mirror of
https://github.com/0xJacky/nginx-ui.git
synced 2026-04-25 08:45:58 +03:00
[GH-ISSUE #237] letsencrypt - too many registrations for this IP #7246
Labels
No labels
Q/A
bug
casdoor
dependencies
docker
documentation
duplicate
enhancement
help wanted
invalid
lego
platform:openwrt
platform:windows
pull-request
question
wontfix
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
starred/nginx-ui#7246
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @DjSni on GitHub (Dec 14, 2023).
Original GitHub issue: https://github.com/0xJacky/nginx-ui/issues/237
Describe the bug
I have the strange problem that my IP was apparently blocked at letsencrypt because I sent too many requests. I am currently using 9 certificates.
Expected behavior
that the certificates are updated automatically.
Log
Info (please complete the following information):
It would be practical if the update interval could be set in the GUI.
@0xJacky commented on GitHub (Dec 14, 2023):
This is the letsencrypt api rate limit issue. Just wait, it will return normal after 24 hours.
By the way, if you have more than 5 certificates, I recommend you to issue a wilcard certificate.
@0xJacky commented on GitHub (Dec 14, 2023):
Currently, the checking interval is about 5 minutes, and it will only perform the renewal action if it has been a month since the last issuance. As the validity period of the certificate is 3 months, I think time is enough for nginx-ui to renew the certificate.
@DjSni commented on GitHub (Dec 15, 2023):
I can't do that, I currently have 10 different TDLs in use, so a wildcard certificate won't help me.
Apparently this does not work, because I still get the error message, my certificates are all still valid until March (distributed from 2 - 15).
@0xJacky commented on GitHub (Dec 16, 2023):
I can add a setting for the renewal interval, but I don’t think it can solve the problem. I have 6 certificates on my server, and also have the same issue as you. I checked the logs for each certificate, and I finally found that one of the sites had not configured the proxy to the HTTP challenge port, resulting in too many failures on this site which caused rate limiting issues on others.
So, I think you can check if the problem is caused by the failure of renewal of one of the certificates.
I also need to apologize because, in the previous version, due to my oversight, the auto-cert goroutine would block during certificate renewal. Therefore, in the current updated version, there might be an accumulation of previously unrenewed certificates in the first few days. However, as long as the root problem is resolved, these certificates will automatically renew within two or three days.
@DjSni commented on GitHub (Dec 16, 2023):
I added a "location /.well-known/acme-challenge" to each server block when I set it up.
I have configured it like this:
I have only updated to version: 2.0.0-beta.8 (101)
In my opinion, you should look at the expiration date of the certificate and if it is valid for more than 1 month, do not connect to Letsencypt at all.
Here is a small example:
Not valid until: 2023-12-05 15:39:28
Expired on: 2024-03-04 15:39:27
Logs from the certificate:
EDIT:
I have checked all sites again and there is a well-known location in each one.
@0xJacky commented on GitHub (Dec 16, 2023):
Yes, this is the current method. 😂
@DjSni commented on GitHub (Dec 16, 2023):
😂
But then why do I get the error message from letsencrypt. As I understand it, it is still trying to establish a connection.
@DjSni commented on GitHub (Dec 16, 2023):
wtf, whatever happened, it worked again about an hour ago. Surely this can't be due to the update to the latest version?
@0xJacky commented on GitHub (Dec 16, 2023):
Yes, it has been 3 weeks since I last change that part of codes.
@DjSni commented on GitHub (Dec 19, 2023):
It seems to work without problems now, thanks