Rate limit on registrations per IP is now 10 per 3 hours up from 10 per day.
Rate limit on certificates per Name is now 10 per 59 days up from 6 per 59 days.
is that per Name as in common name of SSL certificate or per top level domain + subdomains ? As I ran into this at https://github.com/letsencrypt/letsencrypt/issues/1569 and I don’t have 10 ssl certificates for the common name i tried le10.http2ssl.xyz but do have a total of 10 ssl certificates if you include all top level and subdomains
Ah looks like i found my problem the auto renewal cronjob I set was running more frequently than every 2 months so ran into the 10 registrations per IP per 3hr limit
guess need to wait another day for rate limit to reset
It's per top level domain (aka "registered domain") based on the Public Suffix List. It looks like you have 10 certificates under http2ssl.xyz, so you have hit the limit. Hopefully you can continue testing against staging!
Hi, with 90 days lifetime this limits the certificates to 15 certs per "domain".
domain.tld
www.domain.tld
imap.domain.tld
pop3.domain.tld
smtp.domain.tld
svn.domain.tld
community.domain.tld
chat.domain.tld
Are already 8 Domains that mean more than 1/2 of the possible.
While other firms that make money with their are excluded from the limit
kelunik, I don’t think you are correct. One certificate per domain, with no wildcards or virtual or parked domains. Can someone else confirm that I am correct?
You can issue certificates for multiple domains, see https://kelunik.com/, the certificate is valid for www.kelunik.com and kelunik.com using the Subject Alternative Name field. I implemented the protocol in PHP, I should know how issuance works.
Fixed, didn’t have www.kelunik.com as server_name so it used the default one (dev.kelunik.com) and served the wrong certificate. As the main domain is not actively in use, I didn’t ever try www., thanks.
I verify the fix, and see the alternate name in the certificate. It is unfortunate that so many webmasters are obtaining separate certificates for example.com and www.example.com. I hope the final automated version of the LE client will handle (or offer to handle) such common situations itself.
Yes, that is an excellent example that should be provided in the beta client documentation. And the functionality should be included in the final released full automation. Thanks.
I’m running many machines depending on dyndns domains. So now I’m stuck with not getting a cert for them, because all the other customers where faster then me.
“Too many certificates already issued for: xyz.xyz”
Will there be a whitelist for dyndns providers endings, because they’re only giving out subdomains to their customers?
Within the closed beta I didn’t stumble across this problem… And now I’m also unable to renew my cert.
It would be great if the exceptions are not only for dyndns domains but also for huge communities like freifunk.net. There are more than 200 subcommunities each having their own subdomain xyz.freifunk.net and many using their own servers and taking care of their own server infrastructure and thus needing their own certificates.
Right now freifunk.net has already reached the limit of 10 certificates.