses presently.
$ curl -i https://ekoninfochecker.efri.uniri.hr
HTTP/1.1 301 Moved Permanently
Date: Sun, 05 May 2024 20:08:57 GMT
Server: Apache/2.4.52 (Ubuntu)
X-Redirect-By: WordPress
Location: https://31.147.206.21/
Content-Length: 0
Content-Type: text/html; charset=UTF-8
2 Likes
@dcisic also Show the output of
sudo apachectl -t -D DUMP_VHOSTS
and also
sudo ls -l /etc/letsencrypt/live/ekoninfochecker.efri.uniri.hr/
2 Likes
VirtualHost configuration:
*:443 is a NameVirtualHost
default server ekoninfochecker.efri.uniri.hr (/etc/apache2/sites-enabled/000-default-le-ssl.conf:2)
port 443 namevhost ekoninfochecker.efri.uniri.hr (/etc/apache2/sites-enabled/000-default-le-ssl.conf:2)
port 443 namevhost ekoninfo.hrzoo (/etc/apache2/sites-enabled/default-ssl.conf:2)
port 443 namevhost ekoninfochecker.efri.uniri.hr (/etc/apache2/sites-enabled/ekoninfochecker.efri.uniri.hr.conf:1)
*:80 ekoninfochecker.efri.uniri.hr (/etc/apache2/sites-enabled/ekoninfochecker.efri.uniri.hr.conf:10)
-rw-r--r-- 1 root root 692 Apr 14 07:25 README
lrwxrwxrwx 1 root root 53 May 3 19:01 cert.pem -> ../../archive/ekoninfochecker.efri.uniri.hr/cert2.pem
lrwxrwxrwx 1 root root 54 May 3 19:01 chain.pem -> ../../archive/ekoninfochecker.efri.uniri.hr/chain2.pem
lrwxrwxrwx 1 root root 58 May 3 19:01 fullchain.pem -> ../../archive/ekoninfochecker.efri.uniri.hr/fullchain2.pem
lrwxrwxrwx 1 root root 56 May 3 19:01 privkey.pem -> ../../archive/ekoninfochecker.efri.uniri.hr/privkey2.pem
And now sudo ls -l /etc/letsencrypt/archive/ekoninfochecker.efri.uniri.hr/
1 Like
ekon@ekoninfo:/etc/apache2/sites-available$ sudo ls -l /etc/letsencrypt/archive/ekoninfochecker.efri.uniri.hr/
total 32
-rw-r--r-- 1 root root 1801 Apr 14 07:25 cert1.pem
-rw-r--r-- 1 root root 1529 May 3 19:01 cert2.pem
-rw-r--r-- 1 root root 1826 Apr 14 07:25 chain1.pem
-rw-r--r-- 1 root root 1826 May 3 19:01 chain2.pem
-rw-r--r-- 1 root root 3627 Apr 14 07:25 fullchain1.pem
-rw-r--r-- 1 root root 3355 May 3 19:01 fullchain2.pem
-rw------- 1 root root 1704 Apr 14 07:25 privkey1.pem
-rw------- 1 root root 241 May 3 19:01 privkey2.pem
@dcisic ,
dcisic:
apachectl -S
Was that run as root
or via sudo
?
This is only the public certificates and intermediates CA chain, so this is all safe to share.
Please show the output of
sudo cat /etc/letsencrypt/live/ekoninfochecker.efri.uniri.hr/fullchain.pem
1 Like
Bruce5051:
sudo cat /etc/letsencrypt/live/ekoninfochecker.efri.uniri.hr/fullchain.pem
ekon@ekoninfo:/etc/apache2/sites-available$ sudo cat /etc/letsencrypt/live/ekoninfochecker.efri.uniri.hr/fullchain.pem
-----BEGIN CERTIFICATE-----
MIIEPDCCAySgAwIBAgISBMaSCpaXkJHTYMHI/3FUbzOWMA0GCSqGSIb3DQEBCwUA
MDIxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MQswCQYDVQQD
EwJSMzAeFw0yNDA1MDMxODAxMzRaFw0yNDA4MDExODAxMzNaMCgxJjAkBgNVBAMT
HWVrb25pbmZvY2hlY2tlci5lZnJpLnVuaXJpLmhyMFkwEwYHKoZIzj0CAQYIKoZI
