Hello @schoen
I waited now few days as you recommended, can you tell me what commands to run to fix issue now?
Thanks again!
schoen
July 18, 2017, 4:52pm
22
So I donât know what your domain is, so I couldnât check whether you are at risk of running into any rate limit by doing this, but the command I thought you could try is
./certbot-auto renew --force-renewal
This will try to renew all of your certificates (regardless of how close to expiry they are), and you can see whether or not it works.
Edit: if it does work, the form that goes in your crontab should leave out the --force-renewal
Hello @schoen
I have send you mp with my domain so, you can check, I just run your command and it seems certificate went thought but also got a warning which is in bold, can you take a look and let me know if this is ok:
root@user:/usr/local/letsencrypt# cd /usr/local/letsencrypt && ./certbot-auto renew --force-renewal
Saving debug log to /var/log/letsencrypt/letsencrypt.log
Processing /etc/letsencrypt/renewal/mysite.com-0001.conf
Renewing an existing certificate
Performing the following challenges:
tls-sni-01 challenge for mysite.com
tls-sni-01 challenge for www.mysite.com
Waiting for verificationâŚ
Cleaning up challenges
new certificate deployed with reload of apache server; fullchain is
/etc/letsencrypt/live/mysite.com-0001/fullchain.pem
Processing /etc/letsencrypt/renewal/mysite.com.conf
Renewing an existing certificate
Performing the following challenges:
tls-sni-01 challenge for www.mysite.com
tls-sni-01 challenge for mail.mysite.com
Encountered vhost ambiguity but unable to ask for user guidance in non-interactive mode. Currently Certbot needs each vhost to be in its own conf file, and may need vhosts to be explicitly labelled with ServerName or ServerAlias directives.
*Falling back to default vhost :443âŚ
Waiting for verificationâŚ
Cleaning up challenges
new certificate deployed without reload, fullchain is
/etc/letsencrypt/live/mysite.com/fullchain.pem
Congratulations, all renewals succeeded. The following certs have been renewed:
/etc/letsencrypt/live/mysite.com-0001/fullchain.pem (success)
/etc/letsencrypt/live/mysite.com/fullchain.pem (success)
schoen
July 18, 2017, 11:36pm
24
It looks like the mail.mysite.com Apache configuration is confusing Certbot. Can you post that Apache configuration file?
Sure, can you tell me path of file so, I can post it please
schoen:
m Apache configuration
Forget my previous post, I founded path, I am posting output bellow:
ubuntu@user:~$ cat /etc/apache2/apache2.conf
This is the main Apache server configuration file. It contains the
configuration directives that give the server its instructions.
the directives and /usr/share/doc/apache2/README.Debian about Debian specific
hints.
Summary of how the Apache 2 configuration works in Debian:
The Apache 2 web server configuration in Debian is quite different to
upstream's suggested way to configure the web server. This is because Debian's
default Apache2 installation attempts to make adding and removing modules,
virtual hosts, and extra configuration directives as flexible as possible, in
order to make automating the changes and administering the server as easy as
possible.
It is split into several files forming the configuration hierarchy outlined
below, all located in the /etc/apache2/ directory:
/etc/apache2/
|-- apache2.conf
| `-- ports.conf
|-- mods-enabled
| |-- *.load
| `-- *.conf
|-- conf-enabled
| `-- *.conf
`-- sites-enabled
`-- *.conf
* apache2.conf is the main configuration file (this file). It puts the pieces
together by including all remaining configuration files when starting up the
web server.
* ports.conf is always included from the main configuration file. It is
supposed to determine listening ports for incoming connections which can be
customized anytime.
* Configuration files in the mods-enabled/, conf-enabled/ and sites-enabled/
directories contain particular configuration snippets which manage modules,
global configuration fragments, or virtual host configurations,
respectively.
They are activated by symlinking available configuration files from their
respective *-available/ counterparts. These should be managed by using our
helpers a2enmod/a2dismod, a2ensite/a2dissite and a2enconf/a2disconf. See
their respective man pages for detailed information.
* The binary is called apache2. Due to the use of environment variables, in
the default configuration, apache2 needs to be started/stopped with
/etc/init.d/apache2 or apache2ctl. Calling /usr/bin/apache2 directly will not
work with the default configuration.
Global configuration
ServerRoot: The top of the directory tree under which the server's
configuration, error, and log files are kept.
NOTE! If you intend to place this on an NFS (or otherwise network)
mounted filesystem then please read the Mutex documentation (available
you will save yourself a lot of trouble.
Do NOT add a slash at the end of the directory path.
#ServerRoot "/etc/apache2"
The accept serialization lock file MUST BE STORED ON A LOCAL DISK.
Mutex file:${APACHE_LOCK_DIR} default
PidFile: The file in which the server should record its process
identification number when it starts.
This needs to be set in /etc/apache2/envvars
PidFile ${APACHE_PID_FILE}
Timeout: The number of seconds before receives and sends time out.
Timeout 300
KeepAlive: Whether or not to allow persistent connections (more than
one request per connection). Set to "Off" to deactivate.
