Hi JamesLE
We have another server affected and more failures queued to deal with, via the MTU workaround, until the problem is resolved.
The MTU here is 1500, as it should be.
An automated renewal attempt failed:
curl https://acme-v02.api.letsencrypt.org/acme/chall/34647863/624645132576/KGXRBA
{
"type": "http-01",
"url": "https://acme-v02.api.letsencrypt.org/acme/chall/34647863/624645132576/KGXRBA",
"status": "invalid",
"validated": "2025-12-08T20:38:10Z",
"error": {
"type": "urn:ietf:params:acme:error:connection",
"detail": "103.248.176.180: Fetching https://mypanel.co.nz/.well-known/acme-challenge/LS3L9OMtBqe_GAiyntUWj8u8J_qtpqWjujKsMppCR9M: Timeout after connect (your server may be slow or overloaded)",
"status": 400
},
"token": "LS3L9OMtBqe_GAiyntUWj8u8J_qtpqWjujKsMppCR9M",
"validationRecord": [
{
"url": "http://webmail.interspeed.co.nz/.well-known/acme-challenge/LS3L9OMtBqe_GAiyntUWj8u8J_qtpqWjujKsMppCR9M",
"hostname": "webmail.interspeed.co.nz",
"port": "80",
"addressesResolved": [
"103.248.176.140"
],
"addressUsed": "103.248.176.140"
},
{
"url": "https://mypanel.co.nz/.well-known/acme-challenge/LS3L9OMtBqe_GAiyntUWj8u8J_qtpqWjujKsMppCR9M",
"hostname": "mypanel.co.nz",
"port": "443",
"addressesResolved": [
"103.248.176.180"
],
"addressUsed": "103.248.176.180"
}
]
}
Manually attempting renewal again fails, a tcpdump with that information. pcap is no good here as I couldn't predict which LE server may initiate the incoming request..
tcpdump of Let's Encrypt exchange:
# tcpdump -i any port 80 or port 443 | grep letsencrypt
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on any, link-type LINUX_SLL (Linux cooked), capture size 262144 bytes
10:24:33.698494 IP outbound2m.letsencrypt.org.52089 > enterprise.rimu.net.nz.https: Flags [S], seq 2363495615, win 64240, options [mss 1436,sackOK,TS val 1765086036 ecr 0,nop,wscale 7], length 0
10:24:33.698570 IP enterprise.rimu.net.nz.https > outbound2m.letsencrypt.org.52089: Flags [S.], seq 69855016, ack 2363495616, win 65160, options [mss 1460,sackOK,TS val 4208317154 ecr 1765086036,nop,wscale 7], length 0
10:24:33.955207 IP outbound2m.letsencrypt.org.52089 > enterprise.rimu.net.nz.https: Flags [.], ack 1, win 502, options [nop,nop,TS val 1765086293 ecr 4208317154], length 0
10:24:33.955482 IP outbound2m.letsencrypt.org.52089 > enterprise.rimu.net.nz.https: Flags [P.], seq 1:1502, ack 1, win 502, options [nop,nop,TS val 1765086293 ecr 4208317154], length 1501
10:24:33.955736 IP enterprise.rimu.net.nz.https > outbound2m.letsencrypt.org.52089: Flags [.], ack 1502, win 498, options [nop,nop,TS val 4208317411 ecr 1765086293], length 0
10:24:33.960475 IP enterprise.rimu.net.nz.https > outbound2m.letsencrypt.org.52089: Flags [P.], seq 1:2849, ack 1502, win 501, options [nop,nop,TS val 4208317415 ecr 1765086293], length 2848
10:24:33.960500 IP enterprise.rimu.net.nz.https > outbound2m.letsencrypt.org.52089: Flags [P.], seq 2849:3151, ack 1502, win 501, options [nop,nop,TS val 4208317415 ecr 1765086293], length 302
10:24:34.217106 IP outbound2m.letsencrypt.org.52089 > enterprise.rimu.net.nz.https: Flags [.], ack 1, win 502, options [nop,nop,TS val 1765086554 ecr 4208317411,nop,nop,sack 1 {2849:3151}], length 0
