Please fill out the fields below so we can help you better. Note: you must provide your domain name to get help. Domain names for issued certificates are all made public in Certificate Transparency logs (e.g. crt.sh | example.com), so withholding your domain name here does not increase secrecy, but only makes it harder for us to provide help.
My domain is: juve07.com
I ran this command:
certbot certonly --dns-cloudflare --dns-cloudflare-credentials /root/.ssh/cloudflare.ini -d juve07.com,*.juve07.com --preferred-challenges dns
It produced this output:
Saving debug log to /var/log/letsencrypt/letsencrypt.log
Requesting a certificate for juve07.com and *.juve07.com
Successfully received certificate.
Certificate is saved at: /etc/letsencrypt/live/juve07.com/fullchain.pem
Key is saved at: /etc/letsencrypt/live/juve07.com/privkey.pem
This certificate expires on 2023-05-18.
These files will be updated when the certificate renews.
Certbot has set up a scheduled task to automatically renew this certificate in the background.
If you like Certbot, please consider supporting our work by:
- Donating to ISRG / Let's Encrypt: Donate - Let's Encrypt
- Donating to EFF: Support EFF's Work on Let's Encrypt | Electronic Frontier Foundation
My web server is (include version):
Linux version 3.10.0-1062.12.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-39) (GCC) ) #1 SMP Tue Feb 4 23:02:59 UTC 2020
The operating system my web server runs on is (include version):
Linux version 4.18.0-348.7.1.el8_5.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 8.5.0 20210514 (Red Hat 8.5.0-4) (GCC)) #1 SMP Wed Dec 22 13:25:12 UTC 2021
My hosting provider, if applicable, is:
I can login to a root shell on my machine (yes or no, or I don't know): Yes
I'm using a control panel to manage my site (no, or provide the name and version of the control panel):
No
The version of my client is (e.g. output of certbot --version
or certbot-auto --version
if you're using Certbot):
certbot 2.3.0
As the topic mentioned, I am still having this issue for two days.
Two days ago, I failed to restart nginx service after deployed the ssl certificate. Then I found out that the content of privkey.pem was not normal. There are only three lines in it. So no matter how many domains I tried to issue ssl certificates by certbot, the results were still the same. It doesn't like the normal one I used to issue. The content of abnormal privkey.pem is as below.
-----BEGIN PRIVATE KEY-----
[ ----- KEY REMOVED BY STAFF ---- ]
-----END PRIVATE KEY-----
I don't know whether anyone here had this issue before or not. Please help. Thanks.