-
Notifications
You must be signed in to change notification settings - Fork 823
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
All hosts return error in Firefox Error Code: MOZILLA_PKIX_ERROR_SELF_SIGNED_CERT #693
Comments
looks like the certificate subject name common name is incorrect, ex see below in browser where the parameter subject name ->
|
My bad, the valid certificate in the setup is not being recognized and the default certificate is being served, but how to debug this? |
I've run into this issue as well. After rebuilding my containers on 9/26/20, I get the same error message. Everything was working fine prior to the update. I've not change and settings or modified any configurations. |
@arunk what is happening is your cert can't be issued because of a failing authorisation. If you can't get a cert issued for a given domain, nginx-proxy will instead serve the default certificate, which is a self signed certificate with You can start there to troubleshoot why this authorisation might be failing : https://github.com/nginx-proxy/docker-letsencrypt-nginx-proxy-companion/blob/master/docs/Invalid-authorizations.md |
I just tried renaming the default.crt, and default.key files to .old and restarted the containers and all is working now. It created new default.crt and new default.key files. |
@seljuck what fixed your issue most probably wasn't the renaming and automatic re-creation of the default key / cert but rather the containers restart 😕 |
@buchdag I set the environment variable DEBUG=true on the proxy companion and got some information about why some of the certificates are failing. There are some configuration errors, such as some domains being mentioned in the LETSENCRYPT_HOST but not mentioned in VIRTUAL_HOST. I have fixed those issues. But there are some certificates which are failing for unknown reason. There is no mention of them in the log even with DEBUG=true. But when I see the domains they are mentioned in /app/letsencrypt_service_data in the generated file. But when the letsencrypt_service update_cert runs, it doesn't appear to do anything with the domain. I see Symlinked domains, Enabled domains and Disabled domains once when the container is started but I don't see it being called after that. The mechanism for /app/letsencrypt_service is that it runs update_certs then waits for one hour (3600 seconds) then runs the script again right? I'm wondering how to debug these missing domains. Thanks for your help. |
@arunk could you post your whole config, either command line or Docker compose file(s), for
Yep. |
@buchdag here are the docker-compose.yml files. |
@buchdag I found an update to the nginx proxy companion and updated it. But now I find CPU usage for the letsencrypt_service is very high. It's consistently hitting 100% CPU usage and is using 2GB of RAM. This wasn't the case before, has some recent update changed how this works? High CPU usage isn't for 5 minutes or whatever when certs are being generated, but its high throughout. And both the letsencrypt_service processes run high CPU usage, but only the 2nd one has 2GB of RAM usage. |
FYI, this worked for me as well. Restarting the containers didn't. ...Michael... |
This might probably work if it's a single site environment, but @arunk has got multi site production environment, with different domain names, so this won't cut the deal. |
@arunk It should absolutely not happen unless the bash script got trapped in an infinite loop. Have you identified which process exactly is consuming the ressources ? |
@buchdag it is the process - /bin/bash /app/letsencrypt_service . |
The volumes_from:
- proxy On your What version of Can you use the Could you provide both container logs up to the point it starts consuming 100% CPU so I can check if there is an apparent loop ? I'm assuming you are running this on |
@seljuck @masilver99 the companion container automatically generates a default key and self signed certificate pair for useful read on that subject : #529 If a requested certificate creation fails for whatever reason (99 % of the time an ACME authorisation failure) the proxy will serve this default certificate instead of the intended one. Renaming or deleting the default key and certificate will trigger the generation again on the next container startup but shouldn't do a thing for your non issued cert / failed authorisation unless we have a very weird and unidentified race condition with nginx. If doing the former appears to fix the later, chances of it being coincidental are very high. I could be wrong though but I really don't see yet how the two could be tied. |
@buchdag using proxy companion v1.13 has solved a lot of the problems, though a few cases still remain. I'm investigating what the issue is with these few remaining ones. Anyway in the meantime, here is the log of the proxy and letsencrypt companion containers after restarting them, attached to the issue. This is using the latest version of companion. |
You are getting a pile of error from
And this goes on and on. Your |
@buchdag any thoughts on what is causing the errors? the warnings about server name we need to fix, someone has added path's to the domain which is causing the warning. i'm not sure if that's the cause for the errors as well. i'll try and fix that and see if the error persists. |
No idea, searches on |
Inactive issue, closing. |
First off thanks for this amazing piece of software, its been a big help for us running multiple sites on our server. I have installed jwilder/nginx-proxy and this jrcs/letsencrypt-nginx-proxy-companion on the server and have had it successfully create certificates for containers by adding LETSENCRYPT_HOST and LETSENCRYPT_EMAIL and VIRTUAL_HOST to containers.
But all of a sudden one of the containers that was created with these same values, started throwing an error on Firefox with Error Code: MOZILLA_PKIX_ERROR_SELF_SIGNED_CERT. So I ran a docker pull of the latest images of nginx-proxy and letsencrypt-nginx-proxy-companion and updated both the proxy container and the proxy companion container. And now all my containers that require HTTPS are down. They are all throwing this same error in Firefox and the equivalent error in Chrome.
The logs show for the proxy companion show some errors in generating certificates:
ERROR:simp_le:1417: CA marked some of the authorizations as invalid, which likely means it could not access http://example.com/.well-known/acme-challenge/X. Did you set correct path in -d example.com:path or --default_root? Are all your domains accessible from the internet? Please check your domains' DNS entries, your host's network/firewall setup and your webserver config. If a domain's DNS entry has both A and AAAA fields set up, some CAs such as Let's Encrypt will perform the challenge validation over IPv6. If your DNS provider does not answer correctly to CAA records request, Let's Encrypt won't issue a certificate for your domain (see https://letsencrypt.org/docs/caa/). Failing authorizations: https://acme-v02.api.letsencrypt.org/acme/authz-v3/7254435604, https://acme-v02.api.letsencrypt.org/acme/authz-v3/7254435607
But even for domains where certificate already exists I am seeing this error in the browser. Can you please tell me what the problem might be. Let me know if you would like me to post more of the server logs here.
Here is a check your site link for one of the hosts - https://check-your-website.server-daten.de/?q=docs.janastu.org
Thanks,
arun
The text was updated successfully, but these errors were encountered: