Type: unauthorized Detail: Invalid response from

Hello, i have around 10 subdomain managed on my server and for some reason i don't understand well, i can renew some and some i cannot... so i would like some help to figure it out please.

My domain is: *.sign-art.app

I ran this command:
sudo certbot renew
or example for a specific subdomain
sudo certbot -d alpha.sign-art.app --force-renewal

It produced this output:

Saving debug log to /var/log/letsencrypt/letsencrypt.log
Plugins selected: Authenticator nginx, Installer nginx
Renewing an existing certificate
Performing the following challenges:
http-01 challenge for alpha.sign-art.app
nginx: [warn] conflicting server name "alpha.sign-art.app" on 0.0.0.0:80, ignored
Waiting for verification...
Challenge failed for domain alpha.sign-art.app
http-01 challenge for alpha.sign-art.app
Cleaning up challenges
nginx: [warn] conflicting server name "alpha.sign-art.app" on 0.0.0.0:80, ignored
Some challenges have failed.

IMPORTANT NOTES:
 - The following errors were reported by the server:

   Domain: alpha.sign-art.app
   Type:   unauthorized
   Detail: Invalid response from
   https://alpha.sign-art.app/.well-known/acme-challenge/l2ufCh7IRQUR0dWquVWUL6S7y2EW14sdJjujfWB6QBY
   [139.59.225.139]: "<!DOCTYPE html><html prefix=\"og:
   http://ogp.me/ns#\"><head><meta charset=UTF-8><meta name=viewport
   content=\"width=device-width,in"

   To fix these errors, please make sure that your domain name was
   entered correctly and the DNS A/AAAA record(s) for that domain
   contain(s) the right IP address.

My web server is (include version):
nginx version: nginx/1.17.10 (Ubuntu)

The operating system my web server runs on is (include version):
Ubuntun 18.04

My hosting provider, if applicable, is:
Digital Ocean

I can login to a root shell on my machine (yes or no, or I don't know):
Yes

I'm using a control panel to manage my site (no, or provide the name and version of the control panel):
No

The version of my client is (e.g. output of certbot --version or certbot-auto --version if you're using Certbot):
certbot 0.40.0

The same command, on some other sub domain works, on some others it does the same...
Im also using cloudflare but i set it to no proxy for the subdomain i want renew before doing it.

i also get this for several sub domains:
nginx: [warn] conflicting server name "alpha.sign-art.app" on 0.0.0.0:80, ignored

Here an example of the config on one of the subdomain:

server {

  root /home/user/alpha.sign-art.app/dist;
  index index.html;

  server_name alpha.sign-art.app;

  location / {
    try_files $uri $uri/ /index.html;
  }

    listen 443 ssl; # managed by Certbot
    ssl_certificate /etc/letsencrypt/live/alpha.sign-art.app/fullchain.pem; # managed by Certbot
    ssl_certificate_key /etc/letsencrypt/live/alpha.sign-art.app/privkey.pem; # managed by Certbot
    include /etc/letsencrypt/options-ssl-nginx.conf; # managed by Certbot
    ssl_dhparam /etc/letsencrypt/ssl-dhparams.pem; # managed by Certbot

}
server {
    if ($host = alpha.sign-art.app) {
        return 301 https://$host$request_uri;
    } # managed by Certbot

  server_name alpha.sign-art.app;
    listen 80;
    return 404; # managed by Certbot
}

Any help to finally figure it out would greatly help :slight_smile:

1 Like

I don't know much about nginx but is it relevant that both server blocks are for the same domain name? I wondered if that might interfere with what certbot is doing and perhaps they should be merged.

1 Like

Please show the entire nginx config file so we may find the name conflict/overlap, with:
nginx -T

1 Like

It may also be relevant that you're using Cloudflare proxy, sometimes there's a trick to configuring that so that validation request get through (Full vs Strict https support).

2 Likes

Welcome Back to the Let's Encrypt Community, Chris :slightly_smiling_face:

1 Like

Thanks everyone for the answer, i'm also suspecting that it is irrelevant to have duplicated verser block in the same config file but its how it is in most of my config and i wasnt sure if was added by certbot so i left it as it is.

On cloudflare im using the Strict https support option, should i switch to Full support to renew certificate then back to Strict? I also desable the proxy on cloudflare before trying to renew, this is correct?

