Please fill out the fields below so we can help you better. Note: you must provide your domain name to get help. Domain names for issued certificates are all made public in Certificate Transparency logs (e.g. https://crt.sh/?q=example.com), so withholding your domain name here does not increase secrecy, but only makes it harder for us to provide help.
It produced this output: The site will not load https links in Internet Explorer
My web server is (include version): linux
The operating system my web server runs on is (include version): Apache 2.4.34
My hosting provider, if applicable, is: TMD Hosting
I can login to a root shell on my machine (yes or no, or I don’t know): no
I’m using a control panel to manage my site (no, or provide the name and version of the control panel): cpanel 74.0.6
I ran our new Let’s Encrypt SSL through SSLlabs and see there’s a fatal handshake error for some browsers, such as IE. (https://www.ssllabs.com/ssltest/analyze.html?d=wilawlibrary.gov) We currently have a shared IP address. Would a fixed IP address fix this issue? Or is there some other configuration that must happen to make https work in IE? Our hosting provider is claiming that it’s not their problem.
The reason you would get a handshake failure is TMDhosting’s cPanel TLS cipher configuration.
This is not an issue that you could fix… (Changing cipher would affect all clients on that cPanel server)
All three TLSv1.2 ciphers the hosting provider support is 0xc030,0xcca8, 0xc02f and those aren’t included in any of those “handshake failure” browsers…
This is not (fully) a dedicated IP thing since it would have the same result as SNI (except on XP) & it’s not fully a TLS protocol thing…
Two way to resolve this:
Ask TMDhosting to enable more cipher on your shared hosting server
Switch to a Hosting provider that support more cipher or get VPS / Dedicated Hosting
That’s our staff environment, so it’s necessary that I support it! My version of IE 11 (at least according to the test of my browser I just ran on SSLlabs) has TLS 1.2 activated.
Note: SSLLabs results may be skewed if a proxy is in use.
But that opens a whole other discussion… relating to the proxy in use.
EDIT:
Actually the allowed ciphers will not match any that Windows Server 2012, nor Windows 7 can handle (Windows 10 should be fine).
They only support GCM with ECDSA (not RSA).
So, you might want to get your hosting provider to include (or switch to) ECDSA ciphers.
Seeing that they already support CHACHA20, their system must support ECDSA with GCM.