Please fill out the fields below so we can help you better. Note: you must provide your domain name to get help. Domain names for issued certificates are all made public in Certificate Transparency logs (e.g. crt.sh | example.com), so withholding your domain name here does not increase secrecy, but only makes it harder for us to provide help.
My domain is: campus.apafiq.org
I ran this command: echo | openssl s_client -connect campus.apafiq.org:443
It produced this output:
Connecting to 149.50.149.35
CONNECTED(00000003)
depth=0 CN=campus.apafiq.org
verify error:num=20:unable to get local issuer certificate
verify return:1
depth=0 CN=campus.apafiq.org
verify error:num=21:unable to verify the first certificate
verify return:1
depth=0 CN=campus.apafiq.org
verify return:1
---
Certificate chain
0 s:CN=campus.apafiq.org
i:C=US, O=Let's Encrypt, CN=R11
a:PKEY: rsaEncryption, 4096 (bit); sigalg: RSA-SHA256
v:NotBefore: May 28 22:37:12 2025 GMT; NotAfter: Aug 26 22:37:11 2025 GMT
1 s:C=US, O=Let's Encrypt, CN=R10
i:C=US, O=Internet Security Research Group, CN=ISRG Root X1
a:PKEY: rsaEncryption, 2048 (bit); sigalg: RSA-SHA256
v:NotBefore: Mar 13 00:00:00 2024 GMT; NotAfter: Mar 12 23:59:59 2027 GMT
---
Server certificate
-----BEGIN CERTIFICATE-----
MIIF/jCCBOagAwIBAgISBm6iM8D9jQTBRAig6vx1oOgJMA0GCSqGSIb3DQEBCwUA
MDMxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MQwwCgYDVQQD
EwNSMTEwHhcNMjUwNTI4MjIzNzEyWhcNMjUwODI2MjIzNzExWjAcMRowGAYDVQQD
ExFjYW1wdXMuYXBhZmlxLm9yZzCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoC
ggIBALUOROZl7t+xt7njFGVR8U5PPZWnZUbP2zAmo2G/c3GvrFkAnqmKY6lroDJB
qBS8YsqhHSC2A1bk4QvjW3ch55+vGa/iEOvN9ftpo39o90/1qc5iYSIkIe7gHqy5
+PRXtJD/g3eSYz+9vN2F5dcaMFHxJHyWR07HgltO5FtmyFDgqdoU2Sitrz6nz18l
8qsZs5I+ahNutfsOfu6aqTM8jYaaS0y9Lcw84FEQWfcUgJup3s2A6SBW5qzoJsJF
IiKO94XZUUYGpElfhghd64Xw96DVGF4yHJZ50qsUR9mtk9D9APKQlH/BINfwsHIM
6OEhWo9pGG5B8QgLOKrJcoZt3j5yzpTRZaKRD0dXIqY5wWhQsJxxq9yq0s+clj1q
FYPVQkljnrSPNPgkS6kBJk82ZcIAkfBCOIFup1fUnBtgIXy/6SV+ieyvUa+0HwTH
SO8fbFAqdtELCSXxJKOwdwhzfY/4UksSGoLPpeOQ0iQHEEU4PF0Q6mKJX8PwGpck
B/naEPa5ZGvP0h3YD3zss5zDY9/BJniW7e+86s3gqjRA4uBzOgTO6x+4gYyl0sAF
nzZu+OnxPu+wuiWFfTy2Urv/oTBdD8hVwkqnAckQtKcplAW1CXtk0BdvpoYYZW8P
hCJLgde5LOCLzeduajCMnX6q0fJfxn5LbEPz5vm7dzI7Hg5FAgMBAAGjggIhMIIC
HTAOBgNVHQ8BAf8EBAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMC
MAwGA1UdEwEB/wQCMAAwHQYDVR0OBBYEFBYdgZeh73Zdh77p9NpUtvIMyeJbMB8G
A1UdIwQYMBaAFMXPRqTq9MPAemyVxC2wXpIvJuO5MDMGCCsGAQUFBwEBBCcwJTAj
BggrBgEFBQcwAoYXaHR0cDovL3IxMS5pLmxlbmNyLm9yZy8wHAYDVR0RBBUwE4IR
Y2FtcHVzLmFwYWZpcS5vcmcwEwYDVR0gBAwwCjAIBgZngQwBAgEwLgYDVR0fBCcw
JTAjoCGgH4YdaHR0cDovL3IxMS5jLmxlbmNyLm9yZy8xMC5jcmwwggEEBgorBgEE
AdZ5AgQCBIH1BIHyAPAAdgAS8U40vVNyTIQGGcOPP3oT+Oe1YoeInG0wBYTr5YYm
OgAAAZcZQG3+AAAEAwBHMEUCIEbAnItCud1ttRFJeUV7jZhoATmu+1p30tTN7hwm
9wz+AiEAwtlvJ2SXa+f9dJVCc7q8SM/yjNgl6diBnURU5TqrAC0AdgDtPEvW6AbC
