Submitted by toli on Fri, 01/03/2020 - 03:03 Pro Licensee
Hi,
After upgrade to webmin 1.940, ssl letsencrypt does not work.
Let's Encrypt is a free, automated, and open certificate authority that can be used to generate an SSL certificate for use by Virtualmin. However, it cannot be used on your system : The Let's Encrypt client command letsencrypt or certbot was not found on your system
On Debian9 the same. But there is no problem to install certbot on D9.
There is no certbot on D8 jessie.
I can't generate certificates now on D8.
Status:
Active
Comments
Submitted by brad100 on Fri, 01/03/2020 - 04:47 Comment #1
Hi there
Have just updated my Debian 9 install to Webmin 1.940 and can confirm that Lets Encrypt no longer works
When accessing lets Encrypt under SSL Management for the domains this is the information message displayed
Let's Encrypt is a free, automated, and open certificate authority that can be used to generate an SSL certificate for use by Virtualmin.
However, it cannot be used on your system : The Let's Encrypt client command letsencrypt or certbot was not found on your system
After running
apt-get -y install certbot
Lets Encrypt service is found again and existing certs are recognised - I have also requested a new cert which did complete correctly however this message was displayed and the end of the request
Failed to request certificate : Failed to open PID file
Kind Regards Brad
The same issue, the same message after last Webmin update. CentOS 6.10 Webmin 1.940 Virtualmin 6.08 Pro
Even more, every 1:05 hours a hassle messages arrives to the admin emails...so please imagine the system with 500+ users. Please solve this ASAP.
Hi, Brad.
We are releasing Webmin 1.941 pretty soon to address issues for older OSes (CentOS 6 and Debian 8).
What is the output of
whereis certbot
on your Debian 8?Submitted by brad100 on Fri, 01/03/2020 - 06:13 Comment #4
Hi Ilia
Thank you for the update
Unfortunately I do not have any Debian 8 installs with Webmin but on Debian 9
This is the output
~# whereis certbot
certbot:
Sorry not much use.
Kind Regards
Brad
It seems that it's not installed?
You could install it by running:
Before doing it, if you go to Virtualmin/Server Configuration/SSL Certificate, then Let's Encrypt tab - what do you see? I think you don't see the prompt to install it?
I also don't see it on Ubuntu. I suppose it's Debian-like issue.
Jamie, look at the screenshot. There is no Install button under Virtualmin, while there is under Webmin. It seems like a bug to fix before the upcoming release.
Hi Ilia, Do you have any ETA for the release of Webmin 1.941? It's pretty much urgent...
Submitted by brad100 on Fri, 01/03/2020 - 07:21 Comment #7
Hi Ilia
No it is not installed as per my first comment on this issue - after installing and renewing a cert I see this message even though the cert is issued correctly
Failed to request certificate : Failed to open PID file
You are correct regarding the missing certbot install link (in Debian 9)
Kind Regards
Brad
Hi,
I will talk to Jamie to make it as soon as possible. I think all is ready.
You can take minimum risk and update it right now from GitHub repo. Jamie made patches to address this issue on CentOS 6, I believe. If something goes wrong, you can simply re-run
yum reinstall webmin
on the console.I have just tested latest Git version of Webmin on CentOS 6, and it seems to work flawlessly.
Give it a try and return to us as soon as possible.
It will take only few minutes to update, by running the following command:
cd /usr/libexec/webmin && ./update-from-repo.sh -y
Note: You will need to install as well
yum install python-argparse
module for ACME script to work.An update from GitHub repo works well. We've just tested Let's Encrypt - it works. Hope all other features of Virtualmin should works correctly.
Thanks for your help.
Submitted by toli on Fri, 01/03/2020 - 08:47 Pro Licensee Comment #10
There is no certbot in D8. Package is not in the debian repo.
It was in debian jessie backports but now is not possible to install it. Repo is outdated.
You don't need to. Upcoming Webmin release will support it by using ACME script as a fallback.
Like mentioned on my previous comment, you are welcome to give it immediate try.
Please let us know if it worked same fine for you on Debian 8.