KeepAlive On
MaxKeepAliveRequests: The maximum number of requests to allow
during a persistent connection. Set to 0 to allow an unlimited amount.
We recommend you leave this number high, for maximum performance.
MaxKeepAliveRequests 100
KeepAliveTimeout: Number of seconds to wait for the next request from the
same client on the same connection.
KeepAliveTimeout 5
These need to be set in /etc/apache2/envvars
User ${APACHE_RUN_USER}
Group ${APACHE_RUN_GROUP}
HostnameLookups: Log the names of clients or just their IP addresses
e.g., www.apache.org (on) or 204.62.129.132 (off).
The default is off because it'd be overall better for the net if people
had to knowingly turn this feature on, since enabling it means that
each client request will result in AT LEAST one lookup request to the
nameserver.
HostnameLookups Off
ErrorLog: The location of the error log file.
If you do not specify an ErrorLog directive within a
container, error messages relating to that virtual host will be
logged here. If you do define an error logfile for a
container, that host's errors will be logged there and not here.
ErrorLog ${APACHE_LOG_DIR}/error.log
LogLevel: Control the severity of messages logged to the error_log.
Available values: trace8, ..., trace1, debug, info, notice, warn,
error, crit, alert, emerg.
It is also possible to configure the log level for particular modules, e.g.
"LogLevel info ssl:warn"
LogLevel warn
Include module configuration:
IncludeOptional mods-enabled/.load
IncludeOptional mods-enabled/ .conf
Include list of ports to listen on
Include ports.conf
Sets the default security model of the Apache2 HTTPD server. It does
not allow access to the root filesystem outside of /usr/share and /var/www.
The former is used by web applications packaged in Debian,
the latter may be used for local directories served by the web server. If
your system is serving content from a sub-directory in /srv you must allow
access here, or in any related virtual host.
Options FollowSymLinks
AllowOverride None
Require all denied
<Directory /usr/share>
AllowOverride None
Require all granted
<Directory /var/www/>
Options Indexes FollowSymLinks
AllowOverride all
Require all granted
#<Directory /srv/>
Options Indexes FollowSymLinks
AllowOverride None
Require all granted
#
AccessFileName: The name of the file to look for in each directory
for additional configuration directives. See also the AllowOverride
directive.
AccessFileName .htaccess
The following lines prevent .htaccess and .htpasswd files from being
viewed by Web clients.
<FilesMatch "^.ht">
Require all denied
The following directives define some format nicknames for use with
a CustomLog directive.
These deviate from the Common Log Format definitions in that they use %O
(the actual bytes sent including headers) instead of %b (the size of the
requested file), because the latter makes it impossible to detect partial
requests.
Note that the use of %{X-Forwarded-For}i instead of %h is not recommended.
Use mod_remoteip instead.
LogFormat "%v:%p %h %l %u %t "%r" %>s %O "%{Referer}i" "%{User-Agent}i"" vhost_combined
LogFormat "%h %l %u %t "%r" %>s %O "%{Referer}i" "%{User-Agent}i"" combined
LogFormat "%h %l %u %t "%r" %>s %O" common
LogFormat "%{Referer}i -> %U" referer
LogFormat "%{User-agent}i" agent
Include of directories ignores editors' and dpkg's backup files,
see README.Debian for details.
Include generic snippets of statements
IncludeOptional conf-enabled/*.conf
Include the virtual host configurations:
IncludeOptional sites-enabled/*.conf
Include PhpMyAdmin
Include /etc/phpmyadmin/apache.conf
vim: syntax=apache ts=4 sw=4 sts=4 sr noet
Please confirm if this is correct @schoen , thanks!
schoen
July 19, 2017, 4:46pm
27
That isnât the correct file for mail.mysite.com .
You should run
grep -r mail.mysite.com /etc/apache2
to find it.
1 Like
I get no output from that command, should I remove that subdomain and just do mydomain.com and www.mydomain.com or what you recommend me to do @schoen
Thanks!
schoen
July 20, 2017, 6:42pm
29
Is the mail subdomain actually hosted on that same server?
hello @schoen
I have updated certificate for domains mysite.com and www.mysite.com and removed mail.mysite.com
Now I have done command > ./certbot-auto renew --force-renewal
And it seems to be working this is output I got:
Saving debug log to /var/log/letsencrypt/letsencrypt.log
Processing /etc/letsencrypt/renewal/mysite.com-0001.conf
Renewing an existing certificate
Performing the following challenges:
tls-sni-01 challenge for mysite.com
tls-sni-01 challenge for www.mysite.com
Waiting for verification...
Cleaning up challenges
new certificate deployed with reload of apache server; fullchain is
/etc/letsencrypt/live/mysite.com-0001/fullchain.pem
Processing /etc/letsencrypt/renewal/mysite.com.conf
Renewing an existing certificate
Performing the following challenges:
tls-sni-01 challenge for www.mysite.com
Waiting for verification...