Here the full nginx -T, sorry its quite long :):

nginx: [warn] conflicting server name "alpha.sign-art.app" on 0.0.0.0:80, ignored
nginx: [warn] conflicting server name "alpha.sign-art.app" on 0.0.0.0:80, ignored
nginx: [warn] conflicting server name "sign-art.app" on 0.0.0.0:80, ignored
nginx: [warn] conflicting server name "www.sign-art.app" on 0.0.0.0:80, ignored
nginx: the configuration file /etc/nginx/nginx.conf syntax is ok
nginx: configuration file /etc/nginx/nginx.conf test is successful
# configuration file /etc/nginx/nginx.conf:
user www-data;
worker_processes auto;
pid /run/nginx.pid;
include /etc/nginx/modules-enabled/*.conf;

events {
        worker_connections 768;
        # multi_accept on;
}

http {

        ##
        # Basic Settings
        ##

        sendfile on;
        tcp_nopush on;
        tcp_nodelay on;
        keepalive_timeout 65;
        types_hash_max_size 2048;
        # server_tokens off;

        server_names_hash_bucket_size 64;
        # server_name_in_redirect off;

        include /etc/nginx/mime.types;
        default_type application/octet-stream;

        ##
        # SSL Settings
        ##

        ssl_protocols TLSv1 TLSv1.1 TLSv1.2 TLSv1.3; # Dropping SSLv3, ref: POODLE
        ssl_prefer_server_ciphers on;

        ##
        # Logging Settings
        ##

        access_log /var/log/nginx/access.log;
        error_log /var/log/nginx/error.log;

        ##
        # Gzip Settings
        ##

        gzip on;

        # gzip_vary on;
        # gzip_proxied any;
        # gzip_comp_level 6;
        # gzip_buffers 16 8k;
        # gzip_http_version 1.1;
        # gzip_types text/plain text/css application/json application/javascript text/xml application/xml application/xml+rss text/javascript;

        ##
        # Virtual Host Configs
        ##

        include /etc/nginx/conf.d/*.conf;
        include /etc/nginx/sites-enabled/*;
}


#mail {
#       # See sample authentication script at:
#       # http://wiki.nginx.org/ImapAuthenticateWithApachePhpScript
#
#       # auth_http localhost/auth.php;
#       # pop3_capabilities "TOP" "USER";
#       # imap_capabilities "IMAP4rev1" "UIDPLUS";
#
#       server {
#               listen     localhost:110;
#               protocol   pop3;
#               proxy      on;
#       }
#
#       server {
#               listen     localhost:143;
#               protocol   imap;
#               proxy      on;
#       }
#}

# configuration file /etc/nginx/modules-enabled/50-mod-http-image-filter.conf:
load_module modules/ngx_http_image_filter_module.so;

# configuration file /etc/nginx/modules-enabled/50-mod-http-xslt-filter.conf:
load_module modules/ngx_http_xslt_filter_module.so;

# configuration file /etc/nginx/modules-enabled/50-mod-mail.conf:
load_module modules/ngx_mail_module.so;

# configuration file /etc/nginx/modules-enabled/50-mod-stream.conf:
load_module modules/ngx_stream_module.so;

# configuration file /etc/nginx/mime.types:

types {
    text/html                             html htm shtml;
    text/css                              css;
    text/xml                              xml;
    image/gif                             gif;
    image/jpeg                            jpeg jpg;
    application/javascript                js;
    application/atom+xml                  atom;
    application/rss+xml                   rss;

    text/mathml                           mml;
    text/plain                            txt;
    text/vnd.sun.j2me.app-descriptor      jad;
    text/vnd.wap.wml                      wml;
    text/x-component                      htc;

    image/png                             png;
    image/tiff                            tif tiff;
    image/vnd.wap.wbmp                    wbmp;
    image/x-icon                          ico;
    image/x-jng                           jng;
    image/x-ms-bmp                        bmp;
    image/svg+xml                         svg svgz;
    image/webp                            webp;

    application/font-woff                 woff;
    application/java-archive              jar war ear;
    application/json                      json;
    application/mac-binhex40              hqx;
    application/msword                    doc;
    application/pdf                       pdf;
    application/postscript                ps eps ai;
    application/rtf                       rtf;
    application/vnd.apple.mpegurl         m3u8;
    application/vnd.ms-excel              xls;
    application/vnd.ms-fontobject         eot;
    application/vnd.ms-powerpoint         ppt;
    application/vnd.wap.wmlc              wmlc;
    application/vnd.google-earth.kml+xml  kml;
    application/vnd.google-earth.kmz      kmz;
    application/x-7z-compressed           7z;
    application/x-cocoa                   cco;
    application/x-java-archive-diff       jardiff;
    application/x-java-jnlp-file          jnlp;
    application/x-makeself                run;
    application/x-perl                    pl pm;
    application/x-pilot                   prc pdb;
    application/x-rar-compressed          rar;
    application/x-redhat-package-manager  rpm;
    application/x-sea                     sea;
    application/x-shockwave-flash         swf;
    application/x-stuffit                 sit;
    application/x-tcl                     tcl tk;
    application/x-x509-ca-cert            der pem crt;
    application/x-xpinstall               xpi;
    application/xhtml+xml                 xhtml;
    application/xspf+xml                  xspf;
    application/zip                       zip;