10:24:34.287573 IP enterprise.rimu.net.nz.https > outbound2m.letsencrypt.org.52089: Flags [.], seq 1:1425, ack 1502, win 501, options [nop,nop,TS val 4208317743 ecr 1765086554], length 1424
10:24:35.071570 IP enterprise.rimu.net.nz.https > outbound2m.letsencrypt.org.52089: Flags [.], seq 1:1425, ack 1502, win 501, options [nop,nop,TS val 4208318527 ecr 1765086554], length 1424
10:24:36.643552 IP enterprise.rimu.net.nz.https > outbound2m.letsencrypt.org.52089: Flags [.], seq 1:1425, ack 1502, win 501, options [nop,nop,TS val 4208320099 ecr 1765086554], length 1424
10:24:39.903546 IP enterprise.rimu.net.nz.https > outbound2m.letsencrypt.org.52089: Flags [.], seq 1:1425, ack 1502, win 501, options [nop,nop,TS val 4208323359 ecr 1765086554], length 1424
10:24:43.959427 IP outbound2m.letsencrypt.org.52089 > enterprise.rimu.net.nz.https: Flags [F.], seq 1502, ack 1, win 502, options [nop,nop,TS val 1765096293 ecr 4208317411,nop,nop,sack 1 {2849:3151}], length 0
10:24:43.959911 IP enterprise.rimu.net.nz.https > outbound2m.letsencrypt.org.52089: Flags [F.], seq 3151, ack 1503, win 501, options [nop,nop,TS val 4208327415 ecr 1765096293], length 0
10:24:44.705490 IP outbound2m.letsencrypt.org.52089 > enterprise.rimu.net.nz.https: Flags [F.], seq 1502, ack 1, win 502, options [nop,nop,TS val 1765097039 ecr 4208317411,nop,nop,sack 1 {2849:3151}], length 0
10:24:44.705532 IP enterprise.rimu.net.nz.https > outbound2m.letsencrypt.org.52089: Flags [.], ack 1503, win 501, options [nop,nop,TS val 4208328160 ecr 1765097039,nop,nop,sack 1 {1502:1503}], length 0
10:24:46.303558 IP enterprise.rimu.net.nz.https > outbound2m.letsencrypt.org.52089: Flags [.], seq 1:1425, ack 1503, win 501, options [nop,nop,TS val 4208329759 ecr 1765097039], length 1424
10:24:56.799591 IP enterprise.rimu.net.nz.https > outbound1h.letsencrypt.org.60947: Flags [.], seq 1804985597:1804987021, ack 3641183713, win 501, options [nop,nop,TS val 3203873114 ecr 2840456505], length 1424
10:24:58.847554 IP enterprise.rimu.net.nz.https > outbound2m.letsencrypt.org.52089: Flags [.], seq 1:1425, ack 1503, win 501, options [nop,nop,TS val 4208342303 ecr 1765097039], length 1424
# tcptraceroute outbound2m.letsencrypt.org
Selected device ens12, address 103.248.176.180, port 56715 for outgoing packets
Tracing the path to outbound2m.letsencrypt.org (23.178.112.212) on TCP port 80 (http), 30 hops max
1 103.248.176.2 0.387 ms 0.281 ms 0.350 ms
2 10.70.11.26 0.166 ms 0.149 ms 0.148 ms
3 as4826.auckland.megaport.com (43.243.22.18) 1.568 ms 1.295 ms 1.345 ms
4 static-41.75.255.49.in-addr.VOCUS.net.au (49.255.75.41) 2.107 ms 1.800 ms 1.736 ms
5 198.41.236.39 1.620 ms 0.921 ms 0.721 ms
6 172.69.0.33 0.696 ms 0.648 ms 0.683 ms
7 172.69.0.33 0.814 ms 0.784 ms 0.744 ms
8 172.69.0.33 0.779 ms 0.709 ms 0.858 ms
9 * * *
10 * * *
11 * * *
12 * * *
13 * * *
14 * * *
15 * * *
16 * * *
17 * * *
18 * * *
19 * * *
20 * * *
21 * * *
22 * * *
23 * * *
24 * * *
25 * * *
26 * * *
27 * * *
28 * * *
29 * * *
30 * * *
LE staff can perform tests to this as it is still a valid URL:
$ curl https://mypanel.co.nz/.well-known/acme-challenge/LS3L9OMtBqe_GAiyntUWj8u8J_qtpqWjujKsMppCR9M
Footnote: Let's Encrypt is fantastic. In the real world issues occur and a time buffer is vital to resolve issues. The industry push for shorter certificate lifespans creates less time for issues to be addressed and that is unwise.