Please fill out the fields below so we can help you better. Note: you must provide your domain name to get help. Domain names for issued certificates are all made public in Certificate Transparency logs (e.g. crt.sh | example.com), so withholding your domain name here does not increase secrecy, but only makes it harder for us to provide help.
My domain is: hork.com
I ran this command: certbot
It produced this output: certificates successfully renewd
My web server is (include version): apache httpd-2.4.54
The operating system my web server runs on is (include version): Fedora-35
My hosting provider, if applicable, is: self
I can login to a root shell on my machine (yes or no, or I don't know): yes
I'm using a control panel to manage my site (no, or provide the name and version of the control panel): no
The version of my client is (e.g. output of certbot --version
or certbot-auto --version
if you're using Certbot): certbot-2.9.0-1.fc38
No immediate help needed here, as this is more of a "head-up" than a help request, but your insightful comments are always welcome. My web server renewed its certificates last night. That went fine, as usual. It is a multi step process here: 1) stop the watch-dog; 2) lower the firewall; 3) renew (2) certs using certbot; 4) raise the firewall; 5) start the watch dog. The whole process takes just 20 seconds, most of which is due to a sleep between the first and second cert renewal. The renewal is scheduled for regular intervals of course, but take place at a randomize time. I was surprised therefore that my sites came under significant attack, while the firewall was down. That looked like this:
23.178.112.215 22:35:03 GET /.well-known/acme-challenge/onyD_7WiZSSEtuXNAKDkMEnKUXPOZEqEjBNvYr_xw74
23.178.112.213 22:35:03 GET /.well-known/acme-challenge/-OiooQfuIXl_MkBEcgPzmmEOoouH3TJpVny-bU8Bo8g
18.218.84.24 22:35:03 GET /.well-known/acme-challenge/-OiooQfuIXl_MkBEcgPzmmEOoouH3TJpVny-bU8Bo8g
54.186.249.114 22:35:03 GET /.well-known/acme-challenge/onyD_7WiZSSEtuXNAKDkMEnKUXPOZEqEjBNvYr_xw74
44.244.43.197 22:35:03 GET /.well-known/acme-challenge/-OiooQfuIXl_MkBEcgPzmmEOoouH3TJpVny-bU8Bo8g
13.60.19.125 22:35:03 GET /.well-known/acme-challenge/onyD_7WiZSSEtuXNAKDkMEnKUXPOZEqEjBNvYr_xw74
13.212.61.241 22:35:03 GET /.well-known/acme-challenge/-OiooQfuIXl_MkBEcgPzmmEOoouH3TJpVny-bU8Bo8g
13.212.61.241 22:35:04 GET /.well-known/acme-challenge/onyD_7WiZSSEtuXNAKDkMEnKUXPOZEqEjBNvYr_xw74
3.15.185.168 22:35:04 GET /.well-known/acme-challenge/-OiooQfuIXl_MkBEcgPzmmEOoouH3TJpVny-bU8Bo8g
13.215.227.184 22:35:04 GET /.well-known/acme-challenge/-OiooQfuIXl_MkBEcgPzmmEOoouH3TJpVny-bU8Bo8g
23.178.112.107 22:35:16 GET /.well-known/acme-challenge/G8rKUTe0Xz-hMWJ3PQPZAIRBvBeIcHpnZIerY_78zSY
18.219.223.145 22:35:16 GET /.well-known/acme-challenge/G8rKUTe0Xz-hMWJ3PQPZAIRBvBeIcHpnZIerY_78zSY
44.244.43.197 22:35:16 GET /.well-known/acme-challenge/G8rKUTe0Xz-hMWJ3PQPZAIRBvBeIcHpnZIerY_78zSY
16.16.75.149 22:35:16 GET /.well-known/acme-challenge/G8rKUTe0Xz-hMWJ3PQPZAIRBvBeIcHpnZIerY_78zSY
13.215.227.184 22:35:17 GET /.well-known/acme-challenge/G8rKUTe0Xz-hMWJ3PQPZAIRBvBeIcHpnZIerY_78zSY
138.68.86.32 22:35:17 "\x16\x03\x01"
23.178.112.107 22:35:17 GET /.well-known/acme-challenge/oPYN87nuyLL90g3NPxnukDhjiOdTTsuHMMbAW9Kvtlw
142.93.0.66 22:35:17 "\x16\x03\x01"
138.197.191.87 22:35:17 GET /
142.93.0.66 22:35:17 GET /
165.227.84.14 22:35:17 GET /
142.93.0.66 22:35:17 GET /
138.68.86.32 22:35:17 GET /
142.93.0.66 22:35:17 GET /actuator/env
142.93.0.66 22:35:17 GET /server
142.93.0.66 22:35:17 GET /.vscode/sftp.json
142.93.0.66 22:35:17 GET /about
138.68.86.32 22:35:17 GET /
142.93.0.66 22:35:17 GET /debug/default/view?panel=config
142.93.0.66 22:35:18 GET /v2/_catalog
142.93.0.66 22:35:18 GET /ecp/Current/exporttool/microsoft.exchange.ediscovery.exporttool.application
142.93.0.66 22:35:18 GET /server-status
138.68.86.32 22:35:18 GET /actuator/env
142.93.0.66 22:35:18 GET /login.action
142.93.0.66 22:35:18 GET /_all_dbs
142.93.0.66 22:35:18 GET /.DS_Store
165.227.84.14 22:35:18 GET /
142.93.0.66 22:35:18 GET /.env