Submitted by toli on Fri, 01/03/2020 - 09:02 Pro Licensee Comment #12
updating-from-repo - Requesting certs works again.
Thank You.
Submitted by PaliGap on Mon, 01/06/2020 - 06:25 Pro Licensee Comment #13
The update from GitHub repo seems to work well for CentOS 6.
One question - is there a report or query I can run to get a list of virtual servers that had a failed certificate install? I'm afraid that if I don't manually update them, those sites will go down with "expired certificate" soon.
Submitted by andreychek on Mon, 01/06/2020 - 09:45 Comment #14
I don't believe there's an automated way to show what domains have expired certificates in Virtuamin.
Now, there should be an email from Virtualmin for each domain that failed, you could always look through those.
Another idea is that if you do some scripting, you could write some code that uses the Virtualmin CLI to grab all the SSL expiration dates.
You can list all the domains with SSL enabled with this command: "virtualmin list-domains --with-feature ssl".
And this command will show when a domain's SSL cert expires: "virtualmin get-ssl --domain DOMAIN_NAME".
You could build a script that combines the above and displays a list of all domains and all the SSL expiration dates.
If you aren't familiar with scripting, there's some examples here that may get you started:
https://www.virtualmin.com/documentation/developer/cli_examples
Okay, it's true, Eric is right, there was no such script, so I spent some time today to make one called virtualmin-get-domains-ssl-status.pl
Learn more details here.
The script would produce the following output:
The usage is simple:
It will help you to monitor with ease which domains are about to expire @PaliGap. :)
Submitted by PaliGap on Mon, 01/06/2020 - 11:19 Pro Licensee Comment #16
Many thanks for the Perl script. Did the job perfectly.
You are welcome.
Later it might change the location or even be integrated to UI.
Submitted by djacko on Mon, 01/06/2020 - 16:56 Comment #18
For debian 8 , downgrade to https://sourceforge.net/projects/webadmin/files/webmin/1.930/webmin_1.93... And it works.
Submitted by Blueforce on Mon, 01/06/2020 - 21:07 Pro Licensee Comment #19
Hi,
I have the same issue on CentOS 7
Ilia wrote:
We are releasing Webmin 1.941 pretty soon to address issues for older OSes (CentOS 6 and Debian 8).
Will 1.941 also fix it for CentOS 7 ?Regards, Leffe
Submitted by andreychek on Mon, 01/06/2020 - 23:20 Comment #20
Which issue are you seeing exactly?
Normally on CentOS 7, you should be able to resolve that by installing certbot, which can be done with
yum install certbot
.Submitted by Blueforce on Mon, 01/06/2020 - 23:59 Pro Licensee Comment #21
Hi,
Let's encrypt was working perfectly before last update! Now I get this message on the
Why do Webmin update remove packages or if changing something and not install the required packages so that the system is still working the same way and maintain the functions it had before the update!? Or is this a bug?
What has changed, it was working fine before? if I install Certbot it also requires about 30 dependencies...
Regards, Leffe
Yes, it's better to rely on distro built package (I mean
certbot
), supplied by repo to make sure things will not break out of the blue in the future.Just install
certbot
. New 1.941 will work as it used to be, ifcertbot
command is not installed.Submitted by apt_virtualmin on Tue, 01/07/2020 - 09:36 Pro Licensee Comment #23
For anyone else troubled by the issue of the 1.940 update breaking this previously working letsencrypt functionality. As noted per comment #20 - I installed certbot via
yum install certbot
on CentOS 7 and it immediately restored this functionality on the Server Configuration > SSL Certificate > Let's Encrypt page.Submitted by Blueforce on Tue, 01/07/2020 - 11:35 Pro Licensee Comment #24
Hi apt_virtualmin,
The previous way worked just fine and I don't like to install packages that requires lots of dependencies if I don't have to... As long as the previous way is working and supported we should have a choice and make the selection which one we like to use. As I said, installing certbot also installs 30 dependencies so I prefer to use the previous way with the ACME script which hopefully will be back in 1.941
Regards, Leffe
Yes, Webmin 1.941 should work without installing
certbot
command, even on CentOS 7 server.Submitted by ksihota on Tue, 01/07/2020 - 21:10 Comment #26
Just so I understand this clearly.