    application/octet-stream              bin exe dll;
    application/octet-stream              deb;
    application/octet-stream              dmg;
    application/octet-stream              iso img;
    application/octet-stream              msi msp msm;

    application/vnd.openxmlformats-officedocument.wordprocessingml.document    docx;
    application/vnd.openxmlformats-officedocument.spreadsheetml.sheet          xlsx;
    application/vnd.openxmlformats-officedocument.presentationml.presentation  pptx;

    audio/midi                            mid midi kar;
    audio/mpeg                            mp3;
    audio/ogg                             ogg;
    audio/x-m4a                           m4a;
    audio/x-realaudio                     ra;

    video/3gpp                            3gpp 3gp;
    video/mp2t                            ts;
    video/mp4                             mp4;
    video/mpeg                            mpeg mpg;
    video/quicktime                       mov;
    video/webm                            webm;
    video/x-flv                           flv;
    video/x-m4v                           m4v;
    video/x-mng                           mng;
    video/x-ms-asf                        asx asf;
    video/x-ms-wmv                        wmv;
    video/x-msvideo                       avi;
}

# configuration file /etc/nginx/sites-enabled/alpha.sign-art.app:
server {

  root /home/user/alpha.sign-art.app/dist;
  #root /home/user/maintenance;
  index index.html;

  server_name alpha.sign-art.app;

  location / {
    #try_files $uri $uri/ =404;
    try_files $uri $uri/ /index.html;
  }

    listen 443 ssl; # managed by Certbot
    ssl_certificate /etc/letsencrypt/live/alpha.sign-art.app/fullchain.pem; # managed by Certbot
    ssl_certificate_key /etc/letsencrypt/live/alpha.sign-art.app/privkey.pem; # managed by Certbot
    include /etc/letsencrypt/options-ssl-nginx.conf; # managed by Certbot
    ssl_dhparam /etc/letsencrypt/ssl-dhparams.pem; # managed by Certbot

}
server {
    if ($host = alpha.sign-art.app) {
        return 301 https://$host$request_uri;
    } # managed by Certbot

  server_name alpha.sign-art.app;
  listen 80;
  return 404; # managed by Certbot

}

# configuration file /etc/letsencrypt/options-ssl-nginx.conf:
# This file contains important security parameters. If you modify this file
# manually, Certbot will be unable to automatically provide future security
# updates. Instead, Certbot will print and log an error message with a path to
# the up-to-date file that you will need to refer to when manually updating
# this file.

ssl_session_cache shared:le_nginx_SSL:10m;
ssl_session_timeout 1440m;
ssl_session_tickets off;

ssl_protocols TLSv1.2 TLSv1.3;
ssl_prefer_server_ciphers off;

ssl_ciphers "ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-RSA-AES128-SHA";

# configuration file /etc/nginx/sites-enabled/api.sign-art.app:
map $http_origin $allow_origin {
    ~^https?://(.*\.)?sign-art.app|localhost(:\d+)?$ $http_origin;
    # NGINX won't set empty string headers, so if no match, header is unset.
    default "";
}
server {
        # root /home/user/webapp;
        server_name api.sign-art.app;
        location / {

            if ($request_method = 'OPTIONS') {

                return 204;

            }

            add_header 'Access-Control-Allow-Origin' $allow_origin always;
            add_header 'Access-Control-Allow-Credentials' 'true' always;
            add_header 'Access-Control-Allow-Methods' 'GET, POST, OPTIONS, PUT, DELETE' always;
            add_header 'Access-Control-Allow-Headers' 'DNT,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type,Range,signature,timestamp' always;
            add_header 'Access-Control-Expose-Headers' 'Content-Length,Content-Range' always;

            proxy_set_header X-Real-IP $remote_addr;
            proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
            proxy_set_header X-Forwarded-Proto $scheme;
            proxy_set_header X-NginX-Proxy true;
            proxy_pass http://localhost:3250;
            proxy_set_header Host $http_host;
            proxy_cache_bypass $http_upgrade;
            proxy_redirect off;

