I ran this command: Checking SSL certificate via online checkers, or just hitting "https://blocks.telos.kitchen"
It produced this output: “The certificate is no signed by a trusted authority”
My web server is (include version): Apache latest
The operating system my web server runs on is (include version): Centos 7
My hosting provider, if applicable, is: Dedicated server
I can login to a root shell on my machine (yes or no, or I don’t know): YES
I’m using a control panel to manage my site (no, or provide the name and version of the control panel): NO
The version of my client is (e.g. output of certbot --version or certbot-auto --version if you’re using Certbot): certbot 0.35.1
I am also using Virtual Hosts like this:
<VirtualHost *:443>
ServerName blocks.telos.kitchen
ServerAlias blocks.telos.kitchen
DocumentRoot /var/www/blocks.telos.kitchen/html
SSLEngine on
ErrorLog /var/www/blocks.telos.kitchen/log/error.log
CustomLog /var/www/blocks.telos.kitchen/log/requests.log combined
Include /etc/letsencrypt/options-ssl-apache.conf
SSLCertificateFile /etc/letsencrypt/live/blocks.telos.kitchen/cert.pem
SSLCertificateKeyFile /etc/letsencrypt/live/blocks.telos.kitchen/privkey.pem
SSLCertificateChainFile /etc/letsencrypt/live/blocks.telos.kitchen/chain.pem
</VirtualHost>
</IfModule>```
I followed this instructions. I also tried haproxy, but then reversed that because it didn't help. I'd like to add it once SSL is working.
https://serversforhackers.com/c/letsencrypt-with-haproxy
Thank you!!
M
Thank you for the instruction. I removed ServerAlias since it was a duplicate of ServerName, then I restarted apache. I checked the results again and they were the same (still untrusted).
I ran a grep to make sure I removed all duplicates:
Finally, this server will primarily be an API server and I hope to put haproxy on to manage traffic. Will that make a difference or is the first step to get the cert working through apache?
Here is the haproxy.cfg file that I think I will need to use (although haproxy is not running currently).
frontend
bind *:80
# This is our new config that listens on port 443 for SSL connections
bind *:443 ssl crt /etc/ssl/blocks.telos.kitchen/blocks.telos.kitchen.pem
# Test URI to see if its a letsencrypt request
acl letsencrypt-acl path_beg /.well-known/acme-challenge/
use_backend letsencrypt-backend if letsencrypt-acl
default_backend backend-web
# LE Backend
backend letsencrypt-backend
server letsencrypt 127.0.0.1:7777
# Normal (default) Backend
# for web servers
backend backend-web
server self 127.0.0.1:u6e80