Version Webmin 1.940 removed The let's Encrypt client and Webmin 1.941 will reinstall it?
One of my domains updated a little while ago but after the latest update my last Let's Encrypt update attempt failed on another domain. If the update will be out soon I will just wait for it rather than install Certbot. I am running Centos 7. I assume that, if it doesn't work for some reason, I can just use 'yum install certbot' and it will re-enable all my previous setups and I won't have to go through the hassle of getting each domain to work properly again?
Submitted by Blueforce on Tue, 01/07/2020 - 21:29 Pro Licensee Comment #27
Hi ksihota,
I installed certbot (and the 30 dependencies) on one of our CentOs 7 servers just to test, and Let's Encrypt worked exactly as it did before 1.940 update. I tested this just to know that it worked! I will wait for 1.941 for our other server instead of using certbot.
Regards, Leffe
Submitted by andreychek on Tue, 01/07/2020 - 22:53 Comment #28
We highly recommend using certbot, and it's what we'll be moving to at some point in the future.
That will become a dependency of the initial Virtualmin installer, and we plan to make that transition a bit smoother than this one went.
We wanted to go the certbot direction now, but as most of you here saw we ran into some issues in doing so. To resolve that, we put an updated version of the built-in client back for the time being, until all those other issues can be fixed. It'll probably be there awhile. However, as it's a bit of a maintenance headache, and it doesn't support Let's Encrypt's features nearly as well, we'd ultimately like to move purely over to certbot at some point.
I've just run into the same issue - what is the fix for Debian 8, please?
Hi,
The temporary fix would be is to downgrade Webmin to previous version (you will be able to continue requesting certificates for existing domains). Version 1.941, as released would not have this limitation.
To downgrade run the following command:
Submitted by AustinTX on Thu, 01/09/2020 - 23:47 Comment #31
Hi, I discovered this issue tonight (Jan 9) on my host running Ubuntu 14.04.6 LTS. Same messages and results as other people; Toli, Brad100, @Control as above. I was unable to install certbot via apt-get. Downgrading Webmin and clicking [Request Certificate] worked for me. Looking forward to the new, fixed Webmin.
Submitted by microtekblue on Sat, 01/11/2020 - 16:25 Pro Licensee Comment #32
Hi, I am having the same issue.
Using CentOS 7, webmin 1.940.
The happened after upgrade.
"Let's Encrypt is a free, automated, and open certificate authority that can be used to generate an SSL certificate for use by Virtualmin. However, it cannot be used on your system : The Let's Encrypt client command letsencrypt or certbot was not found on your system"
Plz advise fix for CentOs 7.
Thank you
Hi, simply run from inbuilt command shell (Alt+K):
Submitted by bstramsek on Sat, 01/11/2020 - 18:05 Comment #34
Totally see why you switched to official repos for the packages - all good. I just suggest that you document if breaking change is added to the update. With additional popup where you can confirm that you know there is some manual labor needed :)
Submitted by microtekblue on Sat, 01/11/2020 - 18:58 Pro Licensee Comment #35
It worked. Thanks!
It was intended. The user on that screen, should've seen a prompt for installing
certbot
in one click.It will be fixed in 1.941.
Submitted by microtekblue on Sun, 01/12/2020 - 13:10 Pro Licensee Comment #37
"The user on that screen, should've seen a prompt for installing certbot in one click."
I didn't see any prompt to install Certbot, but only the latter message posted.
I'd consider this a production fail to be honest, I think QA needs more work.
One one of my sites lost its SSL certificate. Luckily it wasn't a high traffic site.
I would say this type of update issues should not happen again.
Submitted by andreychek on Sun, 01/12/2020 - 13:14 Comment #38
Ilia is saying that's the bug -- that there isn't a prompt for installing certbot, and all that will be fixed in the upcoming release.
In the meantime though, marking this as resolved. Thanks!
