Please fill out the fields below so we can help you better. Note: you must provide your domain name to get help. Domain names for issued certificates are all made public in Certificate Transparency logs (e.g. crt.sh | example.com), so withholding your domain name here does not increase secrecy, but only makes it harder for us to provide help.
I ran this command: /usr/local/bin/getssl -u -a -w /etc/getssl
It produced this output: getssl: curl error : 35
My web server is (include version): Server version: Apache/2.2.3
The operating system my web server runs on is (include version): CentOS 5 (almost retired system)
My hosting provider, if applicable, is: wizards.co.uk
I can login to a root shell on my machine (yes or no, or I don't know): Yes
I'm using a control panel to manage my site (no, or provide the name and version of the control panel): No
The version of my client is (e.g. output of certbot --version or certbot-auto --version if you're using Certbot): getssl ver. 2.33
This runs as a crom job, on 11/ January 2021 I got the expected output-
Check all certificates holtain.net: certificate is valid for more than 30 days (until Mar 28 08:08:00 2021 GMT)
Well, CentOS-type systems often release patches for vulnerabilities without updating the version number, which makes it tough to figure out exactly what is and isn't patched. But CentOS 5 has been out of support for some time, so there may very well be important patches that haven't been applied.
The past that it says "SSLv3" in the curl output is certainly concerning, though I don't know if maybe it just tried that after trying other protocols that it couldn't get to work. I have a wild guess that maybe the version of curl you have is old enough to not support TLSv1.2, and that Github disabled earlier TLS versions, but I can't find in my quick searching any documentation of when or if Github did that so I may just be barking up the wrong tree.
What happens if you try curl to other URLs, like say,
curl -v https://valid-isrgrootx1.letsencrypt.org
Maybe play around with adding --tlsv1.0 or --tlsv1.2 in there too, just to see if that might be part of the issue?
However, I see that you only get that certificate with SNI enabled. When I use -noservername to disable SNI with OpenSSL s_client, I get the origin.letsencrypt.org certificate too.
SNI is a very widely spread feature of SSL/TLS. I don't recall coming across any SSL/TLS client not having that feature, so this is a first.
Please upgrade your cURL as your version is missing essential features. (Although probably not related to the github site issue mentioned here.. That hostname works fine without SNI.)
apache version 2.2.3 (which your webserver says) is released in Fri, 28 Jul 2006. where did you install centos from(if I google cuurretly it's centos 5)? as it's new site I'd format the system and just start from newer image
you just have too old software stack.