Cleaning up challenges
new certificate deployed without reload, fullchain is
/etc/letsencrypt/live/mysite.com/fullchain.pem
/etc/letsencrypt/live/mysite.com/fullchain.pem (success)
Is this correct now? Please let me know what you think @schoen and Thanks again!
schoen
July 20, 2017, 11:11pm
31
I don't remember the status of your rate limits, but if you had only a failed renewal just now and your previous problem was the certificates per registered domain rate limit, then you can try again right away.
Just did it @schoen please check previous post that I edit
schoen
July 21, 2017, 1:29am
33
The renewals did appear to succeed, which is great. The one thing to look at is that you do have two different certificates which are both getting renewed, and itâs possible that you donât need both of them. Also, only one of them is configured with an installer that reloads your web server configuration after a successful renewal.
Did you try using the certificates
command to see which certificate youâre really using (or whether youâre really using both of them)?
Yes I think there might be more than one, how I can use certificates command? Can you put me full command? for me to run it? because I tried and I get âcommand not foundâ error thanks!
@schoen how I use the certificates command?
Thanks
schoen
July 21, 2017, 5:58pm
36
Itâs a subcommand of certbot
, like ./certbot-auto certificates
.
Thanks for the reply @schoen
on that command I got the following output:
Found the following certs:
Certificate Name: mydomain.com-0001
Domains: mydomain.com www.mydomain.com
Expiry Date: 2017-10-18 22:05:00+00:00 (VALID: 86 days)
Certificate Path: /etc/letsencrypt/live/mydomain.com-0001/fullchain.pem
Private Key Path: /etc/letsencrypt/live/mydomain.com-0001/privkey.pem
Certificate Name: mydomain.com
Domains: www.mydomain.com
Expiry Date: 2017-10-18 22:05:00+00:00 (VALID: 86 days)
Certificate Path: /etc/letsencrypt/live/mydomain.com/fullchain.pem
Private Key Path: /etc/letsencrypt/live/mydomain.com/privkey.pem
So, for what I understand from this output is that I got 2 certificates one mydomain.com and other one mydomain.com-0001 which seems that you are correct and I need to delete the one ending on 0001, correct me if I am wrong and if so, how I can remove it.
Thanks!
Thanks again!
schoen
July 24, 2017, 4:34pm
38
The -0001 one is actually better at the moment because it covers both mydomain.com and www.mydomain.com , while the non-0001 one only covers www.mydomain.com .
The question of which one to delete also relates to which one you are actually using in web server configuration. You should not delete one that your web server is configured to use, unless youâre prepared to also edit your web server configuration to change which certificate it uses.
Then what command I should use to see which one is on server? But, I am pretty sure that the one is been used is the -0001 because website is setup with www so when you enter on website it goes to https://www.mydomain.com
So, how I can be sure? and once I am how I delete other certificate?
Thanks!
I just checked on SSL Server Test (Powered by Qualys SSL Labs) to see which certificate is been used on server and it seems is 0001 because shows www.mydomain.com and mydomain.com this is the output I got:
Certificate #1: RSA 2048 bits (SHA256withRSA)
Server Key and Certificate #1
Subject mydomain.com
Fingerprint SHA256: 72e1a88a86036f454a402ed6a7e9826c330990ebdfd43c5d78e52e0d7b103173
Pin SHA256: 5hkbX78AsRT6n8IkYoRmxiF2ptuv1y+i2EEWQnokxpY=
Common names mydomain.com
Alternative names mydomain.com www.mydomain.com
Serial Number 033893f9d01b91aa6696a128a86d87af0073
Valid from Thu, 20 Jul 2017 22:05:00 UTC
Valid until Wed, 18 Oct 2017 22:05:00 UTC (expires in 2 months and 24 days)
Key RSA 2048 bits (e 65537)
Weak key (Debian) No
Issuer Let's Encrypt Authority X3
AIA: http://cert.int-x3.letsencrypt.org/
Signature algorithm SHA256withRSA
Extended Validation No
Certificate Transparency No
OCSP Must Staple No
Revocation information OCSP
OCSP: http://ocsp.int-x3.letsencrypt.org
Revocation status Good (not revoked)
DNS CAA No (more info)
Trusted Yes
Additional Certificates (if supplied)
Certificates provided 2 (2486 bytes)
Chain issues None
#2
Subject Let's Encrypt Authority X3
Fingerprint SHA256: 25847d668eb4f04fdd40b12b6b0740c567da7d024308eb6c2c96fe41d9de218d
Pin SHA256: YLh1dUR9y6Kja30RrAn7JKnbQG/uEtLMkBgFF2Fuihg=
Valid until Wed, 17 Mar 2021 16:40:46 UTC (expires in 3 years and 7 months)
Key RSA 2048 bits (e 65537)
Issuer DST Root CA X3
Signature algorithm SHA256withRSA
[Show Certification Paths] Certification Paths
Click here to expand
Configuration
Protocols
TLS 1.3 No
TLS 1.2 Yes
TLS 1.1 Yes
TLS 1.0 Yes
SSL 3 No
SSL 2 No
For TLS 1.3 tests, we currently support draft version 18.
I am correct? how can I remove other one?
Thanks again @schoen