Please fill out the fields below so we can help you better. Note: you must provide your domain name to get help. Domain names for issued certificates are all made public in Certificate Transparency logs (e.g. crt.sh | example.com ), so withholding your domain name here does not increase secrecy, but only makes it harder for us to provide help.
My domain is: legale.io
I ran this command: certbot --nginx -d legale.io -d www.legale.io
It produced this output: Success
My web server is (include version): nginx/1.14.0
The operating system my web server runs on is (include version): Ubuntu
My hosting provider, if applicable, is: Azure
I can login to a root shell on my machine (yes or no, or I don't know): Yes
I'm using a control panel to manage my site (no, or provide the name and version of the control panel): Yes
The version of my client is (e.g. output of certbot --version
or certbot-auto --version
if you're using Certbot): certbot 0.27.0
1 Like
rg305
June 30, 2021, 12:41am
2
Hi @babytiger , and welcome to the LE community forum
Please show the following outputs:
certbot certificates
nginx -T
[and both (nginx
and certbot
) could benefit from an update]
1 Like
Thank you for your reply. Here you go the print of your commands.
certbot certificates
Found the following certs:
Certificate Name: legale.io
Domains: legale.io www.legale.io
Expiry Date: 2021-09-27 23:02:46+00:00 (VALID: 89 days)
Certificate Path: /etc/letsencrypt/live/legale.io/fullchain.pem
Private Key Path: /etc/letsencrypt/live/legale.io/privkey.pem
nginx -t
nginx: the configuration file /etc/nginx/nginx.conf syntax is ok
nginx: configuration file /etc/nginx/nginx.conf test is successful
2 Likes
Welcome to the Let's Encrypt Community, Zhang
babytiger:
nginx -t
@rg305 was wanting the output of:
sudo nginx -T
The sudo
and capital "T
" are very important here.
1 Like
nginx: the configuration file /etc/nginx/nginx.conf syntax is ok
nginx: configuration file /etc/nginx/nginx.conf test is successful
# configuration file /etc/nginx/nginx.conf:
user www-data;
worker_processes auto;
pid /run/nginx.pid;
include /etc/nginx/modules-enabled/*.conf;
events {
worker_connections 768;
# multi_accept on;
}
http {
##
# Basic Settings
##
sendfile on;
tcp_nopush on;
tcp_nodelay on;
keepalive_timeout 65;
types_hash_max_size 2048;
# server_tokens off;
# server_names_hash_bucket_size 64;
# server_name_in_redirect off;
include /etc/nginx/mime.types;
default_type application/octet-stream;
##
# SSL Settings
##
ssl_protocols TLSv1 TLSv1.1 TLSv1.2; # Dropping SSLv3, ref: POODLE
ssl_prefer_server_ciphers on;
##
# Logging Settings
##
access_log /var/log/nginx/access.log;
error_log /var/log/nginx/error.log;
##
# Gzip Settings
##
gzip on;
# gzip_vary on;
# gzip_proxied any;
# gzip_comp_level 6;
# gzip_buffers 16 8k;
# gzip_http_version 1.1;
# gzip_types text/plain text/css application/json application/javascript text/xml application/xml application/xml+rss text/javascript;
##
# Virtual Host Configs
##
include /etc/nginx/conf.d/*.conf;
include /etc/nginx/sites-enabled/*;
}
#mail {
# # See sample authentication script at:
# # http://wiki.nginx.org/ImapAuthenticateWithApachePhpScript
#
# # auth_http localhost/auth.php;
# # pop3_capabilities "TOP" "USER";
# # imap_capabilities "IMAP4rev1" "UIDPLUS";
#
# server {
# listen localhost:110;
# protocol pop3;
# proxy on;
# }
#
# server {
# listen localhost:143;
# protocol imap;
# proxy on;
# }
#}
# configuration file /etc/nginx/modules-enabled/50-mod-http-geoip.conf:
load_module modules/ngx_http_geoip_module.so;
# configuration file /etc/nginx/modules-enabled/50-mod-http-image-filter.conf:
load_module modules/ngx_http_image_filter_module.so;
# configuration file /etc/nginx/modules-enabled/50-mod-http-xslt-filter.conf:
load_module modules/ngx_http_xslt_filter_module.so;
# configuration file /etc/nginx/modules-enabled/50-mod-mail.conf:
load_module modules/ngx_mail_module.so;
# configuration file /etc/nginx/modules-enabled/50-mod-stream.conf:
load_module modules/ngx_stream_module.so;
