Was mir aber hier auffällt, es scheint sich bei allen Fehlermeldungen um Erneuerungen zu handeln die noch nicht fällig sind (notbefore/notafter).
Allerdings wird bei all diesen "checks" angezeigt "Unable to configure certificate anydomain.tld:443:0 for stapling"
Code: Select all
[Tue May 27 09:39:33.689335 2025] [ssl:error] [pid 1378894:tid 1378894] AH02604: Unable to configure certificate www.anydomain.tld:443:0 for stapling
[Tue May 27 09:39:33.691298 2025] [ssl:error] [pid 1378894:tid 1378894] AH02218: ssl_stapling_init_cert: no OCSP URI in certificate and no SSLStaplingForceURL set [subject: CN=anydomain.tld / issuer: CN=R11,O=Let's Encrypt,C=US / serial: 05E35777061C79CD66F7786A79CE77B6B2BA / notbefore: May 14 17:02:00 2025 GMT / notafter: Aug 12 17:01:59 2025 GMT]
[Tue May 27 09:39:33.691326 2025] [ssl:error] [pid 1378894:tid 1378894] AH02604: Unable to configure certificate anydomain.tld:443:0 for stapling
OCSP response: no response sent
Könnte der Erneuerungs Task bei "nicht fällig" hier irgendwo Probleme machen oder wo könnte ich noch nachschauen?
Code: Select all
# echo | openssl s_client -connect www.anydomain.tld:443 -status
Connecting to 123.123.123.123
CONNECTED(00000003)
depth=2 C=US, O=Internet Security Research Group, CN=ISRG Root X1
verify return:1
depth=1 C=US, O=Let's Encrypt, CN=R11
verify return:1
depth=0 CN=www.anydomain.tld
verify return:1
OCSP response: no response sent
---
Certificate chain
0 s:CN=www.anydomain.tld
i:C=US, O=Let's Encrypt, CN=R11
a:PKEY: RSA, 4096 (bit); sigalg: sha256WithRSAEncryption
v:NotBefore: May 8 17:02:54 2025 GMT; NotAfter: Aug 6 17:02:53 2025 GMT
1 s:C=US, O=Let's Encrypt, CN=R11
i:C=US, O=Internet Security Research Group, CN=ISRG Root X1
a:PKEY: RSA, 2048 (bit); sigalg: sha256WithRSAEncryption
v:NotBefore: Mar 13 00:00:00 2024 GMT; NotAfter: Mar 12 23:59:59 2027 GMT
---
Server certificate
-----BEGIN CERTIFICATE-----
xxxxxxxxxxxxxxxxxxxxxxxxxxxxx
-----END CERTIFICATE-----
subject=CN=www.anydomain.tld
issuer=C=US, O=Let's Encrypt, CN=R11
---
No client certificate CA names sent
Peer signing digest: SHA256
Peer signature type: rsa_pss_rsae_sha256
Peer Temp Key: X25519, 253 bits
---
SSL handshake has read 3655 bytes and written 1642 bytes
Verification: OK
---
New, TLSv1.3, Cipher is TLS_AES_256_GCM_SHA384
Protocol: TLSv1.3
Server public key is 4096 bit
This TLS version forbids renegotiation.
Compression: NONE
Expansion: NONE
No ALPN negotiated
Early data was not sent
Verify return code: 0 (ok)
---
DONE