mauricekindermann
New Pleskian
- Server operating system version
- CentOS 7.9.2009
- Plesk version and microupdate number
- Plesk Obsidian 18.0.71.2
Hi all,
We’ve been troubleshooting an intermittent SSL handshake issue with Cloudflare (Error 525). Cloudflare is in Full (Strict) mode, and we’ve installed a Cloudflare Origin CA certificate in Plesk for our domain (valid until 2040).
Expected: Origin should always serve the Cloudflare Origin CA cert.
Actual: When testing with openssl, we still see a Google Trust Services (WE1) cert (valid until Oct 2025). That mismatch causes Cloudflare to periodically reject the connection.
What we’ve done so far:
Example outputs:
From config (expected)
ssl_certificate /usr/local/psa/var/certificates/XXXXX;
ssl_certificate_key /usr/local/psa/var/certificates/XXXXX;
File contents:
subject= /O=CloudFlare, Inc./OU=CloudFlare Origin CA/CN=CloudFlare Origin Certificate
issuer= /C=US/O=CloudFlare, Inc./OU=CloudFlare Origin SSL Certificate Authority
notAfter= Jul 4 00:57:00 2040 GMT
What clients actually see:
subject= /CN=domain.tld
issuer= /C=US/O=Google Trust Services/CN=WE1
notAfter= Oct 12 16:00:56 2025 GMT
Question:
Why is nginx still serving the old Google Trust / Let’s Encrypt cert, even though Plesk shows the Cloudflare Origin cert as active and the config points to it? Could something else be handling TLS on port 443 (e.g. Apache, sw-cp-server, or a catch-all vhost)?
Would appreciate pointers on where else to check or how to make sure only the Cloudflare Origin cert is actually presented to clients.
We’ve been troubleshooting an intermittent SSL handshake issue with Cloudflare (Error 525). Cloudflare is in Full (Strict) mode, and we’ve installed a Cloudflare Origin CA certificate in Plesk for our domain (valid until 2040).
Expected: Origin should always serve the Cloudflare Origin CA cert.
Actual: When testing with openssl, we still see a Google Trust Services (WE1) cert (valid until Oct 2025). That mismatch causes Cloudflare to periodically reject the connection.
What we’ve done so far:
- Verified in Plesk: only the Cloudflare Origin CA cert is assigned.
- Checked nginx config (/etc/nginx/plesk.conf.d/vhosts/...conf): all ssl_certificate directives point to the Cloudflare cert file.
- Confirmed that file really does contain the Cloudflare Origin CA cert (expires 2040).
- Ran plesk repair web <domain> -y — no errors.
- Reloaded nginx — no change.
- Yet openssl s_client connections still return the Google Trust cert.
Example outputs:
From config (expected)
ssl_certificate /usr/local/psa/var/certificates/XXXXX;
ssl_certificate_key /usr/local/psa/var/certificates/XXXXX;
File contents:
subject= /O=CloudFlare, Inc./OU=CloudFlare Origin CA/CN=CloudFlare Origin Certificate
issuer= /C=US/O=CloudFlare, Inc./OU=CloudFlare Origin SSL Certificate Authority
notAfter= Jul 4 00:57:00 2040 GMT
What clients actually see:
subject= /CN=domain.tld
issuer= /C=US/O=Google Trust Services/CN=WE1
notAfter= Oct 12 16:00:56 2025 GMT
Question:
Why is nginx still serving the old Google Trust / Let’s Encrypt cert, even though Plesk shows the Cloudflare Origin cert as active and the config points to it? Could something else be handling TLS on port 443 (e.g. Apache, sw-cp-server, or a catch-all vhost)?
Would appreciate pointers on where else to check or how to make sure only the Cloudflare Origin cert is actually presented to clients.