Please fill out the fields below so we can help you better. Note: you must provide your domain name to get help. Domain names for issued certificates are all made public in Certificate Transparency logs (e.g. https://crt.sh/?q=example.com), so withholding your domain name here does not increase secrecy, but only makes it harder for us to provide help.
My domain is: somedomain.com
I ran this command: 40 23 * * * /usr/bin/certbot renew
It produced this output: detected that the server is redirecting the request for this address in a way that will never complete
My web server is (include version): httpd-2.4.6-97.el7.centos.x86_64
The operating system my web server runs on is (include version): CentOS 7 VM hosted VPS
My hosting provider, if applicable, is: Digital Pacific
I can login to a root shell on my machine (yes or no, or I don't know): yes
I'm using a control panel to manage my site (no, or provide the name and version of the control panel): never
The version of my client is (e.g. output of certbot --version
or certbot-auto --version
if you're using Certbot): certbot 1.11.0
The following has been in place since 2023:
## http conf file created 2023
#
## warranty.somedomain.com
#
<VirtualHost *:80>
ServerAdmin webmaster@somedomain.com
DocumentRoot /u/www/warranty.somedomain.com
ServerAlias warranty.somedomain.com
ServerName warranty.somedomain.com
# Redirect / https://warranty.somedomain.com
ErrorLog /var/log/httpd/somedomain-error.log
CustomLog /var/log/httpd/somedomain-access.log combined
RewriteEngine on
RewriteCond %{SERVER_NAME} =warranty.somedomain.com
RewriteRule ^ https://%{SERVER_NAME}%{REQUEST_URI} [END,NE,R=permanent]
</VirtualHost>
## https generated by letsencrypt in 2023
<IfModule mod_ssl.c>
<VirtualHost *:443>
ServerAdmin webmaster@somedomain.com
DocumentRoot /u/www/warranty.somedomain.com
ServerAlias warranty.somedomain.com
ServerName warranty.somedomain.com
# Redirect / https://warranty.somedomain.com
ErrorLog /var/log/httpd/somedomain-error.log
CustomLog /var/log/httpd/somedomain-access.log combined
SSLCertificateFile /etc/letsencrypt/live/warranty.somedomain.com/cert.pem
SSLCertificateKeyFile /etc/letsencrypt/live/warranty.somedomain.com/privkey.pem
Include /etc/letsencrypt/options-ssl-apache.conf
SSLCertificateChainFile /etc/letsencrypt/live/warranty.somedomain.com/chain.pem
</VirtualHost>
</IfModule>
and runs a PHP Cake based web setup that has not changed in over 100 days.
No other changes have been made under /u/www website directories.
**certbot certificates** command line output:
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Found the following certs:
Certificate Name: beta.somedomain.com
Serial Number: XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
Key Type: RSA
Domains: beta.somedomain.com
Expiry Date: 2025-10-28 12:47:03+00:00 (VALID: 86 days)
Certificate Path: /etc/letsencrypt/live/beta.somedomain.com/fullchain.pem
Private Key Path: /etc/letsencrypt/live/beta.somedomain.com/privkey.pem
Certificate Name: dev.somedomain.com
Serial Number: XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
Key Type: RSA
Domains: dev.somedomain.com
Expiry Date: 2025-10-29 12:43:45+00:00 (VALID: 87 days)
Certificate Path: /etc/letsencrypt/live/dev.somedomain.com/fullchain.pem
Private Key Path: /etc/letsencrypt/live/dev.somedomain.com/privkey.pem
Certificate Name: somedomain.com
Serial Number: XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
Key Type: RSA
Domains: somedomain.com
Expiry Date: 2025-09-21 12:43:53+00:00 (VALID: 49 days)
Certificate Path: /etc/letsencrypt/live/somedomain.com/fullchain.pem
Private Key Path: /etc/letsencrypt/live/somedomain.com/privkey.pem
Certificate Name: presentation.somedomain.com
Serial Number: XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
Key Type: RSA
Domains: presentation.somedomain.com
Expiry Date: 2025-10-30 12:48:28+00:00 (VALID: 88 days)
Certificate Path: /etc/letsencrypt/live/presentation.somedomain.com/fullchain.pem
Private Key Path: /etc/letsencrypt/live/presentation.somedomain.com/privkey.pem
Certificate Name: warranty.somedomain.com
Serial Number: XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
Key Type: RSA
Domains: warranty.somedomain.com
Expiry Date: 2025-10-30 14:10:20+00:00 (VALID: 88 days)
Certificate Path: /etc/letsencrypt/live/warranty.somedomain.com/fullchain.pem
Private Key Path: /etc/letsencrypt/live/warranty.somedomain.com/privkey.pem
dev and presentation work as expected, warranty and beta give redirection issues with the exact same syntax from 2023.
.htaccess file under all sites:
php_value memory_limit 3200M
<IfModule mod_rewrite.c>
RewriteEngine on
RewriteRule (.*) app/webroot/$1 [L]
Options -Multiviews
After /usr/bin/certbot renew ran via cron overnight on Thursday evening, all website traffic for warranty and beta result in web browers reporting errors like "detected that the server is redirecting the request for this address in a way that will never complete"
I have tried all matter of suppression of redirects in the .conf files but all result in either not working at all or giving the same redirect issues. /var/log/httpd error files just show the same php warning messages but in the warranty and beta these messages repeat over and over so is just reporting as if multiple access to the site are being made..... like a loop from a redirect repeating.
I saw some info on-line about Cloudflare or something and will be checking if this is the fix with the VM provider on Monday.