Ssl server connection error

Hlo i had taken ssl certificate by let Encrypt my problem is sometime my website showing : Server connection error.
I checked my hosting site also can find the problem and fix it ,help please.
Any problem with ssl certificate or any another problem.
Plzzzz tell me .
Thank you
I

Hello @Ash, welcome to the Let's Encrypt community. :slightly_smiling_face:

When you opened this thread in the Help section, you should have been provided with a questionnaire. Maybe you didn't get it somehow (which is weird), or you've decided to delete it. In any case, all the answers to this questionnaire are required:

Please fill out the fields below so we can help you better. Note: you must provide your domain name to get help. Domain names for issued certificates are all made public in Certificate Transparency logs (e.g. https://crt.sh/?q=example.com), so withholding your domain name here does not increase secrecy, but only makes it harder for us to provide help.

My domain is:

I ran this command:

It produced this output:

My web server is (include version):

The operating system my web server runs on is (include version):

My hosting provider, if applicable, is:

I can login to a root shell on my machine (yes or no, or I don't know):

I'm using a control panel to manage my site (no, or provide the name and version of the control panel):

The version of my client is (e.g. output of certbot --version or certbot-auto --version if you're using Certbot):

Thank you for assisting us in helping YOU!

4 Likes

Hi
Thank you for you time.
My DOMAIN is nearmemenu.whf.bz
Hosting be googiehost
Yes i can open my cplane
I don't know the version of my cplane
My problem is when i try to open my site showing err_time_out .
If any questions are things ask me

Thank you

Here https://www.whynopadlock.com/results/d03aeac6-1c29-41af-acbb-6eebacd6d596 is showing
"The Mixed content tests failed."

And here shows DNSSEC Errors nearmemenu.whf.bz | DNSViz

Edit

openssl s_client -showcerts -servername nearmemenu.whf.bz -connect nearmemenu.whf.bz:443 < /dev/null

$ openssl s_client -showcerts -servername nearmemenu.whf.bz -connect nearmemenu.whf.bz:443 < /dev/null
CONNECTED(00000003)
depth=2 C = US, O = Internet Security Research Group, CN = ISRG Root X1
verify return:1
depth=1 C = US, O = Let's Encrypt, CN = E5
verify return:1
depth=0 CN = nearmemenu.whf.bz
verify return:1

Certificate chain
0 s:CN = nearmemenu.whf.bz
i:C = US, O = Let's Encrypt, CN = E5
a:PKEY: id-ecPublicKey, 384 (bit); sigalg: ecdsa-with-SHA384
v:NotBefore: Feb 7 02:10:42 2025 GMT; NotAfter: May 8 02:10:41 2025 GMT
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
1 s:C = US, O = Let's Encrypt, CN = E5
i:C = US, O = Internet Security Research Group, CN = ISRG Root X1
a:PKEY: id-ecPublicKey, 384 (bit); sigalg: RSA-SHA256
v:NotBefore: Mar 13 00:00:00 2024 GMT; NotAfter: Mar 12 23:59:59 2027 GMT
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----

Server certificate
subject=CN = nearmemenu.whf.bz
issuer=C = US, O = Let's Encrypt, CN = E5

No client certificate CA names sent
Peer signing digest: SHA384
Peer signature type: ECDSA
Server Temp Key: X25519, 253 bits

SSL handshake has read 2410 bytes and written 399 bytes
Verification: OK

New, TLSv1.3, Cipher is TLS_AES_256_GCM_SHA384
Server public key is 384 bit
Secure Renegotiation IS NOT supported
Compression: NONE
Expansion: NONE
No ALPN negotiated
Early data was not sent
Verify return code: 0 (ok)

DONE

And that certificate decodes to a wildcard certificate

I am noticing intermittent connection issues to your site from my Porland, OR, USA area location.

3 Likes

Hi Thank you for you time

I tested again all tests is pass .I will attachthe screenshot.


That i my not understanding all is seeing ok but Where is the problem?.can you tell plz .

Thank you so much

Looks good; this is a capture of what I had previously seen

2 Likes

I not understanding is what is mixed content, can you tell plzz .
But why my site going down, showing err_time_out .
Thank you

This explanation should answer that.

This is probably not the place to find help with that. We assist with Let's Encrypt certificate issuance here. This not a general hosting or networking support forum.

4 Likes

Hi ,thank from information.
But how fix it ,this mixed content showing in ssl then what to do ,can changing SSL the mixed content can be fixed. Or not .
Are any plugins to fix it .
Thank you

That is a question better suited for a web developer support forum. The short answer is to stop hard-coding the scheme (http:) in your resources.

This site below may help you.

https://www.whynopadlock.com/

2 Likes

Thank you so much ,In this url showing all correct, anyway thank you

2 Likes