Skip to main content

Why SSL Certificates Fail to Issue or Renew: ACME Validation, DNS, CAA Records, and Fixes

This guide focuses on the mechanics that block validation: DNS resolution issues, CAA records, proxy/CDN interference, hostname coverage gaps, and reachability problems.

Z
Written by Zoe Handscomb
Updated over 3 months ago

HostBible-managed DV SSL certificates are issued and renewed using ACME-based domain validation. When issuance or renewal fails, it almost always means the Certificate Authority (CA) could not validate control of your domain at the time it tried the check.


This article covers

  • Why HostBible-managed DV SSL can fail to issue or fail to renew

  • Validation blockers:

    • DNS resolution (NXDOMAIN/SERVFAIL, wrong IP/target, propagation, DNSSEC issues)

    • CAA records blocking issuance

    • Proxy/CDN / reverse proxy interference

    • Hostname coverage (apex vs www, wrong hostname)

    • Reachability (port 80/443 blocked, redirects, WAF/firewall)

This article does not cover

  • SSL/TLS basics (DV/OV/EV, wildcard, SAN)

  • Forcing HTTPS / redirect setup (covered elsewhere)

  • Switching nameservers step-by-step (your DNS article covers that)


How HostBible-managed DV SSL validation works (the part that matters for troubleshooting)

For the CA to issue/renew a DV certificate, it must be able to confirm that your domain is under your control. In practice, that means:

  • Your domain must resolve publicly in DNS

  • The CA must be able to reach your domain over the network

  • The validation request must reach the correct origin (your HostBible site/service)

  • Nothing (CAA policies, proxies, firewalls, redirects) can block or alter the validation in a way that breaks the expected response

Renewals repeat these checks periodically (before expiration). A certificate that issued successfully last month can still fail to renew later if DNS/proxy/firewall settings changed.


Quick triage checklist (fastest path to the cause)

1) Confirm the domain resolves publicly (A/AAAA/CNAME)

From any machine with terminal access, run:

# Replace example.com with your domain dig +short example.com A dig +short example.com AAAA dig +short www.example.com A dig +short www.example.com AAAA

What you want to see:

  • Your domain returns records (not blank)

  • The returned IP/target matches where your HostBible site is actually hosted

Red flags:

  • No records returned (often NXDOMAIN)

  • SERVFAIL (commonly DNSSEC/zone issues)

  • Records point to an old server, wrong provider, or a parked/default destination

  • AAAA exists but points somewhere unreachable (IPv6 pitfalls—see below)


2) Check for a CAA record that blocks issuance

dig +short example.com CAA dig +short www.example.com CAA

If you see CAA records and they only authorize a CA that isn’t the one being used for your HostBible-managed DV SSL, issuance/renewal can fail.


3) Identify whether a proxy/CDN is enabled in front of the domain

If your DNS points to a proxy/CDN or reverse proxy rather than directly to HostBible, validation can fail when:

  • the proxy blocks the validation request,

  • the proxy rewrites responses,

  • the proxy forces redirects in a way the CA can’t follow,

  • or the proxy routes to the wrong origin.


4) Confirm reachability (port 80 matters even if you “only use HTTPS”)

Many DV validations still require the CA to access your domain on port 80 (HTTP), even if your site uses HTTPS. Check:

curl -I http://example.com/ curl -I http://www.example.com/

Red flags:

  • timeout / no response

  • connection refused

  • 403/401 from a firewall/WAF

  • redirects to a different domain, or endless redirect loops


5) Confirm you’re requesting the right hostnames

Common mismatch:

  • You expect SSL on both example.com and www.example.com, but only one hostname is actually attached to the HostBible site or included in the certificate order.


Common failure patterns and how to fix them

Issue A: DNS does not resolve (NXDOMAIN) or returns no usable record

Symptoms

  • SSL stays “pending,” “failed,” or renewal fails

  • dig returns nothing for A/AAAA/CNAME

  • Users may see “site can’t be reached” intermittently

Why it breaks ACME
If the CA can’t resolve your hostname in public DNS, it has nowhere to send the validation request.

