Search K
Appearance
Appearance
With the release of DirectAdmin 1.62.0, support for Automatic SSL Certificates was added. This will be a quick overview of the feature and a quick guide for debugging when needed.
For the Automatic SSL system to work, several flags must be enabled.
Run the following. All values should throw a value of 1:
da config-get letsencrypt
da config-get admin_ssl_cert_per_vh
da config-get admin_ssl_check_retries
da config-get mail_sni
da config-get admin_ssl_cert_on_createShould any not show 1, set them, eg:
da config-set admin_ssl_cert_per_vh 1The simplest way to disable the Automatic SSL certificate generation is to shut off the admin_ssl_cert_on_create setting:
da config-set admin_ssl_cert_on_create 0
systemctl restart directadminThe admin_ssl_cert_on_create=0 will stop the creation of requests, but existing requests will continue to be retried. If retries need to be shut off as well (fully disable the feature for creation and retries), set da config-set admin_ssl_check_retries 0
The domain in question (and all of it's sub-hosts) must be using the Shared Server Certificate option on the SSL Certificates page, which is the default for new domains.
wildcard=yes when requested. If the fallback also fails, the next_retry is set to a future time (admin_ssl_poll_frequency), and the original request-type is made at that time (eg: it would try the wildcard again).The system will attempt a certificate request based on the possible scenarios:
.ssl request and .ssl.next_retry files for that specific host.admin_ssl_replace_all_expired_invalid=1
admin_ssl_install_to_missing=1These are disabled by default and we'd typically encourage you to keep them disabled as they poll every minute and can create many requests (might be fine for smaller hosts, if needed).
The /etc/virtual/snidomains file is central to this system.
httpd.conf writes do a lookup for their host here (assuming "Shared Server Certificate" is selected). Subdomains look for their exact match, and fallback to looking for a *.domain.com match. A pasted cert/key will always use that cert/key.cross_user_ssl_cert=1 where A sub-domain User would be allowed to reference some other User's certificate. Disabled by default.You can manually see what the Ssl::admin_poll is up to by running it manually wish the SSL debug level:
echo "action=ssl&value=admin_ssl" >> /usr/local/directadmin/data/task.queue.cb
/usr/local/directadmin/dataskq d1245 --custombuildIt will hunt for any relevant next_retry files (or the pro-pack triggers), and attempt those requests.