Submitted by pieterG on Mon, 01/13/2020 - 07:51 Comment #39
In addition for those who do run into issues on CentOs 6.10, this workaround... On requesting a new cert in webmin->configuation->ssl encryption->letsencrypt->request cert..
It aborted in the "bootstrap". At the bottom of the log, there is a list of packages that would not be installed apparently as a "Y" is expected. As I did not want to wait for 1.941, I installed all of the required manually. No "Y" required.
Then returned to webmin->configuation->ssl encryption->letsencrypt->request cert and it succeeded.
Submitted by Alkaphreak on Tue, 01/14/2020 - 09:01 Comment #40
Ubuntu 16.04.6 LTS
Same problem here. Tried the dev version, no success.
Rollback to previous working version was the solution.
Please update us for new version.
Submitted by JamieCameron on Tue, 01/14/2020 - 21:25 Comment #41
We just started the process of releasing a 1.941 version of Webmin that should fix this by bringing back the old built-in Let's Encrypt client. If you need it now, you can get it from http://www.webmin.com/devel.html
Hi,
Generating LE Cert classical way via GUI now returns:
@matolog Is this happening on CentOS 7?
What is the output of the following command:
Hello, yes, its CentOS 7
[root@srv2 ~]# yum repolist all
repo id repo name status
C7.0.1406-base/x86_64 CentOS-7.0.1406 - Base disabled
C7.0.1406-centosplus/x86_64 CentOS-7.0.1406 - CentOSPlus disabled
C7.0.1406-extras/x86_64 CentOS-7.0.1406 - Extras disabled
C7.0.1406-fasttrack/x86_64 CentOS-7.0.1406 - Fasttrack disabled
C7.0.1406-updates/x86_64 CentOS-7.0.1406 - Updates disabled
C7.1.1503-base/x86_64 CentOS-7.1.1503 - Base disabled
C7.1.1503-centosplus/x86_64 CentOS-7.1.1503 - CentOSPlus disabled
C7.1.1503-extras/x86_64 CentOS-7.1.1503 - Extras disabled
C7.1.1503-fasttrack/x86_64 CentOS-7.1.1503 - Fasttrack disabled
C7.1.1503-updates/x86_64 CentOS-7.1.1503 - Updates disabled
C7.2.1511-base/x86_64 CentOS-7.2.1511 - Base disabled
C7.2.1511-centosplus/x86_64 CentOS-7.2.1511 - CentOSPlus disabled
C7.2.1511-extras/x86_64 CentOS-7.2.1511 - Extras disabled
C7.2.1511-fasttrack/x86_64 CentOS-7.2.1511 - Fasttrack disabled
C7.2.1511-updates/x86_64 CentOS-7.2.1511 - Updates disabled
C7.3.1611-base/x86_64 CentOS-7.3.1611 - Base disabled
C7.3.1611-centosplus/x86_64 CentOS-7.3.1611 - CentOSPlus disabled
C7.3.1611-extras/x86_64 CentOS-7.3.1611 - Extras disabled
C7.3.1611-fasttrack/x86_64 CentOS-7.3.1611 - Fasttrack disabled
C7.3.1611-updates/x86_64 CentOS-7.3.1611 - Updates disabled
C7.4.1708-base/x86_64 CentOS-7.4.1708 - Base disabled
C7.4.1708-centosplus/x86_64 CentOS-7.4.1708 - CentOSPlus disabled
C7.4.1708-extras/x86_64 CentOS-7.4.1708 - Extras disabled
C7.4.1708-fasttrack/x86_64 CentOS-7.4.1708 - Fasttrack disabled
C7.4.1708-updates/x86_64 CentOS-7.4.1708 - Updates disabled
C7.5.1804-base/x86_64 CentOS-7.5.1804 - Base disabled
C7.5.1804-centosplus/x86_64 CentOS-7.5.1804 - CentOSPlus disabled
C7.5.1804-extras/x86_64 CentOS-7.5.1804 - Extras disabled
C7.5.1804-fasttrack/x86_64 CentOS-7.5.1804 - Fasttrack disabled
C7.5.1804-updates/x86_64 CentOS-7.5.1804 - Updates disabled
C7.6.1810-base/x86_64 CentOS-7.6.1810 - Base disabled
C7.6.1810-centosplus/x86_64 CentOS-7.6.1810 - CentOSPlus disabled
