Hi Colin,
I am using the following FQDN in the firewall rules:

Letsencrypt_1   acme-v01.api.letsencrypt.org    
Letsencrypt_2   acme-v02.api.letsencrypt.org    
Letsencrypt_3   acme-staging.api.letsencrypt.org
Letsencrypt_4   acme-staging-v02.api.letsencrypt.org

But even when I allow 'any source' in the firewall rules still fails.

Yes, I would expect that to fail for 2 main reasons:

1. Unless the IP has a PTR bound to it AND the firewall is resolving IP to PTR (it's not standard, and utilizes a fair amount of overhead) then the rule is essentially meaningless for passing traffic.   So you'd need to use IP addresses instead of FQDN. Except...

2. LetsEncrypt doesn't publish a list of IPs that would be used for the http validation.  They have arguable security rationale for this but even so, since they're using a very large 3rd party CDN for that traffic, they probably don't even have the ability to provide a list.  And if they did, the list would be enormous.

So long as you're allowing HTTP traffic to flow freely, there should not be an issue with certbot polling and then receiving the verification call from LE's servers.   It seems that there must be something blocking that HTTP traffic to get the verification done.   So long as that's the case, the automated renewals (and new requests, of course) will fail.

--
Chris Gebhardt
VIRTBIZ Internet Services
Access, Web Hosting, Colocation, Dedicated
www.virtbiz.com | toll-free (866) 4 VIRTBIZ

_______________________________________________
Blueonyx mailing list
Blueonyx@mail.blueonyx.it
http://mail.blueonyx.it/mailman/listinfo/blueonyx

Reply via email to