mirror of
https://github.com/certimate-go/certimate.git
synced 2026-04-25 20:55:52 +03:00
[GH-ISSUE #876] zerossl申请证书,网络通畅,但是一直显示超时 #597
Labels
No labels
announcement
backlog
bug
declined
documentation
duplicate
enhancement
good first issue
good first issue
help wanted
invalid
pull-request
question
stale
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
starred/certimate#597
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @KeithXZhai on GitHub (Jul 16, 2025).
Original GitHub issue: https://github.com/certimate-go/certimate/issues/876
软件版本 / Release Version
0.3.23
问题描述 / Description
通过ZeroSSL+CF申请证书,已配置好了EAB,CF配置如下:
一直报错如下(已抹去隐私内容):
已经确认该服务器可以正常访问
https://acme.zerossl.com/v2/DV90/,curl返回值正常:其他 / Miscellaneous
No response
@fudiwei commented on GitHub (Jul 16, 2025):
挂的代理吗?
@KeithXZhai commented on GitHub (Jul 16, 2025):
没有使用代理,机器不在墙内。在配置不变的情况下尝试了许多次然后终于成功了一次……我不太理解是什么原因导致的……
失败的原因90%是
net/http: timeout awaiting response headers@fudiwei commented on GitHub (Jul 16, 2025):
说实话这类网络问题基本无法排查,绝大部分情况都与应用无关 😕
Issue 先开着吧,看看有没有有其他人有类似情况。
@FarrelF commented on GitHub (Jul 16, 2025):
Sorry I'm joining here, but just now I'm having the same issue.
ZeroSSL's ACME servers are terribly unstable, seems nothing change since a long time ago until now, so I'm not too surprised that issue like this often arise and I myself using Google Trust Services instead.
Is there any way option to increase/set up the timeout limit here? I know this is not a solution since the problem is from their side, but at least it minimise the timeout error because problem like this and open up the possibility of users being able to get their certificates from ZeroSSL.
Lego seems have a feature to set timeout limit (see
lego help), but I don't know if this will have any effect on this timeout issue case.@fudiwei commented on GitHub (Jul 17, 2025):
Thanks for your feedback.
But I'm afraid it won't be helpful if you're referring to the
--http-timeoutoption.In Golang, there are many parameters related to HTTP timeouts, such as
Timeout,TLSHandshakeTimeout,ResponseHeaderTimeout,IdleConnTimeout,ExpectContinueTimeout, etc. The--http-timeoutoption only controlsTimeoutbut doesn't affectResponseHeaderTimeout. However, the error mentioned above,net/http: timeout awaiting response headers, is precisely influenced byResponseHeaderTimeout.Of course, I can increase this parameter programmatically. As you said, the problem is from their side. The parameter's already set to 120 seconds as default now, and I don't believe increasing it further would work.
@FarrelF commented on GitHub (Jul 18, 2025):
I'm not just referring to
--http-timeout, but there is--cert.timeoutand--dns-timeouttoo.Especially
--cert.timeout, which is only used when obtaining a certificate, which can sometimes be problematic in that area due to their server, but yeah, I don't think it would be useful for the "Response Headers Timeout" issue that randomly appears due to their server and--http-timeoutonly controlsTimeoutas you said.So I think there is no solution to case like this currently yet except waiting for the server to get better, trying again, subscribe the paid plan and then use their REST API (not the ACME one) or not using ZeroSSL at all.