C7.6.1810-extras/x86_64 CentOS-7.6.1810 - Extras disabled
C7.6.1810-fasttrack/x86_64 CentOS-7.6.1810 - Fasttrack disabled
C7.6.1810-updates/x86_64 CentOS-7.6.1810 - Updates disabled
base/7/x86_64 CentOS-7 - Base enabled: 10093+4
base-debuginfo/x86_64 CentOS-7 - Debuginfo disabled
base-source/7 CentOS-7 - Base Sources disabled
c7-media CentOS-7 - Media disabled
centos-sclo-rh/x86_64 CentOS-7 - SCLo rh enabled: 8770
centos-sclo-rh-debuginfo/x86_64 CentOS-7 - SCLo rh Debuginfo disabled
centos-sclo-rh-source CentOS-7 - SCLo rh Sources disabled
centos-sclo-rh-testing/x86_64 CentOS-7 - SCLo rh Testing disabled
centos-sclo-sclo/x86_64 CentOS-7 - SCLo sclo enabled: 870
centos-sclo-sclo-debuginfo/x86_64 CentOS-7 - SCLo sclo Debuginf disabled
centos-sclo-sclo-source CentOS-7 - SCLo sclo Sources disabled
centos-sclo-sclo-testing/x86_64 CentOS-7 - SCLo sclo Testing disabled
centosplus/7/x86_64 CentOS-7 - Plus disabled
centosplus-source/7 CentOS-7 - Plus Sources disabled
cr/7/x86_64 CentOS-7 - cr disabled
epel/x86_64 Extra Packages for Enterprise enabled: 13509
epel-bacula7/7/x86_64 Bacula backports from rawhide enabled: 13
epel-bacula7-source/7 Bacula backports from rawhide disabled
epel-debuginfo/x86_64 Extra Packages for Enterprise disabled
epel-source/x86_64 Extra Packages for Enterprise disabled
epel-testing/x86_64 Extra Packages for Enterprise disabled
epel-testing-debuginfo/x86_64 Extra Packages for Enterprise disabled
epel-testing-source/x86_64 Extra Packages for Enterprise disabled
extras/7/x86_64 CentOS-7 - Extras enabled: 307
extras-source/7 CentOS-7 - Extras Sources disabled
fasttrack/7/x86_64 CentOS-7 - fasttrack disabled
remi Remi's RPM repository for Ent disabled
remi-debuginfo/x86_64 Remi's RPM repository for Ent disabled
remi-glpi91 Remi's GLPI 9.1 RPM repositor disabled
remi-glpi92 Remi's GLPI 9.2 RPM repositor disabled
remi-glpi93 Remi's GLPI 9.3 RPM repositor disabled
remi-glpi94 Remi's GLPI 9.4 RPM repositor disabled
remi-modular Remi's Modular repository for disabled
remi-modular-test Remi's Modular testing reposi disabled
remi-php54 Remi's PHP 5.4 RPM repository disabled
remi-php55 Remi's PHP 5.5 RPM repository disabled
remi-php55-debuginfo/x86_64 Remi's PHP 5.5 RPM repository disabled
remi-php56 Remi's PHP 5.6 RPM repository disabled
remi-php56-debuginfo/x86_64 Remi's PHP 5.6 RPM repository disabled
remi-php70 Remi's PHP 7.0 RPM repository enabled: 424
remi-php70-debuginfo/x86_64 Remi's PHP 7.0 RPM repository disabled
remi-php70-test Remi's PHP 7.0 test RPM repos disabled
remi-php70-test-debuginfo/x86_64 Remi's PHP 7.0 test RPM repos disabled
remi-php71 Remi's PHP 7.1 RPM repository enabled: 434
remi-php71-debuginfo/x86_64 Remi's PHP 7.1 RPM repository disabled
remi-php71-test Remi's PHP 7.1 test RPM repos disabled
remi-php71-test-debuginfo/x86_64 Remi's PHP 7.1 test RPM repos disabled
remi-php72 Remi's PHP 7.2 RPM repository enabled: 397
remi-php72-debuginfo/x86_64 Remi's PHP 7.2 RPM repository disabled
remi-php72-test Remi's PHP 7.2 test RPM repos disabled
remi-php72-test-debuginfo/x86_64 Remi's PHP 7.2 test RPM repos disabled
remi-php73 Remi's PHP 7.3 RPM repository disabled
remi-php73-debuginfo/x86_64 Remi's PHP 7.3 RPM repository disabled
remi-php73-test Remi's PHP 7.3 test RPM repos disabled
