Posts by Eomer

    Hey Guys,


    im using:


    Let's Encrypt Plugin
    Version 3.0.0


    IMSCP
    Version 1.4.2


    Latest Apache2 and Debian 8.7


    IPv6 is enabled.



    Every time im trying to reach one of the subdomains (no problem with the panel) from home its done with ipv6.
    Im receiving an error message


    "SSL_ERROR_RX_RECORD_TOO_LONG"


    No problems from my mobile network (ipv4)


    I checked the "teamspeak.isportz.eu_ssl.conf" file to see whats going on.



    Code
    1. <VirtualHost 93.159.253.78:443 [2a00:fe0:1:4d:5054:ff:fe00:c]:80>
    2. ServerAdmin webmaster@sinusbot.isportz.eu
    3. ServerName sinusbot.isportz.eu

    The IPv4 address is port 443 and the IPv6 address is port 80.


    I solved it by changing the IPv6 port from 80 to 443 but i don't want it to be overwritten as soon as i change something in the panel



    What do i have to do that it will be set as 443? What am i missing?



    best regards

    • For which domain?
    • Did you reconfigured i-MSCP by running the i-MSCP reconfiguration script?
    • Latest letsentcrypt log?


    If you cannot figure out alone, give us access to your server.

    I would like to at least try to figure it out first. If that doesnt work i would love to grant you access.


    1. for rlxd.de / server1.rlxd.de
    2. yes
    3.

