Please fill out the fields below so we can help you better. Note: you must provide your domain name to get help. Domain names for issued certificates are all made public in Certificate Transparency logs (e.g. crt.sh | example.com), so withholding your domain name here does not increase secrecy, but only makes it harder for us to provide help.
My domain is: hhdw.org
I ran this command:
After running Apache httdp server-status - in the section labeled Managed Certificates,
I saw the following output:
Domain: hhdw.org
Names: hhdw.org
Status: good
Valid: until 2025-08-18
CA: LetsEncrypt (https://acme-v02.api.letsencrypt.org/directory)
Stapling: on
CheckAt: |[crt.sh[rsa]]crt.sh | 7d33c82e88f4f3f1653aa861ace9f0464f139f31445c66be6ff1bebcb080224c
Activity: Renew 2025-07-10|
I clicked on the crt.sh URL above
When the crt.sh URL came up, under Revocation section, for OCSP Mechanism/status, there was another URL which I ran:
It produced this output:
Mechanism: OCSP
Provider The CA
Status No OCSP URL available
Last Observed in CRL - n/a
Last Checked (error) 2025-06-06 16:11:17 UTC
My web server is (include version):
Apache 2.4.63, with mod-status
The operating system my web server runs on is (include version):
MS Windows Server 2019 datacenter
My hosting provider, if applicable, is:
I can login to a root shell on my machine (yes or no, or I don't know): YES
I'm using a control panel to manage my site (no, or provide the name and version of the control panel): NO
Here's some of my configuration:
snippet from httpd-vhosts.conf
<VirtualHost 10.0.0.231:443>
ServerName hhdw.org
#### use http2, and permit acme to just use 443
Protocols h2 http/1.1 acme-tls/1
ErrorLog "logs/hhdw_443_error.log"
CustomLog "logs/hhdw_443_access_%Y%m%d.log" combined
SSLEngine on
SSLInsecureRenegotiation off
SSLProxyEngine on
SSLProxyVerify none
SSLProxyCheckPeerCN off
SSLProxyCheckPeerExpire off
SSLProxyCheckPeerName off
#### Reverse proxy for this virtual host ####
ProxyPreserveHost on
ProxyRequests off
<Proxy *>
Require all granted
</Proxy>
Header always edit Set-Cookie ^(.*)$ $1;HttpOnly;Secure
RequestHeader set X-Forwarded-Proto "https"
RequestHeader set X-Forwarded-Port "443"
ProxyPass "/server-status" "!"
ProxyPass "/md-status" "!"
ProxyPass "/.svn" "!"
ProxyPass "/nmibis-admin" "!"
ProxyPass "/xmlrpc.php" "!"
ProxyPass "/wp-cron.php" "!"
###ProxyPass "/wp-login.php" "!"
####
ProxyPass /report/ http://10.0.1.108/report/
ProxyPassReverse /report/ http://10.0.1.108/report/
ProxyPassReverseCookieDomain 10.0.1.108/report/ /report/
ProxyPassReverseCookiePath "/report/" "/report/"
ProxyPass / http://10.0.1.108/
ProxyPassReverse / http://10.0.1.108/
ProxyPassReverseCookiePath "/" "/"
Header always set Strict-Transport-Security "max-age=31536000; includeSubDomains"
</VirtualHost>
For httpd-ssl.conf
everything is commented out except for:
SSLCipherSuite < list of acceptable ciphers>
SSLHonorCipherOrder on
SSLProtocol +TLSv1.2 +TLSv1.3
SSLProxyProtocol +TLSv1.2 +TLSv1.3
Note: I don't have SSLUseStapling set to on, because as I understand it, when using mod_md, it provides its only stapling method
Why am I seeing the No OCSP URL available in the Statud of the crt.sh output, after running check