Fix

  • Ensure the hostname(s) you want secured have valid records:

    • Apex (example.com): usually an A record (and optionally AAAA)

    • www: usually CNAME to the apex or an A record

  • Confirm you edited the authoritative DNS zone (the one your nameservers actually serve)

  • Allow time for propagation if you just changed DNS

Extra DNS edge cases

  • SERVFAIL often indicates a DNS configuration problem (commonly DNSSEC/DS mismatch). Fix DNS errors first—ACME will not validate through a broken zone.

  • Split-horizon DNS (different answers internally vs externally) can fool local tests. Always test using public resolvers.


Issue B: DNS points to the wrong place (validation hits the wrong server/site)

Symptoms

  • Your domain resolves, but SSL still fails

  • curl -I http://example.com/ shows a different website, a default page, or a redirect to somewhere else

  • The CA fetches the challenge from a location that is not your HostBible site

Why it breaks ACME
The CA validates the hostname you requested. If DNS routes that hostname somewhere else, the validation response will not match what HostBible expects to present.

Fix

  • Update the A/AAAA/CNAME records so the hostname points to the correct HostBible destination

  • If you host multiple sites, confirm the domain is attached to the correct site/application inside HostBible (so the platform knows where to answer validation for that hostname)


Issue C: IPv6 (AAAA) record exists but is unreachable or misrouted

Symptoms

  • Some networks can reach your site, others cannot

  • SSL issuance/renewal fails even though IPv4 looks correct

  • DNS shows an AAAA record, but your server/proxy isn’t actually serving IPv6 properly

Why it breaks ACME
Some validators prefer IPv6 when AAAA exists. If the IPv6 address is broken, the CA may fail validation even though IPv4 is fine.

Fix

  • If you don’t intentionally serve IPv6, remove the AAAA record

  • If you do serve IPv6, ensure the IPv6 address is correct and your server/proxy listens properly


Issue D: CAA record blocks the CA from issuing the certificate

Symptoms

  • Error messages mentioning CAA, “forbidden,” or “not permitted by policy”

  • dig … CAA returns one or more CAA records

Why it breaks ACME
CAA records tell certificate authorities whether they are allowed to issue certificates for your domain. If your domain has CAA records that don’t allow the CA used by HostBible-managed DV SSL, issuance and renewals can be blocked.

Fix options

  1. Temporarily remove the CAA record(s), wait for DNS propagation, then retry issuance/renewal.

  2. Update the CAA record(s) to authorize the CA used by HostBible-managed DV SSL.

Important notes about CAA

  • CAA can be set at the apex and affect subdomains depending on lookups up the DNS tree.

  • Multiple CAA records can exist; conflicting or incomplete sets can block issuance.

  • If you’re not sure what CAA value to use, contact HostBible Support with your domain and a screenshot/output of your current CAA lookup.


Issue E: Proxy/CDN/reverse proxy interferes with validation

Symptoms

  • You are using a proxy/CDN in front of your domain

  • curl -I http://example.com/ returns:

    • 403/401

    • a challenge/JS page

    • a bot-check page

    • or caching headers that suggest edge content is being served

  • The .well-known path is blocked or rewritten

Why it breaks ACME
ACME validation requires the CA to fetch a specific response. Proxies/CDNs can block bots, require browser checks, rewrite redirects, cache the wrong thing, or send requests to the wrong origin.

Fix

  • Temporarily disable proxying (set DNS to “DNS only” / direct to origin) during issuance/renewal, then re-enable afterward

  • Ensure your proxy/CDN allows requests to:

    • http://YOURDOMAIN/.well-known/acme-challenge/...

  • Disable or bypass:

    • “bot protection” rules that block automated validation

    • WAF rules that block unknown user agents

    • rules that force authentication or return a 403 for .well-known/*

Tip for testing
A random challenge URL will usually return 404 (that’s okay). What you don’t want is a 403, a browser-check page, or a redirect to another domain:

curl -I http://example.com/.well-known/acme-challenge/test

Issue F: Port 80 is blocked or the domain is not reachable from the public internet

Symptoms

  • curl -I http://example.com/ times out or can’t connect

  • Firewalls/security plugins block unknown traffic

  • Geo/IP restrictions block external validators

Why it breaks ACME
If the CA can’t connect to your domain reliably, it cannot validate.

