mirror of
https://github.com/NginxProxyManager/nginx-proxy-manager.git
synced 2026-04-26 09:55:51 +03:00
[GH-ISSUE #4352] Server shows offline when assigned a cert, online without it. #2794
Labels
No labels
awaiting feedback
bug
cannot reproduce
dns provider request
duplicate
enhancement
enhancement
enhancement
good first issue
help wanted
invalid
need more info
no certbot plugin available
product-support
pull-request
question
stale
troll
upstream issue
v2
v2
v2
v3
wontfix
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
starred/nginx-proxy-manager-NginxProxyManager#2794
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @yacob841 on GitHub (Feb 6, 2025).
Original GitHub issue: https://github.com/NginxProxyManager/nginx-proxy-manager/issues/4352
Checklist
jc21/nginx-proxy-manager:latestdocker image?Describe the bug
I have 34 Proxy Hosts, 33 of them work correctly, the 1 that does not is Authentik. It works properly as long as I do not assign it a Cert in NPM. If I assign it a Cert, the server shows as offline. To reiterate, when there is no cert assigned I can click on the link in NPM, type in the FQDN in the browser, or the IP:Port and it will load Authentik without a cert. However, if I assign it a cert, then the system shows offline, if I click on the link in NPM or use the FQDN in the browser I get the server isn't responding error. If I type in the IP:Port, then I get to Authentik. And to again, the other 33 that work all have certs assigned and work fine.
Nginx Proxy Manager Version
v2.12.3
To Reproduce
Steps to reproduce the behavior:
Expected behavior
A server being online or offline should not be determined by if a cert is assigned to it. I am guessing there is some error happening in the background and instead of giving an error it's marking offline.
Screenshots
Operating System
Unraid
Additional context
Unraid 7.0.0
All browsers
Latest NPM, Latest Authentik
@pipsen commented on GitHub (Feb 12, 2025):
Same problem here. New created SSL hosts not working: Host indicated as offline
ERR_SSL_UNRECOGNIZED_NAME_ALERT
@vluzrmos commented on GitHub (Feb 13, 2025):
Same here...
@AlessandroVivoli commented on GitHub (Feb 17, 2025):
Same problem here.
@GodofPlants commented on GitHub (Feb 17, 2025):
yea exact same issue here.
@vluzrmos commented on GitHub (Feb 17, 2025):
Has anyone found a solution so far?
@AlessandroVivoli commented on GitHub (Feb 18, 2025):
The temporary solution for now is to revert back to 2.12.2, open the
database.sqlitefile in the/datadirectory. Execute the following SQL query:And then restart the app/container.
This removes the 17th migration which is present in the version 2.12.3 but not 2.12.2, and sets the migration sequence (auto_increment) back to 16. This lets the NPM version 2.12.2 run without any errors because of the missing 17th migration js file. Hope this helps.
@pipsen commented on GitHub (Feb 18, 2025):
I can confirm, that this workaround is working - thank you!
@artenais commented on GitHub (May 8, 2025):
Will this be fixed in next release?
@pipsen commented on GitHub (Jul 1, 2025):
Unfortunately not. I just tested with 2.12.4 and the problem is still in place. I am a little bit surprised, as this bug is blocking the main functionality of NginxProxy.
Any comments?
@artenais commented on GitHub (Jul 2, 2025):
This is breaking. Can someone upvote this?
@pipsen commented on GitHub (Jul 9, 2025):
Tested today 2.12.5.. still broken.
I can not understand, why this problem is not fixed? How can other users use this container? It is impossible to create new SSL secured hosts? Can somebody explain to me, how this new images can be used with new hosts?
@artenais commented on GitHub (Jul 15, 2025):
This worked for me on 2.12.6. Custom certificate.
@pipsen commented on GitHub (Jul 21, 2025):
I just re-deployed and re-installed an brand new 2.12.6 docker installation from scratch on two different servers with two different domains and two different domain providers (selfhost.de and IPv64.net).
=> No chance to create a new host with SSL support. It is broken from 2.12.3 upwards
@StarfleetCommander commented on GitHub (Aug 18, 2025):
I deployed 2.12.6 on TrueNAS Scale with same effect, still broken till today.
@JohnathonMohr commented on GitHub (Sep 29, 2025):
In case it helps others, I hit this issue too but was able to diagnose and solve it (even on 2.12.6). It turns out my uploaded certificate was getting rejected because the ssl key size was considered too weak for security requirements.
Steps I took
DEBUGin docker configuration, set to "true" (though I think any value will work) and restarted the container.openssl: "ee key too small", which I then searched for onlineI had created my certificate with a 1024 bit key (from a guide that I didn't research enough). Turns out the
openssl genrsacommand uses a 2048 bit key by default if a key size isn't specified, so I recreated my cert with a new 2048 bit key.After importing this new cert/key pair into NPM, the proxy host is now enabled with SSL using my new, more secure certificate. :)
Not sure where exactly this new requirement comes from (NPM change, new docker image, ...) but a more secure certificate got past this issue for me.
@StarfleetCommander commented on GitHub (Sep 29, 2025):
@JohnathonMohr Thanks for the insides. I can not confirm right now that this is the same issue on my setup as I temporary switched to Zaroxy. But at least it's not a RSA key size issue for me as the certificates in use are ECC certificates with 384bit secp384r1. But an error log on debug level would be interesting for sure. Maybe there are more key size or algorithm traps inside. Will try to confirm in the next days.
@pipsen commented on GitHub (Oct 2, 2025):
I also tried to analyse with debug log, and I could solve my problem:
I used a custumzed ssl-ciphers file, where I forced my SSL to version 1.3
This worked for old version, but is broken for new versions. I removed my custumized ssl-ciphers file and now it is working
@mofakhar commented on GitHub (Oct 9, 2025):
Still having the issue but was able to get it working in my end by executing the following command once inside the container.
This changes the timeout from 10 seconds to 50 seconds.
sed -i 's/10000/50000/g' /app/internal/certificate.jsDo we know when this bug can be fixed?