        }
        location ~ /.well-known {
            allow all;
        }
    client_max_body_size 25M;

    listen 443 ssl; # managed by Certbot
    ssl_certificate /etc/letsencrypt/live/api.sign-art.app/fullchain.pem; # managed by Certbot
    ssl_certificate_key /etc/letsencrypt/live/api.sign-art.app/privkey.pem; # managed by Certbot
    include /etc/letsencrypt/options-ssl-nginx.conf; # managed by Certbot
    ssl_dhparam /etc/letsencrypt/ssl-dhparams.pem; # managed by Certbot

}
server {
    if ($host = api.sign-art.app) {
        return 301 https://$host$request_uri;
    } # managed by Certbot

    server_name api.sign-art.app;
    listen 80;
    return 404; # managed by Certbot

}

# configuration file /etc/nginx/sites-enabled/apitest.sign-art.app:
map $http_origin $allow_origin {
    ~^https?://(.*\.)?sign-art.app|localhost(:\d+)?$ $http_origin;
    # NGINX won't set empty string headers, so if no match, header is unset.
    default "";
}

server {
        # root /home/user/webapp;
        server_name apitest.sign-art.app;

        location / {

        if ($request_method = 'OPTIONS') {

        return 204;

        }

        add_header 'Access-Control-Allow-Origin' $allow_origin always;
        add_header 'Access-Control-Allow-Credentials' 'true' always;
        add_header 'Access-Control-Allow-Methods' 'GET, POST, OPTIONS, PUT, DELETE' always;
        add_header 'Access-Control-Allow-Headers' 'DNT,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type,Range,signature,timestamp' always;
        add_header 'Access-Control-Expose-Headers' 'Content-Length,Content-Range' always;

            proxy_set_header X-Real-IP $remote_addr;
            proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
            proxy_set_header X-Forwarded-Proto $scheme;
            proxy_set_header X-NginX-Proxy true;
            proxy_pass http://localhost:3200;
            proxy_set_header Host $http_host;
            proxy_cache_bypass $http_upgrade;
            proxy_redirect off;
        }
        location ~ /.well-known {
            allow all;
        }
    client_max_body_size 25M;

    listen 443 ssl; # managed by Certbot
    ssl_certificate /etc/letsencrypt/live/apitest.sign-art.app/fullchain.pem; # managed by Certbot
    ssl_certificate_key /etc/letsencrypt/live/apitest.sign-art.app/privkey.pem; # managed by Certbot
    include /etc/letsencrypt/options-ssl-nginx.conf; # managed by Certbot
    ssl_dhparam /etc/letsencrypt/ssl-dhparams.pem; # managed by Certbot

}
server {
    if ($host = apitest.sign-art.app) {
        return 301 https://$host$request_uri;
    } # managed by Certbot


    server_name apitest.sign-art.app;
    listen 80;
    return 404; # managed by Certbot

}

# configuration file /etc/nginx/sites-enabled/beta.sign-art.app:
server {

  root /home/user/beta.sign-art.app/dist;
  #root /home/user/maintenance;
  index index.html;

  server_name beta.sign-art.app;

  location / {
    #try_files $uri $uri/ =404;
    try_files $uri $uri/ /index.html;
  }

    listen [::]:443 ssl ipv6only=on; # managed by Certbot
    listen 443 ssl; # managed by Certbot
    ssl_certificate /etc/letsencrypt/live/beta.sign-art.app/fullchain.pem; # managed by Certbot
    ssl_certificate_key /etc/letsencrypt/live/beta.sign-art.app/privkey.pem; # managed by Certbot
    include /etc/letsencrypt/options-ssl-nginx.conf; # managed by Certbot
    ssl_dhparam /etc/letsencrypt/ssl-dhparams.pem; # managed by Certbot

