Hello everyone,

I’ve been trying to set up a Mumble voice chat server on my home network using a Debian server. As part of the setup process, I need to obtain an SSL certificate from Let’s Encrypt for secure HTTPS access to the server. However, I’m encountering an error when running the Certbot client to request the certificate.

Here’s the command I’m running:

sudo certbot certonly -d mydomain.com

But I get the following error message:

Timeout during connect (likely firewall problem)

I’ve checked my firewall rules and confirmed that I’ve opened port 80 as required for the Let’s Encrypt verification process. Here’s the relevant rule in my ufw configuration:

80/tcp ALLOW Anywhere

Despite this, I’m still getting the timeout error. Has anyone else encountered this issue before? What steps should I take to troubleshoot further?

Thanks in advance for any advice!

18 points
*

Since this is on a home network, have you also forwarded port 80 from your router to your machine running certbot?

This is one of the reasons I use the DNS challenge instead… Then you don’t have to route all these Let’s Encrypt challenges into your internal network.

permalink
report
reply
2 points

like this?

permalink
report
parent
reply
4 points

You don’t need UDP on port 80 forwarded through. HTTP is TCP only.

permalink
report
parent
reply
2 points

HTTP/3 is UDP as well but only on port 443.

permalink
report
parent
reply
3 points

Maybe…? I’m not familiar with that router software, but it looks plausible to me…

permalink
report
parent
reply
10 points

Many home ISPs block port 80 and 25. You should be able to Google that and confirm. If that’s the case you’ll have to use a different method.

permalink
report
reply
6 points

This is the answer. Pretty much every ISP blocks 80 They say it is because worms use it blah blah but it is exactly what you think. They don’t want you running a web server. You’re probably going to have to do the DNS challenge instead.

permalink
report
parent
reply
1 point

ISP said that it does not block port 80

permalink
report
parent
reply
2 points

Try something like https://www.webpagetest.org/ or any other “proxy” service to confirm for youself if it is publicly accessible.

permalink
report
parent
reply
1 point

to Google?

permalink
report
parent
reply
3 points

Google search “Does <isp name> block port 80”

permalink
report
parent
reply
8 points

are you actually running a web server on that host? iirc, certbot will place a temporary token to be served by your web server (Apache, etc.) to show that you actually control the domain you are requesting a cert for.

I switched to DNS based retrieval as soon as let’s encrypt offered it, so its been years since I retrieved certs via http.

permalink
report
reply
1 point

actually I’m not hosting any web servers currently )

permalink
report
parent
reply
3 points

if you are using http cert retrieval, certbot needs a place put the temp. token to authenticate your contrrol of the domain your are creating a certificate for. usually that will be the same webserver you want to serve the certificate from.

if you are not running an actual weberver on port 80 that certbot can insert a token for, certbot cannot complete.

this is, of course, in addition to other possible issues such as ISP port blocking - but without a web server listening on TCP/80, you will have to use other authorization methods (like DNS) to generate a cert.

permalink
report
parent
reply
2 points

what would you recommend to a newbie?

permalink
report
parent
reply
3 points

Check your router and see if you’ve forwarded the port to your server.

permalink
report
reply
3 points
*

Sounds like you have nothing listening on port 80 that resolves for your domain for Let’sEncrypt to verify that you own the domain. You need a webserver listening on port 80 and that Certbot can access if you’re using the http method.

Basically you’re forwarding traffic to port 80 but there’s nothing on port 80.

permalink
report
reply

Selfhosted

!selfhosted@lemmy.world

Create post

A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don’t control.

Rules:

  1. Be civil: we’re here to support and learn from one another. Insults won’t be tolerated. Flame wars are frowned upon.

  2. No spam posting.

  3. Posts have to be centered around self-hosting. There are other communities for discussing hardware or home computing. If it’s not obvious why your post topic revolves around selfhosting, please include details to make it clear.

  4. Don’t duplicate the full text of your blog or github here. Just post the link for folks to click.

  5. Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).

  6. No trolling.

Resources:

Any issues on the community? Report it using the report flag.

Questions? DM the mods!

Community stats

  • 4.7K

    Monthly active users

  • 3.2K

    Posts

  • 71K

    Comments