Not sure if this will help, but the website only supports TLSv1.0
and has s self-signed cert - not the expected “/etc/letsencrypt/live/fathomthat.org/fullchain.pem”:
-----BEGIN CERTIFICATE-----
MIICEzCCAXygAwIBAgIJANPVAn5GkBvIMA0GCSqGSIb3DQEBBQUAMEAxCzAJBgNV
BAYTAlBMMRMwEQYDVQQIEwpTb21lLVN0YXRlMRwwGgYDVQQKExNNaW5pIFdlYnNl
cnZpY2UgTHRkMB4XDTA5MTAyOTExMzMyMVoXDTEwMTAyOTExMzMyMVowQDELMAkG
A1UEBhMCUEwxEzARBgNVBAgTClNvbWUtU3RhdGUxHDAaBgNVBAoTE01pbmkgV2Vi
c2VydmljZSBMdGQwgZ8wDQYJKoZIhvcNAQEBBQADgY0AMIGJAoGBAMP3UFBe3v9P
iUUsyI15gCpp21Cx4VFz4XHGS/aUFBW/EwPY3dgjxTsEtjr3kJXsTbxLbzJDH28u
sLu3ZH46GIb3i1RjnOWWE1Th4Zock6s5e+F+CSnrl32B9nM2drzz3mofy2QfvruJ
h+Ld5UKuntJHDAz+nWFOcKTC2rOZtGcxAgMBAAGjFTATMBEGCWCGSAGG+EIBAQQE
AwIGQDANBgkqhkiG9w0BAQUFAAOBgQAfb9xImKxzEyAiNe1/J9HSUV2C5+KB1Zvx
sLmPS5F1nO5+5K3UZaUcfsbnd9SVOC7fMj989eVgJdFn6I8bQXXRha9/d8upTmnl
30U60zRHGIV5lcMrHGSHwmECTRunzcB5x+oVPogksNRZR8Hh4xn0E9zGOX5ucAEg
nfwRJabv/Q==
-----END CERTIFICATE-----
I suggest grep -r ^ssl_cert /etc/nginx to see if there are other configuration files with potentially conflicting definitions (that point to the self-signed cert).
Authority Information Access:
OCSP - URI:http://ocsp.int-x3.letsencrypt.org
CA Issuers - URI:http://cert.int-x3.letsencrypt.org/
X509v3 Subject Alternative Name:
DNS:fathomthat.org, DNS:www.fathomthat.org
X509v3 Certificate Policies:
Policy: 2.23.140.1.2.1
Policy: 1.3.6.1.4.1.44947.1.1.1
CPS: http://cps.letsencrypt.org
User Notice:
Explicit Text: This Certificate may only be relied upon by Relying Parties and only in accordance with the Certificate Policy found at https://letsencrypt.org/repository/
grep -r ssl_cert /etc/nginx
/etc/nginx/sites-available/default: # certs sent to the client in SERVER HELLO are concatenated in ssl_certificate
/etc/nginx/sites-available/default: ssl_certificate /etc/letsencrypt/live/fathomthat.org/fullchain.pem;
/etc/nginx/sites-available/default: ssl_certificate_key /etc/letsencrypt/live/fathomthat.org/privkey.pem;
/etc/nginx/sites-available/default: # fetch OCSP records from URL in ssl_certificate and cache them
/etc/nginx/snippets/ssl-fathomthat.org.conf:ssl_certificate /etc/letsencrypt/live/fathomthat.org/fullchain.pem;
/etc/nginx/snippets/ssl-fathomthat.org.conf:ssl_certificate_key /etc/letsencrypt/live/fathomthat.org/privkey.pem;
There also ought to be an error log from nginx showing why the TLS connection is failing (perhaps in /var/log/nginx).
Finally, I am not entirely persuaded that the TLS connections are reaching your nginx server at all, as opposed to some kind of firewall or proxy. Compare this thread:
The self-signed cert that can still be obtained is also from "Mini Webservice Ltd" which seems like it's probably the same appliance.
Well, I feel dumb. After you mentioned that I went and double checked. I just had an AT&T u-verse wireless STB device installed the other day, after googling and reading that post, apparently it automatically adds a forwarding rule on their gateway to the STB box on port 443. So, even though I had all traffic being forwarded to my ubiquity edge router, it had overwritten port 443.
I suppose that wireless device matches the certificate I posted earlier: "Mini Webservice Ltd"
I would have shown the picture but I’m not aware of how to post pictures (yet - yes I’m a noob here).