Slave Server SSL Expired - Cannot Renew

Discussion in 'Installation/Configuration' started by HappierTimesAhead, Jan 15, 2026.

  1. HappierTimesAhead

    HappierTimesAhead Member HowtoForge Supporter

    Hi Guru's,
    Looking fro some help / guidance please.

    ISSUE:
    I am having an issue securely accessing webmail on one of our slave servers. When I try and access "https://marketing.foo.com:8081/webmail/" I am getting: -
    Your connection is not private
    net::ERR_CERT_DATE_INVALID
    ---
    BROWSER SSL INFO:
    Certificate Viewer: marketing.foo.com
    Validity Period
    Issued On Wednesday, 15 October 2025 at 11:46:22
    Expires On Tuesday, 13 January 2026 at 10:46:21

    I do understand that this is an outdated / expired SSL cert for the server
    ---
    STEPS TAKEN TO TRY AND RESOLVE ISSUE:
    Command line on "marketing.foo.com" as 'ROOT': -
    ispconfig_update.sh
    and
    ispconfig_update.sh --force

    I just get "Certificate exists. Not creating a new one."
    ---
    BACKGROUND:
    Debian 12 - running ISPConfig 3.3.0p3
    This is a "live" slave server in a Multi-server setup running Apache
    This slave servers ISPConfig main domain is "marketing.foo.com"
    I did setup a "dummy" website "marketing.foo.com" with a holding page which I thought would look visually more appealing! I think the error I have made is very similar to this issue: -
    https://forum.howtoforge.com/threads/ssl-renewal-failed.94035/
    ---
    POSSIBLE SOLUTION?:
    I am very mindful that this is a "live" slave server on a "live" multi-server setup.
    Should I delete the "marketing.foo.com" website and then run (as ROOT) 'ispconfig_update.sh' or 'ispconfig_update.sh --force'?
    ---
    Many thanks in advance for any help / advice
    HTA
     
  2. till

    till Super Moderator Staff Member ISPConfig Developer

    First, check if marketing.foo.com website has a valid ssl cert. If that's the case, then please check if your system uses certbot or acme.sh for Let's Encrypt.
     
    HappierTimesAhead likes this.
  3. HappierTimesAhead

    HappierTimesAhead Member HowtoForge Supporter

    Hi Till, thanks as always for your prompt response.
    Yes, marketing.foo.com website has a valid ssl cert.
    The certs are stored in subfolder's of /root/.acme.sh/ so I believe that I have acme.sh?
    Kind regards as always
    HTA
     
  4. till

    till Super Moderator Staff Member ISPConfig Developer

    Yes.

    I would leave the website as it is, and then replace the ssl cert and key in /usr/local/ispconfig/interface/ssl/ folder with a symlink to the certificate in /root/.acme.sh/ or the copy of the certificate in the ssl folder of the website.
     
    HappierTimesAhead likes this.
  5. HappierTimesAhead

    HappierTimesAhead Member HowtoForge Supporter

    Hi again Till, Thanks.
    Would this be the correct command line for .key?

    ln -s /root/.acme.sh/marketing.foo.com_ecc/marketing.foo.com.key /usr/local/ispconfig/interface/ssl/ispserver.key

    I am a little confused about which file to link for the "cert" file? This is what I have for the source / destination

    /root/.acme.sh/marketing.foo.com_ecc/
    marketing.foo.com.cer
    marketing.foo.com.csr

    /usr/local/ispconfig/interface/ssl/
    ispserver.crt
    ispserver.pem

    What is the combination I need?
    Thanks in advance for your kind help
    HTA
     
  6. HappierTimesAhead

    HappierTimesAhead Member HowtoForge Supporter

    Hi guys,
    Could anyone give me any pointers on my post above please?
    Many thanks as always
    HTA
     
  7. till

    till Super Moderator Staff Member ISPConfig Developer

    The .pem file is the combination of the key plus the certificate. so:

    marketing.foo.com.cer => ispserver.crt

    and ispserver.pem is the key + the certificate.
     
    HappierTimesAhead likes this.
  8. HappierTimesAhead

    HappierTimesAhead Member HowtoForge Supporter

    Hi Till,
    Many thanks for your kind update.
    TBH, I am still having a struggle getting my head around this!
    Is the following the correct command / files: -

    CERTIFICATE - marketing.foo.com.cer => ispserver.crt
    ln -s /root/.acme.sh/marketing.foo.com_ecc/marketing.foo.com.cer /usr/local/ispconfig/interface/ssl/ispserver.crt

    KEY - marketing.foo.com.key => ispserver.pem
    ln -s /root/.acme.sh/marketing.foo.com_ecc/marketing.foo.com.key /usr/local/ispconfig/interface/ssl/ispserver.pem

    Sorry for being so unsure on this
    As always Thank You
    Regards
    HTA
     

Share This Page