Too many certificates (5) already issued for this exact set of domains in the last 168 hours

My domain is: live.redtaxi[.]cab

When I was trying to solve Nodejs issue with new Letsencrypt root certificate expiring
"ISRG Root X1"

And when I found the solution, we faced the block from you.

So please kindly unblock the domain because we can't wait for 7 days and we can't change the sub-domain we have because we have a mobile app connected to the server through it.

we are looking for your support.
Regards

1 Like

Hi @saleh welcome to the LE community forum :slight_smile:

That is NOT possible,
There is a test/staging environment explicitly setup for exactly what you were doing.

At this point you can either:
[arranged in what I feel is the simplest to most complicated solution]

  • find and use any of those 5 issued certs
  • use an alternate (free) CA that also supports ACME protocol
  • add/remove an FQDN from the cert
  • wait until there have been <5 issued certs within the previous 168 hours
  • change the name of the site

The real question is where did all those certs go?
Where is the last one that was issued?
[as finding any one of those would be the simplest solution of all]

2 Likes

Hi, @rg305 thank you for your support,
Dear I have the last one and it's valid but I need to solve the issue ```
sudo certbot certonly --nginx -d --preferred-chain "ISRG Root X1"
sudo service nginx restart

because our Nodejs app suddenly stop and when we catch the issue that of Letsencrypt update on the 30th of September 

https://letsencrypt.org/docs/dst-root-ca-x3-expiration-september-2021

So it is not fair to ban our domain in this case because we have a certificate problem

Other than that, you can also search on google and see how many people have been affected by this issue since September 30th

Kindly if possible to unblock our domain to resolve the issue
Regards
1 Like

What version of certbot are you using?
certbot --version

1 Like

hi @rg305

certbot 1.20.0

1 Like

@rg305

this image may help to clarify our issue

1 Like

OK but you have access to a valid LE cert.
Let me confirm...
Oh dear!
You have bigger problems:

The site serves this chain now:

openssl s_client -connect live.redtaxi.cab:443 -servername live.redtaxi.cab | head
depth=2 C = US, O = Internet Security Research Group, CN = ISRG Root X1
verify return:1
depth=1 C = US, O = Let's Encrypt, CN = R3
verify return:1
depth=0 CN = live.redtaxi.cab
verify return:1
CONNECTED(00000005)
---
Certificate chain
 0 s:CN = live.redtaxi.cab
   i:C = US, O = Let's Encrypt, CN = R3
 1 s:C = US, O = Let's Encrypt, CN = R3
   i:C = US, O = Internet Security Research Group, CN = ISRG Root X1
 2 s:C = US, O = Internet Security Research Group, CN = ISRG Root X1
   i:O = Digital Signature Trust Co., CN = DST Root CA X3
---

All you need to do (for now) is to remove the last cert form the chain.pem or fullchain.pem file in use.

1 Like

thank you @rg305
just remove it without replacing it with another one?

1 Like

The chain will have three certs in it - remove the last one.
Leaving only two certs in it.

The cert is valid:

1 Like

@rg305

i see expired root still showing

I repeat myself:
Remove the last cert from the chain.pem file or the fullchain.pem file (whichever you are using).
Then restart the web server.
Then we can check it again.

2 Likes

If you edit your fullchain.pem file you will see it is a text file with multiple certificate entries. You can paste the last one into Certificate Decoder - Decode certificates to view their contents and that should confirm it is ISRG Root X1 issued by DST Root CA X3. If you then remove that entry from the file your chain will be [Your Cert] > R3 (Issued by ISRG Root X1), then clients will resolve this to the shorter (modern) chain. You may need to restart nginx.

2 Likes

hi @rg305

thank you, it's done but still the issue.

kindly if you can check

regards

2 Likes

hi @webprofusion

thank you very much for your support, I'm did it but the issue still showing and this is the result:
image

1 Like

Your certificate looks good and is using the modern chain. This chain is not compatible with old versions of Android which don't know about the ISRG Root X1 certificate.

If you need a mix of support for old and new devices I would suggest changing certificate authority but you would need to test whichever alternative you choose (ZeroSSL, BuyPass Go etc) with the client devices.

@webprofusion

dear, could you let me know if there is a paid cert that I can use to solve this issue,
I think it's better than a free one right because Letsencrypt make a big problem and I think we should change it forever

openssl s_client -connect live.redtaxi.cab:443 -servername live.redtaxi.cab | head
depth=2 C = US, O = Internet Security Research Group, CN = ISRG Root X1
verify return:1
depth=1 C = US, O = Let's Encrypt, CN = R3
verify return:1
depth=0 CN = live.redtaxi.cab
verify return:1
CONNECTED(00000005)
---
Certificate chain
 0 s:CN = live.redtaxi.cab
   i:C = US, O = Let's Encrypt, CN = R3
 1 s:C = US, O = Let's Encrypt, CN = R3
   i:C = US, O = Internet Security Research Group, CN = ISRG Root X1
---

That is the "shorter" chain.

1 Like

Nothing is forever.
All root certs have expiry dates - even the paid ones.

Let's Encrypt did NOT make this problem.

1 Like

@rg305

so it's correct right now?

1 Like