Hi all,
I have a server on which I'm hosting some domains; initially one domain and later added more. I'm using Let's Encrypt for the SSL certificates.
Let's say the domains are
Everything is working fine and I for all domains I get my desired multi-domain certificate:
and
The certificate renewal for domain2 works without a problem. But for domain1 it works partly. I understand it's probably related to the fact that the server's hostname matches domain1. I don't know why that is a problem but apparently it is?
When DA has run the certificate renewal for domain1 the certificate files (domain1.key, domain1.crt) in /usr/local/directadmin/data/.lego/certificates have turned into single domain certificates:
instead of the desired:
It does update the related files in
When it failed a few months ago I did the following to get going again:
In DA "SSL Certificates": "Get automatic certificate from ACME Provider" (took several minutes).
Then manually:
That worked in the end. But it is no proper solution of course. Now a few months later I'm back in the same situation.
So I think the real question is: How do I make the LE (multi-domain) certificate renewal work in the situation where the hostname matches the domain name?
Thanks,
Theo
I have a server on which I'm hosting some domains; initially one domain and later added more. I'm using Let's Encrypt for the SSL certificates.
Let's say the domains are
domain1.com
(this is also the server's hostname) and domain2.com
etc.Everything is working fine and I for all domains I get my desired multi-domain certificate:
domain1.com, domain1.org, mail.domain1.com, www.domain1.com
and
domain2.com, mail.domain2.com, www.domain2.com
The certificate renewal for domain2 works without a problem. But for domain1 it works partly. I understand it's probably related to the fact that the server's hostname matches domain1. I don't know why that is a problem but apparently it is?
When DA has run the certificate renewal for domain1 the certificate files (domain1.key, domain1.crt) in /usr/local/directadmin/data/.lego/certificates have turned into single domain certificates:
yields:openssl x509 -in /usr/local/directadmin/data/.lego/certificates/domain1.com.crt -text | grep DNS
DNS:domain1.com
instead of the desired:
DNS:domain1.com, DNS:domain1.org, DNS:mail.domain1.com, DNS:www.domain1.com
It does update the related files in
/usr/local/directadmin/conf/*
, /etc/httpd/conf/ssl.*/*
and /etc/exim.*
, but obviously with the (unintended) single domain cert data. It does NOT update the files in /usr/local/directadmin/data/users/domain1/domains/
.When it failed a few months ago I did the following to get going again:
In DA "SSL Certificates": "Get automatic certificate from ACME Provider" (took several minutes).
Then manually:
Then restarted the server.cp -a /usr/local/directadmin/conf/cakey.pem /usr/local/directadmin/data/users/domain1/domains/domain1.com.key
cp -a /usr/local/directadmin/conf/cacert.pem /usr/local/directadmin/data/users/domain1/domains/domain1.com.cert
cp -a /usr/local/directadmin/conf/carootcert.pem /usr/local/directadmin/data/users/domain1/domains/domain1.com.cacert
cp -a /usr/local/directadmin/conf/cacert.pem.combined /usr/local/directadmin/data/users/domain1/domains/domain1.com.cert.combined
That worked in the end. But it is no proper solution of course. Now a few months later I'm back in the same situation.
So I think the real question is: How do I make the LE (multi-domain) certificate renewal work in the situation where the hostname matches the domain name?
Thanks,
Theo