}
server {
    if ($host = beta.sign-art.app) {
        return 301 https://$host$request_uri;
    } # managed by Certbot

 listen 80 default_server;

  server_name beta.sign-art.app;
    return 404; # managed by Certbot

}

# configuration file /etc/nginx/sites-enabled/faucet.sign-art.app:
server {
        # root /home/user/webapp;
        server_name faucet.sign-art.app;
        location / {
            proxy_set_header X-Real-IP $remote_addr;
            proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
            proxy_set_header X-NginX-Proxy true;
            proxy_pass http://localhost:3222;
            proxy_set_header Host $http_host;
            proxy_cache_bypass $http_upgrade;
            proxy_redirect off;
        }
        location ~ /.well-known {
            allow all;
        }
    client_max_body_size 25M;

    listen 443 ssl; # managed by Certbot
    ssl_certificate /etc/letsencrypt/live/faucet.sign-art.app/fullchain.pem; # managed by Certbot
    ssl_certificate_key /etc/letsencrypt/live/faucet.sign-art.app/privkey.pem; # managed by Certbot
    include /etc/letsencrypt/options-ssl-nginx.conf; # managed by Certbot
    ssl_dhparam /etc/letsencrypt/ssl-dhparams.pem; # managed by Certbot

}

server {
    if ($host = faucet.sign-art.app) {
        return 301 https://$host$request_uri;
    } # managed by Certbot


        server_name faucet.sign-art.app;
    listen 80;
    return 404; # managed by Certbot


}

# configuration file /etc/nginx/sites-enabled/mainnet.sign-art.app:
server {

  root /home/user/mainnet/sign-art.app-2/dist;
  #root /home/user/maintenance;
  index index.html;

  server_name mainnet.sign-art.app;

  location / {
    #try_files $uri $uri/ =404;
    try_files $uri $uri/ /index.html;
    #auth_basic "Restricted Content";
    #auth_basic_user_file /etc/nginx/.htpasswd;
  }

    listen 443 ssl; # managed by Certbot
    ssl_certificate /etc/letsencrypt/live/mainnet.sign-art.app/fullchain.pem; # managed by Certbot
    ssl_certificate_key /etc/letsencrypt/live/mainnet.sign-art.app/privkey.pem; # managed by Certbot
    include /etc/letsencrypt/options-ssl-nginx.conf; # managed by Certbot
    ssl_dhparam /etc/letsencrypt/ssl-dhparams.pem; # managed by Certbot

}
server {
    if ($host = mainnet.sign-art.app) {
        return 301 https://$host$request_uri;
    } # managed by Certbot

 listen 80;

  server_name mainnet.sign-art.app;

}
server {
    if ($host = alpha.sign-art.app) {
        return 301 https://$host$request_uri;
    } # managed by Certbot



  server_name alpha.sign-art.app;
    listen 80;
    return 404; # managed by Certbot


}

# configuration file /etc/nginx/sites-enabled/preprod.sign-art.app:
server {

  root /home/user/mainnet/sign-art.app-1/dist;
  #root /home/user/maintenance;
  index index.html;

  server_name preprod.sign-art.app;

  location / {
    #try_files $uri $uri/ =404;
    try_files $uri $uri/ /index.html;
  }

    listen 443 ssl; # managed by Certbot
    ssl_certificate /etc/letsencrypt/live/preprod.sign-art.app/fullchain.pem; # managed by Certbot
    ssl_certificate_key /etc/letsencrypt/live/preprod.sign-art.app/privkey.pem; # managed by Certbot
    include /etc/letsencrypt/options-ssl-nginx.conf; # managed by Certbot
    ssl_dhparam /etc/letsencrypt/ssl-dhparams.pem; # managed by Certbot


}
server {
    if ($host = preprod.sign-art.app) {
        return 301 https://$host$request_uri;
    } # managed by Certbot


 listen 80;

  server_name preprod.sign-art.app;


}
server {
    if ($host = alpha.sign-art.app) {
        return 301 https://$host$request_uri;
    } # managed by Certbot

  server_name alpha.sign-art.app;
    listen 80;
    return 404; # managed by Certbot

}

# configuration file /etc/nginx/sites-enabled/sign-art.app:
server {
  root /home/user/sign-art.app;
  #root /home/user/maintenance;
  server_name sign-art.app www.sign-art.app;

    location / {
        proxy_set_header X-Real-IP $remote_addr;
        proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
        proxy_set_header X-NginX-Proxy true;
        proxy_pass http://localhost:3003;
        proxy_set_header Host $http_host;
        proxy_cache_bypass $http_upgrade;
        proxy_redirect off;
    }
    location ~ /.well-known {
        allow all;
    }

    listen 443 ssl; # managed by Certbot
    ssl_certificate /etc/letsencrypt/live/www.sign-art.app/fullchain.pem; # managed by Certbot
    ssl_certificate_key /etc/letsencrypt/live/www.sign-art.app/privkey.pem; # managed by Certbot
    include /etc/letsencrypt/options-ssl-nginx.conf; # managed by Certbot
    ssl_dhparam /etc/letsencrypt/ssl-dhparams.pem; # managed by Certbot