zj0DAQcDQgAELhZSundFTOD7tM8oFQ/CXHK/tD7GXgaY4qb73WAaYWJmNdnUUQwb
i/tC08XYEiGYOWQxrstvNEgL65zAtyu5haOCAh8wggIbMA4GA1UdDwEB/wQEAwIH
gDAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDAYDVR0TAQH/BAIwADAd
BgNVHQ4EFgQULd4PNWv8hQGKZTxUBZogTaYz2S4wHwYDVR0jBBgwFoAUFC6zF7dY
VsuuUAlA5h+vnYsUwsYwVQYIKwYBBQUHAQEESTBHMCEGCCsGAQUFBzABhhVodHRw
Oi8vcjMuby5sZW5jci5vcmcwIgYIKwYBBQUHMAKGFmh0dHA6Ly9yMy5pLmxlbmNy
Lm9yZy8wKAYDVR0RBCEwH4IdZWtvbmluZm9jaGVja2VyLmVmcmkudW5pcmkuaHIw
EwYDVR0gBAwwCjAIBgZngQwBAgEwggEEBgorBgEEAdZ5AgQCBIH1BIHyAPAAdgA/
F0tP1yJHWJQdZRyEvg0S7ZA3fx+FauvBvyiF7PhkbgAAAY8/1U3HAAAEAwBHMEUC
IQChFhEaXAJkiDMXvkmS784LSGiPN22Trm9A/5t1AaJdGgIgF7ASjMnZuuBW+AK6
gRwEwHho4bsJwKhtuFUnVWbxNnkAdgDuzdBk1dsazsVct520zROiModGfLzs3sNR
SFlGcR+1mwAAAY8/1U3LAAAEAwBHMEUCIDHjVlbOHhkHG+rAK63SX49Qq0qphT9y
grf9WlwzINn9AiEAua4JyHo7WUB/PsjWKRe9Xwtjjwb6A1Tgg0UBl3L/V78wDQYJ
KoZIhvcNAQELBQADggEBAFIDhD4pw5Fi8ZDwBTpgXTx0NjGWRT8+ZFYWlTi1kCLa
vh1FW7b1eSEgUZ3ZsCk0HcLAxM0sFReewW3a+qT3CFUlt2ag5Rc3iC5lAeUinMh2
pqpjT4Md6RSQLlxD3NFmsVtLrOo9Eq+cdNtC6ieVIobAHzHGK+fPGzXLGDdId4HV
OVSXW8qpqFAiR24Q/0qSzl4URnXgrJWSWw0i1sjKGZ87w9NkudevzXdgw11xBMD2
smKlZXYF+FbyqhFaWoRLzaLq0JcIgcjtrApP1pcXP1TG9oW92uSBPUVjVN08y7l6
Lpmi0QscH8BFxoDz1wzohqtQQwEpY5QISDXQVt4GfCk=
-----END CERTIFICATE-----
-----BEGIN CERTIFICATE-----
MIIFFjCCAv6gAwIBAgIRAJErCErPDBinU/bWLiWnX1owDQYJKoZIhvcNAQELBQAw
TzELMAkGA1UEBhMCVVMxKTAnBgNVBAoTIEludGVybmV0IFNlY3VyaXR5IFJlc2Vh
cmNoIEdyb3VwMRUwEwYDVQQDEwxJU1JHIFJvb3QgWDEwHhcNMjAwOTA0MDAwMDAw
WhcNMjUwOTE1MTYwMDAwWjAyMQswCQYDVQQGEwJVUzEWMBQGA1UEChMNTGV0J3Mg
RW5jcnlwdDELMAkGA1UEAxMCUjMwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEK
AoIBAQC7AhUozPaglNMPEuyNVZLD+ILxmaZ6QoinXSaqtSu5xUyxr45r+XXIo9cP
R5QUVTVXjJ6oojkZ9YI8QqlObvU7wy7bjcCwXPNZOOftz2nwWgsbvsCUJCWH+jdx
sxPnHKzhm+/b5DtFUkWWqcFTzjTIUu61ru2P3mBw4qVUq7ZtDpelQDRrK9O8Zutm
NHz6a4uPVymZ+DAXXbpyb/uBxa3Shlg9F8fnCbvxK/eG3MHacV3URuPMrSXBiLxg
Z3Vms/EY96Jc5lP/Ooi2R6X/ExjqmAl3P51T+c8B5fWmcBcUr2Ok/5mzk53cU6cG
/kiFHaFpriV1uxPMUgP17VGhi9sVAgMBAAGjggEIMIIBBDAOBgNVHQ8BAf8EBAMC
AYYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMBMBIGA1UdEwEB/wQIMAYB
Af8CAQAwHQYDVR0OBBYEFBQusxe3WFbLrlAJQOYfr52LFMLGMB8GA1UdIwQYMBaA
FHm0WeZ7tuXkAXOACIjIGlj26ZtuMDIGCCsGAQUFBwEBBCYwJDAiBggrBgEFBQcw
AoYWaHR0cDovL3gxLmkubGVuY3Iub3JnLzAnBgNVHR8EIDAeMBygGqAYhhZodHRw
Oi8veDEuYy5sZW5jci5vcmcvMCIGA1UdIAQbMBkwCAYGZ4EMAQIBMA0GCysGAQQB
gt8TAQEBMA0GCSqGSIb3DQEBCwUAA4ICAQCFyk5HPqP3hUSFvNVneLKYY611TR6W
PTNlclQtgaDqw+34IL9fzLdwALduO/ZelN7kIJ+m74uyA+eitRY8kc607TkC53wl
ikfmZW4/RvTZ8M6UK+5UzhK8jCdLuMGYL6KvzXGRSgi3yLgjewQtCPkIVz6D2QQz
CkcheAmCJ8MqyJu5zlzyZMjAvnnAT45tRAxekrsu94sQ4egdRCnbWSDtY7kh+BIm
lJNXoB1lBMEKIq4QDUOXoRgffuDghje1WrG9ML+Hbisq/yFOGwXD9RiX8F6sw6W4
avAuvDszue5L3sz85K+EC4Y/wFVDNvZo4TYXao6Z0f+lQKc0t8DQYzk1OXVu8rp2
yJMC6alLbBfODALZvYH7n7do1AZls4I9d1P4jnkDrQoxB3UqQ9hVl3LEKQ73xF1O
yK5GhDDX8oVfGKF5u+decIsH4YaTw7mP3GFxJSqv3+0lUFJoi5Lc5da149p90Ids
