Please fill out the fields below so we can help you better. Note: you must provide your domain name to get help. Domain names for issued certificates are all made public in Certificate Transparency logs (e.g. crt.sh | example.com), so withholding your domain name here does not increase secrecy, but only makes it harder for us to provide help.
My domain is: snafu.ddns.net
I ran this command: sudo letsencrypt certonly --staging
It produced this output:
Domain: snafu.ddns.net
Type: connection
Detail: 65.110.x.x: Fetching
http://snafu.ddns.net/.well-known/acme-challenge/A-pjJl5zQLBVpiq7bQDOXnR1qikWJYFefOgYI7Z6B4s:
Timeout during connect (likely firewall problem)
To fix these errors, please make sure that your domain name was
entered correctly and the DNS A/AAAA record(s) for that domain
contain(s) the right IP address. Additionally, please check that
your computer has a publicly routable IP address and that no
firewalls are preventing the server from communicating with the
client. If you're using the webroot plugin, you should also verify
that you are serving files from the webroot path you provided.
- Your account credentials have been saved in your Certbot
configuration directory at /etc/letsencrypt. You should make a
secure backup of this folder now. This configuration directory will
also contain certificates and private keys obtained by Certbot so
making regular backups of this folder is ideal.
My web server is (include version): Nothing on port 80, used a variety of ways to get this through.
The operating system my web server runs on is (include version): No webserver for outside use.
My hosting provider, if applicable, is:
I can login to a root shell on my machine (yes or no, or I don't know): yes
I'm using a control panel to manage my site (no, or provide the name and version of the control panel): no
The version of my client is (e.g. output of certbot --version
or certbot-auto --version
if you're using Certbot): certbot 0.31.0
Now that I have that information out of the way, I have a multitude of services running for IoT and various other servers running for more IoT that are not for the "general public".
One of the services actually warns me (rather abruptly, which isn't a bad thing) that some hackbot is attempting to connect to it with an invalid encryption method. When I see that, I get the CIDR of the server farm that it is on and add it to the firewall group that block access to the incoming ports in the router, this means that server farms that allow hackbots to operate wind up being blocked. Well, over the past 2 years, that list is almost 1000 CIDRs, so possibly tens of millions of IP addresses unable to access the incoming ports. The two IP addresses at letsencrypt.org are not in the block list, but, at an outside location (via vpn), I CAN see the port 80 opened by certbot during it's communication (remotely using a port scan during and after it failed), but the letsencrypt validation servers cannot (meaning they reside on a server farm that has been blocked).
This lies the big issue, what server IP addresses are being used for the certificate validation? I need the IP addresses, so I can allow only those from that server farm through to only port 80.
I looked at DNS-01, but the automation of that isn't going to be possible with no-ip domains, that I've seen, if anyone has anything further, I'd be interested to know. But the most important part would be the pool of IP addresses that is used, yes, I know they change, but if that list is kept up to date somewhere, I can update my list on the router when necessary.