Fix

  • Allow inbound traffic on:

    • port 80 (HTTP) for validation, and

    • port 443 (HTTPS) for normal secure access

  • Remove or relax firewall/WAF rules that block automated validation requests

  • If you have IP allowlists, ensure they’re not preventing public access during issuance/renewal


Issue G: Redirects break validation (loops, cross-domain redirects, forced rewrites)

Symptoms

  • “Too many redirects”

  • Redirects to a different hostname (e.g., example.comwww.example.net)

  • Redirects to a login page or application route that never serves the expected validation response

Why it breaks ACME
Most validators can follow simple redirects, but validation can fail if:

  • the redirect chain loops,

  • the redirect jumps to a different domain/hostname,

  • the redirected destination is blocked, or

  • the application returns a generic page instead of the validation response.

Fix

  • Remove redirect loops

  • Avoid cross-domain redirects for the hostname you’re validating

  • Ensure the validation path can be served normally (not sent to auth/login routes)

(Redirect/HTTPS-forcing “how to set it up” is covered in a separate HostBible article; the key point here is to avoid redirects that prevent validation from completing.)


Issue H: Hostname coverage mismatch (the certificate request doesn’t match the hostname you’re visiting)

Symptoms

  • SSL works for www.example.com but not example.com (or vice versa)

  • Browser shows certificate name mismatch

  • Only one hostname shows as protected in your dashboard

Why it breaks issuance/renewal
HostBible can only issue/renew for hostnames that are properly added to your site and included in the managed SSL order. If www isn’t configured, it won’t validate (and won’t renew later).

Fix

  • Decide which hostnames you need covered (commonly both example.com and www.example.com)

  • Ensure each hostname:

    • resolves in DNS to the correct destination, and

    • is added/assigned to the correct HostBible site/service


Renewal-specific causes (why it used to work but fails now)

Renewal failures usually happen after a change like:

  • DNS updated to point elsewhere

  • A proxy/CDN was enabled or tightened (WAF/bot protection)

  • CAA records were added/modified

  • Port 80 was blocked (firewall/security hardening)

  • AAAA (IPv6) was added and is not working

  • The domain was moved to a different site/account but the old SSL order remains

The fix is the same: restore validation prerequisites, then retry.


After you fix the blocker: re-issue / retry renewal in HostBible

Once DNS/proxy/CAA/reachability is corrected:

  • Use your HostBible dashboard/tools to retry SSL issuance or re-run certificate provisioning for the affected domain.

  • If the system queues an automated recheck, allow time for DNS propagation and then retry again.

If you still see a failure after you’ve confirmed DNS + reachability are correct, collect the diagnostics below and contact support.


What to send HostBible Support (so we can resolve it faster)

Include:

  1. The domain and the hostname(s):

    • example.com, www.example.com, and any other affected subdomain(s)

  2. Whether a proxy/CDN is enabled in DNS

  3. Output of:

    • dig +short example.com A

    • dig +short example.com AAAA

    • dig +short example.com CAA

  4. Output of:

    • curl -I http://example.com/

    • curl -I http://example.com/.well-known/acme-challenge/test

  5. The exact error text shown in HostBible (or a screenshot)


Summary (what “good” looks like)

HostBible-managed DV SSL can issue/renew when all of the following are true:

  • ✅ Your hostname resolves publicly in DNS (no NXDOMAIN/SERVFAIL)

  • ✅ DNS points to the correct HostBible destination (and not an old server)

  • ✅ No CAA policies block issuance

  • ✅ Proxy/CDN/WAF does not block or rewrite validation requests

  • ✅ Port 80/443 are reachable from the public internet

  • ✅ The requested hostname(s) are correctly attached to your HostBible site/service

If you want, paste your domain’s A/AAAA/CAA lookup outputs to Support team (with the domain redacted if needed), and they’ll tell you which blocker is most likely based on what you’re seeing.

Did this answer your question?