hCExroL1+7mryIkXPeFM5TgO9r0rvZaBFOvV2z0gp35Z0+L4WPlbuEjN/lxPFin+
HlUjr8gRsI3qfJOQFy/9rKIJR0Y/8Omwt/8oTWgy1mdeHmmjk7j1nYsvC9JSQ6Zv
MldlTTKB3zhThV1+XWYp6rjd5JW1zbVWEkLNxE7GJThEUG3szgBVGP7pSWTUTsqX
nLRbwHOoq7hHwg==
-----END CERTIFICATE-----
sudo now : sudo apachectl -S
VirtualHost configuration:
*:443 is a NameVirtualHost
default server ekoninfochecker.efri.uniri.hr (/etc/apache2/sites-enabled/000-default-le-ssl.conf:2)
port 443 namevhost ekoninfochecker.efri.uniri.hr (/etc/apache2/sites-enabled/000-default-le-ssl.conf:2)
port 443 namevhost ekoninfochecker.efri.uniri.hr (/etc/apache2/sites-enabled/default-ssl.conf:2)
port 443 namevhost ekoninfochecker.efri.uniri.hr (/etc/apache2/sites-enabled/ekoninfochecker.efri.uniri.hr.conf:1)
*:80 ekoninfochecker.efri.uniri.hr (/etc/apache2/sites-enabled/ekoninfochecker.efri.uniri.hr.conf:10)
ServerRoot: "/etc/apache2"
Main DocumentRoot: "/var/www/html"
Main ErrorLog: "/var/log/apache2/error.log"
Mutex watchdog-callback: using_defaults
Mutex rewrite-map: using_defaults
Mutex ssl-stapling-refresh: using_defaults
Mutex ssl-stapling: using_defaults
Mutex ssl-cache: using_defaults
Mutex default: dir="/var/run/apache2/" mechanism=default
Mutex mpm-accept: using_defaults
PidFile: "/var/run/apache2/apache2.pid"
Define: DUMP_VHOSTS
Define: DUMP_RUN_CFG
User: name="www-data" id=33
Group: name="www-data" id=33
but still in Chrome certificate is not valid
@dcisic
So we have demonstrated
that this is not true .
Here details on Apache can be found in documentation and forums:
And at this point, kindly wait for more knowledgeable Let's Encrypt community volunteers to assist.
1 Like
Yep I see that too; for this reason
1 Like
@dcisic I suggest changing the redirect here
$ curl -i https://ekoninfochecker.efri.uniri.hr
HTTP/1.1 301 Moved Permanently
Date: Sun, 05 May 2024 22:10:17 GMT
Server: Apache/2.4.52 (Ubuntu)
X-Redirect-By: WordPress
Location: https://31.147.206.21/
Content-Length: 0
Content-Type: text/html; charset=UTF-8
The Location: https://31.147.206.21/ to use the domain name of the server at the IPv4 Address 31.147.206.21 instead of that IPv4 Address.
1 Like
@dcisic actually that redirect seems to only be doing harm since the
IP Address of ekoninfochecker.efri.uniri.hr
is 31.147.206.21
At this point I suggest just removing the redirect.
$ nslookup ekoninfochecker.efri.uniri.hr
Server: 127.0.0.53
Address: 127.0.0.53#53
Non-authoritative answer:
Name: ekoninfochecker.efri.uniri.hr
Address: 31.147.206.21
1 Like
After you change the redirect to use a domain name instead of an IP address you need to fix your VirtualHost layout. You have 3 VirtualHosts defined for the same domain name and port. You can only have 1. Apache does not issue an error but only one of them will ever be active.
5 Likes
system
Closed
June 4, 2024, 10:25pm
15
This topic was automatically closed 30 days after the last reply. New replies are no longer allowed.