Accéder au contenu principal

Problem installation AutoSSL



I add new subdomain to my user " domianedz" domain "domiane.dz"

the subdomain is "sub.domaine.dz" and "sub2.domaine.dz"

When i run AutoSSL i got this error

*****************************************
sub.domaine.dz
AutoSSL last ran on 3 mars 2021.
No certificate available. AutoSSL will attempt to secure the domain the next time it runs.

sub2.domaine.dz
AutoSSL last ran on 3 mars 2021.
No certificate available. AutoSSL will attempt to secure the domain when the parent domain “sub.domaine.dz” renews.
*****************************************************

Can you help me to add "autoSSL" to this subdomain ?

*********************************************************************************

You need to go to WHM >> SSL/TLS >> Manage AutoSSL >> Options >> Allow AutoSSL to replace invalid or expiring non-AutoSSL certificate and click the box next to this option and save the new changes and then run this command one more time: 

/usr/local/cpanel/bin/autossl_check --user=domianedz

I hope this information is useful. Please let me know how it goes. 

**************************************************************************************


Looking at the AutoSSL logs, there is a permission problem on the document root for that domain that prevents AutoSSL to issue a certificate:

 8:52:48 AM WARN Local HTTP DCV error (sub.domiane.dz): The system failed to create the directory “/home/domianedz/public_html/sub/.well-known” because of an error: Permission denied
 WARN Local HTTP DCV error (www.domiane.dz): The system failed to create the directory “/home/domianedz/public_html/aarn/.well-known” because of an error: Permission denied

I have gone ahead and fixed the permissions for it and clear the pending queue, which allowed AutoSSL to issue and install a certificate for the domain:

How can I clear the AutoSSL Queue?

/home/domianedz/public_html]cPs# ll
total 247504
drwxr-xr-x. 24 root root 8192 Mar 3 11:42 aarn


# chown domianedz:domianedz sub
[08:56:58 mail root@94297012 /home/domianedz/public_html]cPs# ls -alh
total 242M
drwxr-x---. 24 domianedz domianedz 4.0K Mar 3 11:26 .
drwx--x--x. 23 domianedz domianedz 4.0K Mar 3 11:41 ..
drwxr-xr-x. 24 domianedz domianedz 8.0K Mar 3 11:42 aarn
# mv -v /var/cpanel/autossl_queue_cpanel.sqlite /var/cpanel/autossl_queue_cpanel.sqlite.bak
‘/var/cpanel/autossl_queue_cpanel.sqlite’ -> ‘/var/cpanel/autossl_queue_cpanel.sqlite.bak’

The certificate was issued and installed (see attachment):

The system has completed “domianedz”’s AutoSSL check.
9:01:01 AM Polling for “domianedz”’s new certificate for “sub.domiane.dz” (order item ID “1127984179”) …
 9:01:02 AM The certificate is available.
Installing “syb.domiane.dz”’s new certificate …
 9:01:03 AM SUCCESS Success!

Please let us know if everything looks good on your side too.

Commentaires

Posts les plus consultés de ce blog

Zimbra install let's encrypt

 https://inguide.in/how-to-install-free-ssl-certificate-on-zimbra-mail-server/ Je change le domaine  ingu.pw In the article  Install Zimbra Mail Server o n CentOS 8, we learned to install Zimbra on CentOS. This article discusses the steps required to install the Let’s Encrypt free SSL certificate in Zimbra. Installing Free SSL Certificate on Zimbra: Method 1 This method is a proven one though you have to manually do all the steps. Another method discussed below is partially automatic, which might come in handy if you didn’t encounter any error during installation (working at the time of writing this article). So, let’s begin with method 1. First of all, add  epel repository  to the server 1 [root@mail ~]# yum -y install epel-release Install snapd Now, install  snapd  package with the following command 1 [root@mail ~]# sudo yum install snapd After the above step, you need to enable snapd. 1 [root@mail ~]# sudo systemctl enable --now snapd.socket Sometim...

Open Media Vault NAS change password

Known Root Password Login to the OMV using the root user and the current password via SSH or Console enter the following command passwd root The new password is now active. Unknown Root Password, but Admin Access to OMV GUI is Available In this scenario we still can help ourselves with the GUI. The method we use is, that we create a cron job for the root user which then resets the password. Navigate to System -> Cron Jobs Press the +Add button UN-tick the enabled box, so that the cronjob does not run automatically. put into the command field the following line, replace newpasswd with your password: echo "root:newpasswd" | chpasswd press okay select the newly created cron job Click the run button. in the opening window click the start button. It will shortly deactivate and activate again. open ssh or console and login as root with your new password. Root and Admin Password Unknown If you do not know the root password, you need to boot with a Li...

cPanel DDOS attack - Mitigate Slowloris Attacks - mod_qos

Apache mod_evasive Mod_evasive is a module available for the Apache HTTP server that can automatically block attacks by rate-limiting any IP that sends too many requests in a short time. Start by installing the module from WHM’s  EasyApache 4  interface. Select the  Currently Installed Packages  profile, search for  mod_evasive  in the  Apache Modules  section, and then install it. The default settings are good for most servers, but you can tweak them further by editing the configuration file  /etc/apache2/conf.d/300-mod_evasive.conf . You can also whitelist specific IP addresses or classes, so legitimate requests are not blocked. Configure CSF to block attacks While  mod_evasive  works very well, it only protects the Apache webserver. In order to harden other services as well, you can install the free  ConfigServer Security & Firewall  (CSF), which also includes a WHM plugin. As the  root  user, install CSF ...