# configuration file /etc/nginx/mime.types:
types {
text/html html htm shtml;
text/css css;
text/xml xml;
image/gif gif;
image/jpeg jpeg jpg;
application/javascript js;
application/atom+xml atom;
application/rss+xml rss;
text/mathml mml;
text/plain txt;
text/vnd.sun.j2me.app-descriptor jad;
text/vnd.wap.wml wml;
text/x-component htc;
image/png png;
image/tiff tif tiff;
image/vnd.wap.wbmp wbmp;
image/x-icon ico;
image/x-jng jng;
image/x-ms-bmp bmp;
image/svg+xml svg svgz;
image/webp webp;
application/font-woff woff;
application/java-archive jar war ear;
application/json json;
application/mac-binhex40 hqx;
application/msword doc;
application/pdf pdf;
application/postscript ps eps ai;
application/rtf rtf;
application/vnd.apple.mpegurl m3u8;
application/vnd.ms-excel xls;
application/vnd.ms-fontobject eot;
application/vnd.ms-powerpoint ppt;
application/vnd.wap.wmlc wmlc;
application/vnd.google-earth.kml+xml kml;
application/vnd.google-earth.kmz kmz;
application/x-7z-compressed 7z;
application/x-cocoa cco;
application/x-java-archive-diff jardiff;
application/x-java-jnlp-file jnlp;
application/x-makeself run;
application/x-perl pl pm;
application/x-pilot prc pdb;
application/x-rar-compressed rar;
application/x-redhat-package-manager rpm;
application/x-sea sea;
application/x-shockwave-flash swf;
application/x-stuffit sit;
application/x-tcl tcl tk;
application/x-x509-ca-cert der pem crt;
application/x-xpinstall xpi;
application/xhtml+xml xhtml;
application/xspf+xml xspf;
application/zip zip;
application/octet-stream bin exe dll;
application/octet-stream deb;
application/octet-stream dmg;
application/octet-stream iso img;
application/octet-stream msi msp msm;
application/vnd.openxmlformats-officedocument.wordprocessingml.document docx;
application/vnd.openxmlformats-officedocument.spreadsheetml.sheet xlsx;
application/vnd.openxmlformats-officedocument.presentationml.presentation pptx;
audio/midi mid midi kar;
audio/mpeg mp3;
audio/ogg ogg;
audio/x-m4a m4a;
audio/x-realaudio ra;
video/3gpp 3gpp 3gp;
video/mp2t ts;
video/mp4 mp4;
video/mpeg mpeg mpg;
video/quicktime mov;
video/webm webm;
video/x-flv flv;
video/x-m4v m4v;
video/x-mng mng;
video/x-ms-asf asx asf;
video/x-ms-wmv wmv;
video/x-msvideo avi;
}
# configuration file /etc/nginx/sites-enabled/default:
##
# You should look at the following URL's in order to grasp a solid understanding
# of Nginx configuration files in order to fully unleash the power of Nginx.
# https://www.nginx.com/resources/wiki/start/
# https://www.nginx.com/resources/wiki/start/topics/tutorials/config_pitfalls/
# https://wiki.debian.org/Nginx/DirectoryStructure
#
# In most cases, administrators will remove this file from sites-enabled/ and
# leave it as reference inside of sites-available where it will continue to be
# updated by the nginx packaging team.
#
# This file will automatically load configuration files provided by other
# applications, such as Drupal or Wordpress. These applications will be made
# available underneath a path with that package name, such as /drupal8.
#
# Please see /usr/share/doc/nginx-doc/examples/ for more detailed examples.
##
# Default server configuration
#
server {
listen 80 default_server;
listen [::]:80 default_server;
# SSL configuration
#
# listen 443 ssl default_server;
# listen [::]:443 ssl default_server;
#
# Note: You should disable gzip for SSL traffic.
# See: https://bugs.debian.org/773332
#
# Read up on ssl_ciphers to ensure a secure configuration.
# See: https://bugs.debian.org/765782
#
# Self signed certs generated by the ssl-cert package
# Don't use them in a production server!
#
# include snippets/snakeoil.conf;
root /var/www/html;
# Add index.php to the list if you are using PHP
index index.html index.htm index.nginx-debian.html;
server_name _;
location / {
# First attempt to serve request as file, then
# as directory, then fall back to displaying a 404.
try_files $uri $uri/ =404;
