I just followed the tutorial "Securing your ISPConfig 3 managed mailserver with a valid Let's Encrypt SSL certificate." (I did not set up the renewal script.) Everything went fine except that dovecot will not restart. I am trying to set up a certificate for mail.hugheshome.net The certificate checks out at the tool suggested in the tutorial https://www.sslshopper.com/ssl-checker.html The symlinks look okay to me. Postfix starts but dovecot exits with error 89. I am stuck and would be grateful for help.
Did you just now install that server and ISPConfig? How? Using ISPConfig auto-installer should create and configure the certificates. If you followed the Perfect Server Guide the certificates should be OK if done correctly. Maybe following instructions from that "Securing your ISPConfig 3 managed mailserver with a valid Let's Encrypt SSL certificate." broke the certificate system?
Ah! That's possible. Thanks. I thought the tutorial was something to follow after the server was set up, if the mail subdomain did not have a certificate! I had followed the Perfect Server Guide, and all has been well for several months, except that mail.hugheshome.net did not have a certificate. To solve the missing certificate problem, I followed the "Securing your ISPConfig 3 managed mailserver with a valid Let's Encrypt SSL certificate" tutorial. The initial problem, I think, is that I did not create a site for mail.hugheshome.net -- only the main site, hugheshome.net site. I thought that would be enough. Now that I have the mail. site set up separately (as mentioned in the tutorial) and have run the update script, all is well. --- BTW, How should I have set up the mail subdomain using ispconfig. Should I create it as a "site" under the Site tab or as a subdomain, using the Site tab and then the Websites>website for subdomain menu item?
ISPConfig creates the certificate automatically for the system hostname and this system hostname is what you should use in your email client for incoming and outgoing server name (not a subdomain like mail.yourdomain.tld, unless that's the system hostname). See: https://www.howtoforge.com/ispconfig-email-account/
Thanks till. This is a site created by a reseller. It was originally set up as suggested in the tutorial you linked. The problem, when I set it up like that, is that the certificate the email client sees is the over all server certificate. So, the server is server.example.com and the reseller site and email is reseller.com. If the mail client, Thunderbird, is told to fetch and send email from server.example.com, it will do so without a problem. BUT some recipient sites say there is a problem with emails sent on behalf of [email protected] from server.example.com. I thought that since reseller.com had a certificate, all would be well, but apparently, the mail client fetches the server.example.com certificate creating a misalignment issue.
You might want to check if SPF, DKIM, and DMARC is set up correctly. You must have an SPF record for the client domain and an SPF record for the server hostname server.example.com. The server will always use its own name server.example.com to communicate with other mail servers; it will not use the name that someone used to connect to it by SMTP. So the cert name you changed now will not have any influence on your original issue, it's just a way to hide the server name from a client (which might be useful in case of your reseller), but always keep in mind that such a setup is more fragile, if your reseller would change his dns and SSL cert renewal fails, it will fail for all your other clients and resellers too. That#s why most ISPs prefer to have the central system SSL cert only on their domain name.
Thanks again! Your explanation of the problem with using mail.reseller.com. I didn't know that. I guess I'll need to look for some other source of the delivery problems. And, I'll return to the original setup. (The spf, dkim, and dmarc for server.com are all okay. Same for reseller.com. At least according to the dmarcian report.) I really appreciate your help. The explanation you provided helped now and will help in the future.
You need an SPF for the hostname. Create an SPF record for the exact hostname (e.g. server.yourdomain.com) and not just yourdomain.com. Sounds a bit strange, but it helps. We had this discussion here a few weeks ago.
I'm having similar issue. Everything has been great for several years but after the upgrade to 3.2 now the subdomain mail.domain.com renews but imap won't use it. Postfix will see the new certificate. Nothing was changed. Testing with key and cert shows they match. Reverting to old certificate it works but shows expired certificate.... weird. Bought a Certigo certificate, issued using the CSR generated by ispconfig3.2 and applied it ... it won't work while using the ispconfig fields. Copied the data according the fields like I've always done but while it accepts the data it copies it into the correct locations on the server but imap won't work. Postfix no problem. The certificates are symlinked to the correct files and shared by postfix and dovecot... I'm puzzled! I've invested many hours... and had to manually assign the letsencrypt certificate to both postfix and dovecot. I'd like to use sectigo because I'd not have to worry for about a year. Our other servers run fine using old ispconfig with certbot.... only the one with acme.sh is giving this problem... any hints would be very much appreciated... some times thinking too much gets exhausting and gives no results... I'm at that point. Thanks!
Btw, did anyone was successful upgrading from a ispconfig3.2.12p1 using certbot to ispconfig3.2 using acme.sh? I've installations using certbot that are running great but I'm afraid upgrading to the latest ispconfig will break the certificates. Will it overwrite and re-issue? That would be great! Thanks
Do not switch from Certbot to acme.sh. It makes no sense doing that as both clients are supported equally in ISPConfig.
Understood... but will the latest ispconfig3.3 upgrade and keep certbot or present a prompt to keep certboot? I understood with my tests that 3.3 sets acme.sh as default. Many thanks till
Certbot and acme.sh are equally supported in ISPConfig. ISPConfig does not exchange the acme.sh client on a server. For new systems, acme.sh the default. If you want to migrate an old server to a new server and the old server uses certbot, then ensure that you select certbot as Let's Encrypt client during installation. The ISPConfig auto-installer has a command-line option for that: Code: --use-certbot See: https://www.howtoforge.com/ispconfig-autoinstall-debian-ubuntu/
Will the ispconfig_update.sh --use-certbot work for the update too? Instead of fresh install? Couldn't find info about this detail. Thanks
The Let's Encrypt client is chosen at install time; it can not be changed by an update later. If you installed the system using the wrong client, I recommend formatting the server and reinstalling it.