David's response makes sense.
Try it.
If it doesn't work, then try this:
WARNING:
The following suggestion is presented as a best efforts solution, and took a great deal of time to verify. However I cannot guarantee that it is error free, or that it will not completely break your server. We guarantee only work that we do on your servers ourselves, under contract.
If you do not feel comfortable doing this yourself, or do not want to take full responsibility for any end result, then you may of course either ignore everything I've written, or contract me at
nobaloney.net to contract for a guaranteed solution to your problem.
First, in a root shell, navigate to the proper directory for admin's domain's certs:
# cd /usr/local/directadmin/data/users/admin/domains
In that directory there should be a file named:
linkdisk.com.conf
Is there?
If not, then the domain was not properly set up.
If so, let's continue...
The contents of this file should be similar to:
Code:
SSLCACertificateFile=/usr/local/directadmin/data/users/admin/domains/linkdisk.com.cacert
SSLCertificateFile=/usr/local/directadmin/data/users/admin/domains/linkdisk.com.cert
SSLCertificateKeyFile=/usr/local/directadmin/data/users/admin/domains/linkdisk.com.key
bandwidth=unlimited
cgi=ON
defaultdomain=yes
domain=linkdisk.com
ip=64.156.241.105
quota=unlimited
ssl=ON
suspended=no
username=admin
All the lines don't have to be exactly like this; I did some guessing. But the important ones are the three at the top, and the line "ssl=ON".
If they're not what I have here, then let us know.
If they are, then we can move on...
You wrote that your cert files were at:
SSLCertificateFile /etc/httpd/conf/ssl.crt/linkdisk.crt/
SSLCertificateKeyFile /etc/httpd/conf/ssl.key/linkdisk.key/
SSLCACertificateFile /etc/httpd/conf/ca-bundle/chain.crt/
Are you sure these are the files from your install of your freeSSL cert? If you're not sure, you can verify them by cutting and pasting the linkdisk.crt file to the desktop of your local Windows or Linux system (probably Apple as well, though I'm not certain) and double-clicking on them, to make sure that the cert was issued by whom you expect, and in the name of
www.linkdisk.com. Only once you're certain these are the correct files should you move on.
You need to make sure you have copies at those three files defined in the three lines at the top of your linkdisk.com.conf file...
Check the contents of:
/usr/local/directadmin/data/users/admin/domains/linkdisk.com.cacert
It needs to be the same as the contents of:
/etc/httpd/conf/ca-bundle/chain.crt
If it's not, then do the following (the "#" sign means do it as root):
# cp /etc/httpd/conf/ca-bundle/chain.crt /usr/local/directadmin/data/users/admin/domains/linkdisk.com.cacert
Next, check the contents of:
/usr/local/directadmin/data/users/admin/domains/linkdisk.com.cert
It needs to be the same as the contents of:
/etc/httpd/conf/ssl.crt/linkdisk.crt/
If it's not, then do the following:
# cp /etc/httpd/conf/ssl.crt/linkdisk.crt /usr/local/directadmin/data/users/admin/domains/linkdisk.com.cert
Next, check the contents of:
/usr/local/directadmin/data/users/admin/domains/linkdisk.com.key
It needs to be the same as the contents of:
/etc/httpd/conf/ssl.key/linkdisk.key
If it's not, then do the following:
cp /etc/httpd/conf/ssl.key/linkdisk.key /usr/local/directadmin/data/users/admin/domains/linkdisk.com.key
Now check the ownership and permissions of the files in /usr/local/directadmin/data/users/ezsecure/domains
They need to be owned by diradmin, group diradmin, and should be read-write only by their owner. If they're not, execute these two commands:
# chown diradmin:diradmin /usr/local/directadmin/data/users/ezsecure/domains/*
# chmod 600 /usr/local/directadmin/data/users/ezsecure/domains/*
Then restart apache:
/etc/rc.d/init.d/httpd restart
Now it should work.
If it doesn't, report back here or, if you wish, contact me at my email address or phone number, both below in my sig.