remi-php73-test-debuginfo/x86_64 Remi's PHP 7.3 test RPM repos disabled
remi-php74 Remi's PHP 7.4 RPM repository disabled
remi-php74-debuginfo/x86_64 Remi's PHP 7.4 RPM repository disabled
remi-php74-test Remi's PHP 7.4 test RPM repos disabled
remi-php74-test-debuginfo/x86_64 Remi's PHP 7.4 test RPM repos disabled
remi-safe Safe Remi's RPM repository fo enabled: 3669
remi-safe-debuginfo/x86_64 Remi's RPM repository for Ent disabled
remi-test Remi's test RPM repository fo disabled
remi-test-debuginfo/x86_64 Remi's test RPM repository fo disabled
updates/7/x86_64 CentOS-7 - Updates enabled: 1008+4
updates-source/7 CentOS-7 - Updates Sources disabled
virtualmin/7/x86_64 RHEL/CentOS 7 - x86_64 - Virt enabled: 41
virtualmin-universal Virtualmin Distribution Neutr enabled: 46
zabbix/x86_64 Zabbix Official Repository - enabled: 237
zabbix-debuginfo/x86_64 Zabbix Official Repository de disabled
zabbix-non-supported/x86_64 Zabbix Official Repository no enabled: 4
repolist: 39822
Submitted by Alkaphreak on Mon, 01/20/2020 - 03:56 Comment #45
Hi, i've updated at the end of last week and tried to renew my certs and all worked like a charm.
Thanks a lot.
Hi, still have the same errors
@matolog What OS do you use? Do you have
certbot
package installed? What are the actual errors that you see, when requesting new certificate?@Ilia i provided more infos in previous comments.
Submitted by Neboysha on Mon, 02/03/2020 - 09:24 Comment #49
@matolog, just came across similar problem as I have had installed python-pip on my amazon aws so the problem was urllib3 that was installed via pip, solution form here https://bugzilla.redhat.com/show_bug.cgi?id=1738348 helped me
I uninstalled urllib3 from pip and installed via yum
pip uninstall urllib3
yum install python-urllib3
and SSL from Virtualmin works again
Centos 7 and Virtualmin
Webmin version 1.941 Usermin version 1.791 Virtualmin version 6.08 Authentic theme version 19.45
Hi,
Thanks. I run both commands, pip uninstall, and urllib3, and yum install python-urllib3, now error is different:
@matolog Have you tried Googling this error first?
Have you tired running
yum clean all
and then reinstallingcertbot
package?What is the output of commands:
whereis certbot
yum info certbot
Exiting thread...
Submitted by Neboysha on Mon, 02/03/2020 - 13:48 Comment #53
Hello, not sure butI have a feeling that your python installation is not in good state like mixed packages from different repos.
If you have had installed python-pip earlier you might updated some python libs via pip and other were installed via yum. Check if you have pip installed
pip --version
Have you had a problem with yum update so far? As I checked on all 3 server I installed python-pip and updated python via pip earlier (I think it was when I installed aws cli) I have had yum update problem and always was a problem with urllib3. And all 3 server had a problem to update/request new Let's Encrypt.
So this solution https://bugzilla.redhat.com/show_bug.cgi?id=1738348 worked for me on all 3 servers.
Hope you will find a solution for your problem.
Submitted by Swiftspeedtech on Mon, 05/04/2020 - 05:42 Comment #54
If you are using centos just run 'yum install certbot' it will fix all lets encrypt issue. Make sure your dns is also pointing to correct nameservers