I had my certificate running fine for 3 months. I thought it was going to renew automatically, but it looks it didn’t as it expired.
I made some attempts with command ‘sudo certbot --apache’, ‘sudo certbot --webroot’… but despite of successful results for the command, any try on the web was giving the SEC_ERROR_EXPIRED_CERTIFICATE, serving the old certificate.
I tried remaking it from the scratch, revoking and deleting, but when tried to make a new one I ran with the “too many certificates already issued for exact set of domains” result.
I’m really lost, my server is down for it and seems it will be for 1 week, that’s a disaster for us.
I’m wondering what to do next:
Try to roll back to an insecure version of the site?
Any idea you can give me about rescuing the successfully renewed certificates?
If having the renewed or waiting a week? How to actually set the new one and not getting the expired when browsing?
I ran this command: sudo certbor --apache (and --webroot)
It produced this output: Congratulations! Your certificate and chain have been saved at:
/etc/letsencrypt/live/circusofthings.com-0001/fullchain.pem
Your key file has been saved at:
/etc/letsencrypt/live/circusofthings.com-0001/privkey.pem
Your cert will expire on 2019-01-18. To obtain a new or tweaked
version of this certificate in the future, simply run certbot
again. To non-interactively renew all of your certificates, run
“certbot renew”
My web server is (include version): Tomcat 7
The operating system my web server runs on is (include version): Ubuntu 14.04 64 bits
My hosting provider, if applicable, is: ovh
I can login to a root shell on my machine (yes or no, or I don’t know): yes
I’m using a control panel to manage my site (no, or provide the name and version of the control panel): no
Hi, @Osiris, thanks for replying.
Yes, I’m aware that those are new certificates in the new directories… I had the original and *-0001 and *-0002 from my different attempts while it was not reflected in the web. But none of them was working.
(BTW: Now I wonder if my browser was lying to me with a false cache certificate)
But, when you ask about where my Apache is pointing to ‘fullchain.pem’: I don’t know if you mean my tomcat’s server.xml file. I can say it was pointing a completely different *.pfx file in my keystore param. This is an old self-signed certificate and now I don’t know why it hasn’t been a problem for my let’s encrypt set this last 3 months (¿¿??).
Still I have the same problem: why certbot was giving a success result while not updating the certificate to the visitor?
Depends on how you got to install the certificate in the first place. Now you're talking about Tomcat instead of Apache (the use of the apache plugin suggested the use of Apache, so I assumed Apache was indeed the TLS endpoint of your website).
Did you install the certificate manually? Or did you use certbot for that? If you'd use the apache plugin, certbot would reload Apache automatically and thus "installing" the certificate at the same time. If you have used the webroot previously without an installer plugin, such as apache, certbot would have gotten you the certificate, but you would have to install it manually. And when installing it manually, certbot wouldn't know how to "reinstall" the renewed certificate.
So it really depends on how you installed the certificate in the first place.
Also, now your site is answering plain HTTP on port 443 instead of HTTPS...
Hi @JuergenAuer, thanks for your time.
Yes I revoked and deleted everything as the new certificates weren't working. And, as you point,
certbot certificates
corroborate it.
I have saved the certificate shown in the web error. Would it be enough as a backup?
And why having a correct certificate still is showing the out of date to the visitor?
The certificates and corresponding private keys were fine. The fact they weren't installed properly is the fact they "weren't working".
A certificate without its private key is useless.
Because "issuing" and "installing" are two different things. You can get a thousand or even millions of perfectly working certificates, if your software doesn't get it, the visitor doesn't get it.
To get the certificate or to install the certificate too?
Not 100% sure of my memory, but I'm sure I used it to "install" too
On the other hand, I see in my /etc/letsencrypt/archive/circusofthings.com-0001/
directory that I still have this files: cert1.pem chain1.pem fullchain1.pem privkey1.pem
May it help to set it again?
You are right it was confusing with my reference to Apache above.
I was trying to show you my server.xml… but for some reason I can’t.
Anyway, I’ll will try to reset it as before and point to this files like you suggested but in Tomcat. I’ll tell you when I’m done
Yes @Osiris, it is. I assumed it was made by certbot, but I did manually.
I don’t have success yet, but I think I’m closer.
I removed my old entry from my keystore:
I assume you have configured your server.xml to use the pfx file and the keystore is configured as keystoreType="PKCS12", also, the above HERETHEPASSWORD should be the same password you have configured in your server.xml conf file keystorePass="HERETHEPASSWORD"
Of course, you must reload/restart tomcat to refresh the cert in use.
@sahsanu, my friend, I have another question:
where is the button here to invite you some beers?!
That was it… you made my day. Thank you
@ JuergenAuer and @Osiris are also invited