}
server {
    if ($host = www.sign-art.app) {
        return 301 https://$host$request_uri;
    } # managed by Certbot


    if ($host = sign-art.app) {
        return 301 https://$host$request_uri;
    } # managed by Certbot


  listen 80;
  listen [::]:80 default_server;
  server_name sign-art.app www.sign-art.app;

}

server {
    if ($host = www.sign-art.app) {
        return 301 https://$host$request_uri;
    } # managed by Certbot

  server_name sign-art.app www.sign-art.app;
    listen 80;
    return 404; # managed by Certbot

}

I suspect this to be because of the duplicated server block with duplicated listen xx? Do i have to always have only 1 server block per config ?
Could this also be the reason i cant renew their certificates?

2 Likes

Thank you, will read that as well :slight_smile:

1 Like

Neither of these are expected to work through a CDN while using certbot and nginx.
[without adequate instruction]

After we fix the name conflict/overlap, we can work on using --webroot properly to obtain a cert.

1 Like

You need to have a separate server block for each unique content being served.
If you use 5 domain names and all serve the exact same content from the exact same root, then you only need one server block for them [and include all the names in the block and in the cert].
When you want to serve different content from different roots, the simplest path is to make separate server blocks and serve one from each.

Let me now review your nginx config...

1 Like

Please show this file:
/etc/letsencrypt/options-ssl-nginx.conf

1 Like

Thanks a lot for all these infos, for now i have one config file per sub domain but most have 2 server blocks which probably should be merged then.

1 Like

Let me add:
If you are doing HTTP & HTTPS, it is best to separate those into their own blocks.

1 Like

ssl_session_cache shared:le_nginx_SSL:10m;
ssl_session_timeout 1440m;
ssl_session_tickets off;

ssl_protocols TLSv1.2 TLSv1.3;
ssl_prefer_server_ciphers off;

ssl_ciphers "ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA3

1 Like

So far I've found three different file names that all are using the same Server_Name:
[pay no attention to the altered text version - just my OCD kicking in - LOL]

# configuration file /etc/nginx/nginx.conf:
server {
  server_name alpha.sign-art.app;
  if ($host = alpha.sign-art.app) {
      return 301 https://$host$request_uri;
  }# if
  listen 80;
  return 404; 
}# server

# configuration file /etc/nginx/sites-enabled/mainnet.sign-art.app:
server {
  server_name alpha.sign-art.app;
  if ($host = alpha.sign-art.app) {
    return 301 https://$host$request_uri;
  }# if
  listen 80;
  return 404; 
}# server

# configuration file /etc/nginx/sites-enabled/preprod.sign-art.app:
server {
  server_name alpha.sign-art.app;
  if ($host = alpha.sign-art.app) {
    return 301 https://$host$request_uri;
  }# if
  listen 80;
  return 404; 
}# server
1 Like

And this one file that has a repeated block (for same name and same port):

# configuration file /etc/nginx/sites-enabled/sign-art.app:
server {
  server_name sign-art.app www.sign-art.app;
  if ($host = www.sign-art.app) {
    return 301 https://$host$request_uri;
  }# if
  if ($host = sign-art.app) {
    return 301 https://$host$request_uri;
  }# if
  listen 80;
  listen [::]:80 default_server;
}# server

server {
  server_name sign-art.app www.sign-art.app;
  if ($host = www.sign-art.app) {
    return 301 https://$host$request_uri;
  }# if
  listen 80;
  return 404; 
}# server
1 Like

I see, i have no idea how i ended up with these alpha.sign-art.app server block on mainnet.sign-art.app and preprod.sign-art.app to be honest

I just remove them right?

But in /etc/nginx/nginx.conf i don't find it though

1 Like

Should i remove the second block on this one? do i report the "return 404" in previous block or no need?

1 Like

You should disable them.

It really makes little difference now - as long as you are behind cloudflare CDN, no one will ever hit your HTTP server.

1 Like

Thanks a lot will do that, how about this one:

# configuration file /etc/nginx/nginx.conf:
server {
  server_name alpha.sign-art.app;
  if ($host = alpha.sign-art.app) {
      return 301 https://$host$request_uri;
  }# if
  listen 80;
  return 404; 
}# server

Im a bit confuse because i don't have such block in /etc/nginx/nginx.conf

1 Like

Perhaps my copy/paste/move/edit jumbled it around let me re-look for that in the original post...

1 Like