pKIAV9vLJOI4Ad9RL+3EhsVwDyDdtz4/4AAAAZcZQHW7AAAEAwBHMEUCIQCXMuHh
uaIJQHwTQw9orqMNDsAurOrXLDsHP1XR1LItOQIgGqXP4tUkRfH/QB6nuFRZFQIu
2bptZmNrCu8WUVOWOUwwDQYJKoZIhvcNAQELBQADggEBAFWRPdRjF9z296vlz++h
js7W768OkdANnztfyeO9tYKq0SsLM1IWemISniMZ8AevI2ZDgbaGNt3rPUAqbZdT
8XVWD1vwgyDA7qOhhrihjQHXbsTOAtEJeXBY8fcrpnJsp8DuhQRAJ4YdySCyLUAM
HAGSgwubbOk9m+KZhuXXKfNAW/jPO+NRojLSB+iqW+VC/+auHAsH5JBNh8lwE3UT
FElTCmL+kcSu566g1fLvHJnv6mAd0mebBNHaQE+gqhvIQSxzSBl6T4ZKNvXPEBro
P/zyMGp7LatHPpsPfjKIIk59GbR8Me9tstEp/kDpebKWhjnhmzms1eq99ckU470h
ty0=
-----END CERTIFICATE-----
subject=CN=campus.apafiq.org
issuer=C=US, O=Let's Encrypt, CN=R11
---
No client certificate CA names sent
Peer signing digest: SHA256
Peer signature type: RSA-PSS
Server Temp Key: X25519, 253 bits
---
SSL handshake has read 3648 bytes and written 417 bytes
Verification error: unable to verify the first certificate
---
New, TLSv1.3, Cipher is TLS_AES_256_GCM_SHA384
Protocol: TLSv1.3
Server public key is 4096 bit
This TLS version forbids renegotiation.
Compression: NONE
Expansion: NONE
No ALPN negotiated
Early data was not sent
Verify return code: 21 (unable to verify the first certificate)
---
DONE
My web server is (include version): httpd-2.4.62-1 (custom fork)
The operating system my web server runs on is (include version):
AlmaLinux 8x
My hosting provider, if applicable, is: ---
I can login to a root shell on my machine (yes or no, or I don't know):
Yes
I'm using a control panel to manage my site (no, or provide the name and version of the control panel):
Provider's control panel
The version of my client is (e.g. output of certbot --version
or certbot-auto --version
if you're using Certbot): ---
Hi everyone, hope you're all doing well.
I having this situation where a server is presenting an incomplete chain when certs are issued by R11, but no errors when the issuer is R10.
For what I could gather it is the server who is at fault, not a Letsencrypt problem, but this is a VPS and the provider has not been helpful... since the site loads on most browsers it seems to be good enough for them.
But I do want to fix it and also learn how to do it.
So, to the point, this is actually a subdomain I am hosting, it has a proprietary control panel with a LE function that is not working in this case (I assume due to the main domain hosted elsewere) and thus I am using sslfree.io
to manually generate the cerificate.
The one I got was issued by R11 and when browsed the cert chain is incomplete.
My very little knowledge on this makes me think the server is missing some R11 cert in it's vault.
Could it be so? And could someone explain to me how should I import it?
PS: In the past, with this same VPS I had the same issue when I created a couple of new sites, but I worked around that by deleting and recreating them and the certs where re-issued by R10 instead of R11 (the accounts were still empty so it was an option).
Thanks in advance!