}
# pass PHP scripts to FastCGI server
#
#location ~ \.php$ {
# include snippets/fastcgi-php.conf;
#
# # With php-fpm (or other unix sockets):
# fastcgi_pass unix:/var/run/php/php7.0-fpm.sock;
# # With php-cgi (or other tcp sockets):
# fastcgi_pass 127.0.0.1:9000;
#}
# deny access to .htaccess files, if Apache's document root
# concurs with nginx's one
#
#location ~ /\.ht {
# deny all;
#}
}
# Virtual Host configuration for example.com
#
# You can move that to a different file under sites-available/ and symlink that
# to sites-enabled/ to enable it.
#
#server {
# listen 80;
# listen [::]:80;
#
# server_name example.com;
#
# root /var/www/example.com;
# index index.html;
#
# location / {
# try_files $uri $uri/ =404;
# }
#}
# configuration file /etc/nginx/sites-enabled/legale.io:
server {
server_name legale.io www.legale.io;
location / {
proxy_pass http://127.0.0.1:8000$request_uri;
proxy_redirect off;
proxy_set_header HOST $host;
proxy_set_header X-Fowarded-Host $server_name;
proxy_set_header X-Fowarded-For $proxy_add_x_forwarded_for;
proxy_set_header X-NginX-Proxy true;
proxy_set_header X-Real-IP $remote_addr;
proxy_connect_timeout 5000s;
proxy_read_timeout 5000s;
proxy_http_version 1.1;
proxy_set_header Upgrade $http_upgrade;
proxy_set_header Connection "upgrade";
}
listen [::]:443 ssl;
listen 443 ssl; # managed by Certbot
ssl_certificate /etc/letsencrypt/live/legale.io/fullchain.pem; # managed by Certbot
ssl_certificate_key /etc/letsencrypt/live/legale.io/privkey.pem; # managed by Certbot
include /etc/letsencrypt/options-ssl-nginx.conf; # managed by Certbot
ssl_dhparam /etc/letsencrypt/ssl-dhparams.pem; # managed by Certbot
}
server {
if ($host = www.legale.io) {
return 301 https://$host$request_uri;
} # managed by Certbot
if ($host = legale.io) {
return 301 https://$host$request_uri;
} # managed by Certbot
listen 80;
listen [::]:80;
server_name legale.io www.legale.io;
return 404; # managed by Certbot
}
# configuration file /etc/letsencrypt/options-ssl-nginx.conf:
# This file contains important security parameters. If you modify this file
# manually, Certbot will be unable to automatically provide future security
# updates. Instead, Certbot will print and log an error message with a path to
# the up-to-date file that you will need to refer to when manually updating
# this file.
ssl_session_cache shared:le_nginx_SSL:1m;
ssl_session_timeout 1440m;
ssl_protocols TLSv1 TLSv1.1 TLSv1.2;
ssl_prefer_server_ciphers on;
ssl_ciphers "ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS";
sorry to this long text
1 Like
rg305
June 30, 2021, 2:49pm
6
I only see a possible problem when you will need to renew your cert.
The current topic problem appears to be related to port 443 being blocked or nor forwarded correctly.
HTTP connections work and receive the redirection instructions.
HTTPS connections time out.
curl -Iki http://legale.io/
HTTP/1.1 301 Moved Permanently
Server: nginx/1.14.0 (Ubuntu)
Date: Wed, 30 Jun 2021 14:43:39 GMT
Content-Type: text/html
Content-Length: 194
Connection: keep-alive
Location: https://legale.io/
curl -Iki https://legale.io/
curl: (7) Failed to connect to legale.io port 443: Connection timed out
As for the future, potential, renewal problem: You may need to include a specialized handling location block for the challenge requests.
1 Like
Hello @rg305
So the certbot is no problem so far?
Thank you very much, I will try to check all things again.
I will leave here if I find a good solution.
2 Likes
rg305
June 30, 2021, 3:59pm
8
To ensure, please show:
certbot certificates
1 Like
Found the following certs:
Certificate Name: legale.io
Domains: legale.io www.legale.io
Expiry Date: 2021-09-27 23:02:46+00:00 (VALID: 89 days)
Certificate Path: /etc/letsencrypt/live/legale.io/fullchain.pem
Private Key Path: /etc/letsencrypt/live/legale.io/privkey.pem
This one?
2 Likes
rg305
June 30, 2021, 4:35pm
10
Yes, that is the needed cert.
So, certbot
is not the problem.
Just to be sure, please restart, or reload, nginx
.
Like:
systemctl restart nginx
OR show the output of:
sudo netstat -pant | grep -Ei 'nginx|:443'
1 Like
I was trying to restart nginx so many times but no effect.
Here you go the result of your last command.
tcp 0 0 0.0.0.0:80 0.0.0.0:* LISTEN 14926/nginx: master
tcp 0 0 0.0.0.0:443 0.0.0.0:* LISTEN 14926/nginx: master
tcp 0 0 10.0.1.22:35142 40.79.154.87:443 TIME_WAIT -
tcp 0 0 10.0.1.22:35176 40.79.154.87:443 TIME_WAIT -
tcp 0 0 10.0.1.22:35174 40.79.154.87:443 TIME_WAIT -
tcp 0 0 10.0.1.22:35220 40.79.154.87:443 TIME_WAIT -
tcp6 0 0 :::80 :::* LISTEN 14926/nginx: master
tcp6 0 0 :::443 :::* LISTEN 14926/nginx: master
1 Like
@rg305
Since @babytiger is using the --nginx
authenticator, certbot should temporarily create this itself during the authentication process, which will avoid the http to https redirect.
If this test succeeds:
sudo certbot renew --dry-run
we know for sure.
1 Like
@babytiger
Please run the following command and let us know the output:
kill -KILL $( cat /usr/local/nginx/logs/nginx.pid )
1 Like
Finally, I found why.
You guys were right, there was no problem in certbot, it was the problem in VM.
Actually, I am using Ubuntu VM of Azure, and I forgot to open port 443 on Azure VM networking configuration.
I hope nobody face this silly problem later.
Thank you guys.
2 Likes
You are very welcome.
Glad it worked out.
Don't be hard on yourself here. We see basically the same issue many times per week. Often it's port 80 that's blocked though.
1 Like
system
Closed
July 30, 2021, 6:18pm
16
This topic was automatically closed 30 days after the last reply. New replies are no longer allowed.