44.244.43.197 22:35:18 GET /.well-known/acme-challenge/oPYN87nuyLL90g3NPxnukDhjiOdTTsuHMMbAW9Kvtlw
142.93.0.66 22:35:18 GET /.git/config
165.227.84.14 22:35:18 GET /actuator/env
51.20.133.182 22:35:18 GET /.well-known/acme-challenge/oPYN87nuyLL90g3NPxnukDhjiOdTTsuHMMbAW9Kvtlw
138.68.86.32 22:35:18 GET /server
142.93.0.66 22:35:18 GET /s/6353e2335323e2434313e23373/_/;/META-INF/maven/com.atlassian.jira/jira-webapp-dist/pom.properties
165.227.84.14 22:35:18 GET /server
142.93.0.66 22:35:18 GET /config.json
142.93.0.66 22:35:18 GET /telescope/requests
165.227.84.14 22:35:18 GET /.vscode/sftp.json
142.93.0.66 22:35:18 GET /info.php
142.93.0.66 22:35:18 GET /?rest_route=/wp/v2/users/
13.215.227.184 22:35:18 GET /.well-known/acme-challenge/oPYN87nuyLL90g3NPxnukDhjiOdTTsuHMMbAW9Kvtlw
165.227.84.14 22:35:18 GET /about
138.68.86.32 22:35:18 GET /.vscode/sftp.json
165.227.84.14 22:35:18 GET /debug/default/view?panel=config
165.227.84.14 22:35:19 GET /v2/_catalog
18.219.223.145 22:35:19 GET /.well-known/acme-challenge/oPYN87nuyLL90g3NPxnukDhjiOdTTsuHMMbAW9Kvtlw
138.68.86.32 22:35:19 GET /about
165.227.84.14 22:35:19 GET /ecp/Current/exporttool/microsoft.exchange.ediscovery.exporttool.application
165.227.84.14 22:35:19 GET /server-status
138.68.86.32 22:35:19 GET /debug/default/view?panel=config
165.227.84.14 22:35:19 GET /login.action
165.227.84.14 22:35:19 GET /_all_dbs
165.227.84.14 22:35:19 GET /.DS_Store
165.227.84.14 22:35:19 GET /.env
138.68.86.32 22:35:19 GET /v2/_catalog
165.227.84.14 22:35:19 GET /.git/config
165.227.84.14 22:35:19 GET /s/6353e2335323e2434313e23373/_/;/META-INF/maven/com.atlassian.jira/jira-webapp-dist/pom.properties
138.68.86.32 22:35:19 GET /ecp/Current/exporttool/microsoft.exchange.ediscovery.exporttool.application
165.227.84.14 22:35:20 GET /config.json
165.227.84.14 22:35:20 GET /telescope/requests
138.68.86.32 22:35:20 GET /server-status
165.227.84.14 22:35:20 GET /info.php
165.227.84.14 22:35:20 GET /?rest_route=/wp/v2/users/
138.68.86.32 22:35:20 GET /server-status
165.227.84.14 22:35:20 GET /info.php
165.227.84.14 22:35:20 GET /?rest_route=/wp/v2/users/
138.197.191.87 22:35:20 GET /
138.68.86.32 22:35:20 GET /login.action
138.197.191.87 22:35:20 GET /actuator/env
138.68.86.32 22:35:20 GET /_all_dbs
138.68.86.32 22:35:21 GET /.DS_Store
138.197.191.87 22:35:21 GET /server
138.68.86.32 22:35:21 GET /.env
138.68.86.32 22:35:21 GET /.git/config
138.197.191.87 22:35:21 GET /.vscode/sftp.json
138.68.86.32 22:35:21 GET /s/6353e2335323e2434313e23373/_/;/META-INF/maven/com.atlassian.jira/jira-webapp-dist/pom.properties
138.197.191.87 22:35:22 GET /about
138.68.86.32 22:35:22 GET /config.json
138.68.86.32 22:35:22 GET /telescope/requests
138.197.191.87 22:35:22 GET /debug/default/view?panel=config
I'm sure you recognize the site verification polls from the hacking attempts. All is fine, as I keep a clean site. The "attacks" came from just 4 net nodes, all owned by the same entity:
138.197.191.87 DIGITALOCEAN-138-197-0-0, DigitalOcean
138.68.86.32 DIGITALOCEAN-138-68-0-0, DigitalOcean
142.93.0.66 DIGITALOCEAN-142-93-0-0, DigitalOcean
165.227.84.14 DIGITALOCEAN-165-227-0-0, DigitalOcean
Makes me wonder who or what "tipped the attacker off" that my firewall would be down. Yes, it continued on for a little while after the firewall went back up and those net nodes were once again blocked (+3, +6, +0, +3), but only for a few more seconds. Yes, blocking (ipset) offensive net nodes and networks is my main line of defense. My watch dog does so automatically by looking for attack patterns and writing new rules as necessary. Of course the multi-point verification, required by ISRG makes it necessary that I lower my firewall, as, unfortunately, criminals can rent resources at Amazon, just like the Good Guys can.
I am contemplating taking the "sleep" out of the process, to reduce the time further, and to keep an alternate ipset to block during certificate renewal. I think you can guess, who will be on that "sh1t list". Not a real problem here that can be fixed (yes, there is DNS verification), but your thoughts and tokens of sympathy are always appreciated.