Dear friends! I installed nextcloud 16.0.5.1 via SNAP package. I did all steps by default, also I added trusted domains to the /var/snap/nextcloud/current/nextcloud/config/config.php, add a subdomain in a hoosting panel. Did port forwarding (I have a static IP) for 80 + 443 ports. So, everything worked fine. Then I decided to install Let’s Encrypt SSL. I used 2 commands: sudo ufw allow 80,443/tcp & sudo nextcloud.enable-https lets-encrypt
After I did this last step with SSL my nextcloud became inaccessible throuhj IP nor domain name… I can connect to the nextcloud from the same subnet, using local IP & domain name. But there is no access through Internet. Rebooted server & router for couple of times - the same issue. During SSL installation there were no errors, everything seems to be fine during the installation process.
There is a strange redirect: curl -Iki http://nextcloud.sokolenko.org/ HTTP/1.1 301 Moved Permanently Date: Mon, 16 Dec 2019 17:41:29 GMT Server: Apache Location:https://nextcloud.sokolenko.org:443/ Content-Type: text/html; charset=iso-8859-1
Not the logs, the config files.
I would assume they may be in: /etc/apache2/sites-enabled/
But you have installed NextCloud and I’m not 100% certain that doesn’t put things in another location.
seth@nextcloud:~ sudo ls -l /etc/apache2/sites-enabled/
ls: cannot access '/etc/apache2/sites-enabled/': No such file or directory
seth@nextcloud:~ apachectl -S
Command ‘apachectl’ not found, but can be installed with:
yes, it works with https in the same subnet. 443 port forwarding was made correctly, as 80 port forwarding…
That is strange. Everything works correctly with HTTP from the Internet before I installed Let’s Encrypt… Can you suggest me what else should I check maybe?
I installed Ubuntu Server in a Virtualbox, so this is a Virtual OS - bridged network mode with a static IP. Host OS is a Windows Server 2012. Ok, thanks a lot, I will try to change some setups on a router-firewall & ping you here how is it going!
UDP is not required for Let’s Encrypt certificate validations using the HTTP-01 or ALPN-01 methods, but it might be useful for future HTTP/3 support from web servers.