I’ve configured Let’s Encrypt correctly on my high-traffic webserver. It’s been working without a hitch since January this year.
Around 16 hours ago, most of my users suddenly started getting “intermittent” browser warnings that my website’s HTTPS certificate is void. Various SSL checkers confirmed these errors.
nginx error.log
shows me errors of the following sort (flood of multiple occurrences every minute):
2020/06/02 10:05:02 [error] 10215#10215: OCSP response not successful (6: unauthorized) while requesting certificate status, responder: ocsp.int-x3.letsencrypt.org, peer: 23.52.171.104:80, certificate: "/etc/letsencrypt/live/lymlyte.com/fullchain.pem"
Currently, I see on https://letsencrypt.status.io/ that planned maintenance work is going on, and that intermediate OSCP responders ocsp.int-x{1..4}.letsencrypt.org
were affected for a few minutes during this work.
Then why do I continue to get errors? If the reason is some kind of CDN cache, how long do I wait to get out of this? Is there anything I can do to hasten the process?
It’s badly affecting my users. Naturally there’s pressure on me to use a different SSL solution. Can someone provide me clarity on what is going on, and what to expect?
Other information:
When I run certbot certificates
on my server, I get:
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Found the following certs:
Certificate Name: lymlyte.com
Domains: lymlyte.com www.lymlyte.com
Expiry Date: 2020-08-03 22:54:47+00:00 (VALID: 62 days)
Certificate Path: /etc/letsencrypt/live/lymlyte.com/fullchain.pem
Private Key Path: /etc/letsencrypt/live/lymlyte.com/privkey.pem
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
In short, it seems to be correctly setup. In case it matters, the location /etc/letsencrypt/archive/lymlyte.com
contains:
-rw-r--r-- 1 root root 1.9K Jan 19 20:09 cert1.pem
-rw-r--r-- 1 root root 2.0K Jan 31 04:04 cert2.pem
-rw-r--r-- 1 root root 2.0K Mar 3 19:17 cert3.pem
-rw-r--r-- 1 root root 2.0K May 5 23:54 cert4.pem
-rw-r--r-- 1 root root 1.7K Jan 19 20:09 chain1.pem
-rw-r--r-- 1 root root 1.7K Jan 31 04:04 chain2.pem
-rw-r--r-- 1 root root 1.7K Mar 3 19:17 chain3.pem
-rw-r--r-- 1 root root 1.7K May 5 23:54 chain4.pem
-rw-r--r-- 1 root root 3.5K Jan 19 20:09 fullchain1.pem
-rw-r--r-- 1 root root 3.6K Jan 31 04:04 fullchain2.pem
-rw-r--r-- 1 root root 3.6K Mar 3 19:17 fullchain3.pem
-rw-r--r-- 1 root root 3.6K May 5 23:54 fullchain4.pem
-rw------- 1 root root 1.7K Jan 19 20:09 privkey1.pem
-rw------- 1 root root 1.7K Jan 31 04:04 privkey2.pem
-rw------- 1 root root 1.7K Mar 3 19:17 privkey3.pem
-rw------- 1 root root 1.7K May 5 23:54 privkey4.pem
The one strange this is I can’t seem to run certbot renew --force-renewal
. This gives me an unauthorized error of type invalid response
. However, my certs should be good for another 60+ days in any case - so I’m choosing to ignore this one. Could it be that this is the actual problem?