    Code
    1. 2017-04-12 07:45:28,431:DEBUG:certbot.log:Root logging level set at 302017-04-12 07:45:28,432:INFO:certbot.log:Saving debug log to /var/log/letsencrypt/letsencrypt.log2017-04-12 07:45:28,433:DEBUG:certbot.main:certbot version: 0.13.02017-04-12 07:45:28,433:DEBUG:certbot.main:Arguments: ['--quiet', '--agree-tos', '--email', 'imscp.rlxd.de.mails@kourgiantakis.com', '--webroot', '--webroot-path', '/var/www/imscp/gui/plugins/LetsEncrypt/acme', '--preferred-challenges', 'http', '--allow-subset-of-names', '--domains', 'server1.rlxd.de']2017-04-12 07:45:28,434:DEBUG:certbot.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#standalone,PluginEntryPoint#manual,PluginEntryPoint#nginx,PluginEntryPoint#webroot,PluginEntryPoint#apache,PluginEntryPoint#null)2017-04-12 07:45:28,435:DEBUG:certbot.plugins.selection:Requested authenticator webroot and installer None2017-04-12 07:45:28,441:DEBUG:certbot.plugins.selection:Single candidate plugin: * webrootDescription: Place files in webroot directoryInterfaces: IAuthenticator, IPluginEntry point: webroot = certbot.plugins.webroot:AuthenticatorInitialized: <certbot.plugins.webroot.Authenticator object at 0x7fcda602b190>Prep: True2017-04-12 07:45:28,442:DEBUG:certbot.plugins.selection:Selected authenticator <certbot.plugins.webroot.Authenticator object at 0x7fcda602b190> and installer None2017-04-12 07:45:28,449:DEBUG:certbot.main:Picked account: <Account(a050ee80ed04caab2eb0666c48c2cc52)>2017-04-12 07:45:28,451:DEBUG:acme.client:Sending GET request to https://acme-v01.api.letsencrypt.org/directory.2017-04-12 07:45:28,457:DEBUG:requests.packages.urllib3.connectionpool:Starting new HTTPS connection (1): acme-v01.api.letsencrypt.org2017-04-12 07:45:28,738:DEBUG:requests.packages.urllib3.connectionpool:https://acme-v01.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 3522017-04-12 07:45:28,740:DEBUG:acme.client:Received response:HTTP 200Server: nginxContent-Type: application/jsonContent-Length: 352Boulder-Request-Id: cLjpBxgkSivRotheQH5TgqkTYZCTva9Mh3oZYzwFKakReplay-Nonce: 6-I90pzUcph6fMPYDMFEDrAewQOZ0hmXsxE9uWlFzdQX-Frame-Options: DENYStrict-Transport-Security: max-age=604800Expires: Wed, 12 Apr 2017 07:46:31 GMTCache-Control: max-age=0, no-cache, no-storePragma: no-cacheDate: Wed, 12 Apr 2017 07:46:31 GMTConnection: keep-alive{ "key-change": "https://acme-v01.api.letsencrypt.org/acme/key-change", "new-authz": "https://acme-v01.api.letsencrypt.org/acme/new-authz", "new-cert": "https://acme-v01.api.letsencrypt.org/acme/new-cert", "new-reg": "https://acme-v01.api.letsencrypt.org/acme/new-reg", "revoke-cert": "https://acme-v01.api.letsencrypt.org/acme/revoke-cert"}2017-04-12 07:45:28,758:INFO:certbot.main:Obtaining a new certificate2017-04-12 07:45:28,758:DEBUG:acme.client:Requesting fresh nonce2017-04-12 07:45:28,759:DEBUG:acme.client:Sending HEAD request to https://acme-v01.api.letsencrypt.org/acme/new-authz.2017-04-12 07:45:28,961:DEBUG:requests.packages.urllib3.connectionpool:https://acme-v01.api.letsencrypt.org:443 "HEAD /acme/new-authz HTTP/1.1" 405 02017-04-12 07:45:28,963:DEBUG:acme.client:Received response:HTTP 405Server: nginxContent-Type: application/problem+jsonContent-Length: 91Allow: POSTBoulder-Request-Id: atXIylnfBJvCd4JaviTfSvT39qYNRgSeSOyZHjUBQN8Replay-Nonce: SkM80HxIoxpx3-ZlCQQymci-SXkvViNzVT0GsyZLKZcExpires: Wed, 12 Apr 2017 07:46:31 GMTCache-Control: max-age=0, no-cache, no-storePragma: no-cacheDate: Wed, 12 Apr 2017 07:46:31 GMTConnection: keep-alive2017-04-12 07:45:28,963:DEBUG:acme.client:Storing nonce: SkM80HxIoxpx3-ZlCQQymci-SXkvViNzVT0GsyZLKZc2017-04-12 07:45:28,970:DEBUG:acme.client:JWS payload:{ "identifier": { "type": "dns", "value": "server1.rlxd.de" }, "resource": "new-authz"}2017-04-12 07:45:28,984:DEBUG:acme.client:Sending POST request to https://acme-v01.api.letsencrypt.org/acme/new-authz:{ "header": { "alg": "RS256", "jwk": { "e": "AQAB", "kty": "RSA", "n": "5IbQc0z-yF537bM2RHl_oHo32w1InBKibEiqKv6h2OhVr-abewhox1z-otfBtyOneGwFqgSypUckb9SDojfNQTPxC8jc94HsynHEW5ZPVNj19Xy-no8GWf15TYrS51PnN9zq8S-JsoDBDoMXkGTLtyIH6NsGSyQhTFFv2vfXQZegZQOh3QK9G6uyGPxUEQOId54N7-GxKKMVv893NAq6mk0aH9555NSJIF0mfX6rYGFOnSOD3TLXQF6Dds5oBjV4xZgRJ_vxSR3Ec8HhaIkYlVKProHwlCCTYzdhzrBjOmsfJ-SD39w937JgHtDtDxneNViTx4Op8ikBGJM8vHGouQ" } }, "protected": "eyJub25jZSI6ICJTa004MEh4SW94cHgzLVpsQ1FReW1jaS1TWGt2VmlOelZUMEdzeVpMS1pjIn0", "payload": "ewogICJpZGVudGlmaWVyIjogewogICAgInR5cGUiOiAiZG5zIiwgCiAgICAidmFsdWUiOiAic2VydmVyMS5ybHhkLmRlIgogIH0sIAogICJyZXNvdXJjZSI6ICJuZXctYXV0aHoiCn0", "signature": "ZpKMw2pJzIEdse7y9Oneqr94KsKPEyqzJViW9fRNISPhAGYOCF7eJXmuUqncjyigw_C0493HckLWsGp2_gZIV8BiY6jQqa-yESJFdd9aRIVLAoqDK_EF-Ad5DpKw1zYN6a3WU5rj9rf7JRf6bgj64CE6W-I770Qt8n78KDD7P1jg4fpn_FMlWaw45AvzTz2UC_c0TIoX1-ovp2vwZWYphrCg37GZ7RH1xCdSMAWVgHweMiV3aVI1QG48Wg4RMuZlxMt7RGsCc0FHBSqZcWw3KJQzul8VmE13BJlzPme93j1kl5QCMgH4Tpm82KgL1-AB00ace4ZWt-G9Z8vOmw9X7Q"}2017-04-12 07:45:29,223:DEBUG:requests.packages.urllib3.connectionpool:https://acme-v01.api.letsencrypt.org:443 "POST /acme/new-authz HTTP/1.1" 201 10032017-04-12 07:45:29,225:DEBUG:acme.client:Received response:HTTP 201Server: nginxContent-Type: application/jsonContent-Length: 1003Boulder-Request-Id: EqVuiNf0oV3oLW62Evao4IbwB7eAbRh4pOMzEeoPe5MBoulder-Requester: 11855201Link: <https://acme-v01.api.letsencrypt.org/acme/new-cert>;rel="next"Location: https://acme-v01.api.letsencrypt.org/acme/authz/r3t3uzxDQyPa716N9Yw4QG-eyPZ0_-3Z4ywrja5fRigReplay-Nonce: waXDOPSoy2lyrpfUfhJLsdVCgxrLF7jih2v20igOMGoX-Frame-Options: DENYStrict-Transport-Security: max-age=604800Expires: Wed, 12 Apr 2017 07:46:32 GMTCache-Control: max-age=0, no-cache, no-storePragma: no-cacheDate: Wed, 12 Apr 2017 07:46:32 GMTConnection: keep-alive{ "identifier": { "type": "dns", "value": "server1.rlxd.de" }, "status": "pending", "expires": "2017-04-19T07:46:32.137244222Z", "challenges": [ { "type": "dns-01", "status": "pending", "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/r3t3uzxDQyPa716N9Yw4QG-eyPZ0_-3Z4ywrja5fRig/1007782229", "token": "hnw-A0cyQOZhtB4_75iPmzVgg64EaWXGpjSNFyqXcmg" }, { "type": "tls-sni-01", "status": "pending", "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/r3t3uzxDQyPa716N9Yw4QG-eyPZ0_-3Z4ywrja5fRig/1007782230", "token": "F741vBdGCtrbz5jpVkBXCo9juS3viO0w5OBSahULXpQ" }, { "type": "http-01", "status": "pending", "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/r3t3uzxDQyPa716N9Yw4QG-eyPZ0_-3Z4ywrja5fRig/1007782231", "token": "0Y19piIBQlg6Wos-WuXTCjTYBiN-CPIRqeOaO_GJ40I" } ], "combinations": [ [ 1 ], [ 0 ], [ 2 ] ]}2017-04-12 07:45:29,225:DEBUG:acme.client:Storing nonce: waXDOPSoy2lyrpfUfhJLsdVCgxrLF7jih2v20igOMGo2017-04-12 07:45:29,227:INFO:certbot.auth_handler:Performing the following challenges:2017-04-12 07:45:29,227:INFO:certbot.auth_handler:http-01 challenge for server1.rlxd.de2017-04-12 07:45:29,228:INFO:certbot.plugins.webroot:Using the webroot path /var/www/imscp/gui/plugins/LetsEncrypt/acme for all unmatched domains.2017-04-12 07:45:29,228:DEBUG:certbot.plugins.webroot:Creating root challenges validation dir at /var/www/imscp/gui/plugins/LetsEncrypt/acme/.well-known/acme-challenge2017-04-12 07:45:29,241:DEBUG:certbot.plugins.webroot:Attempting to save validation to /var/www/imscp/gui/plugins/LetsEncrypt/acme/.well-known/acme-challenge/0Y19piIBQlg6Wos-WuXTCjTYBiN-CPIRqeOaO_GJ40I2017-04-12 07:45:29,243:INFO:certbot.auth_handler:Waiting for verification...2017-04-12 07:45:29,243:DEBUG:acme.client:JWS payload:{ "keyAuthorization": "0Y19piIBQlg6Wos-WuXTCjTYBiN-CPIRqeOaO_GJ40I.Q9Jp32ByM_KZJ5QU3XNGWMqCkIFVh8Bo5X8X46iQP9A", "type": "http-01", "resource": "challenge"}2017-04-12 07:45:29,252:DEBUG:acme.client:Sending POST request to https://acme-v01.api.letsencrypt.org/acme/challenge/r3t3uzxDQyPa716N9Yw4QG-eyPZ0_-3Z4ywrja5fRig/1007782231:{ "header": { "alg": "RS256", "jwk": { "e": "AQAB", "kty": "RSA", "n": "5IbQc0z-yF537bM2RHl_oHo32w1InBKibEiqKv6h2OhVr-abewhox1z-otfBtyOneGwFqgSypUckb9SDojfNQTPxC8jc94HsynHEW5ZPVNj19Xy-no8GWf15TYrS51PnN9zq8S-JsoDBDoMXkGTLtyIH6NsGSyQhTFFv2vfXQZegZQOh3QK9G6uyGPxUEQOId54N7-GxKKMVv893NAq6mk0aH9555NSJIF0mfX6rYGFOnSOD3TLXQF6Dds5oBjV4xZgRJ_vxSR3Ec8HhaIkYlVKProHwlCCTYzdhzrBjOmsfJ-SD39w937JgHtDtDxneNViTx4Op8ikBGJM8vHGouQ" } }, "protected": "eyJub25jZSI6ICJ3YVhET1BTb3kybHlycGZVZmhKTHNkVkNneHJMRjdqaWgydjIwaWdPTUdvIn0", "payload": "ewogICJrZXlBdXRob3JpemF0aW9uIjogIjBZMTlwaUlCUWxnNldvcy1XdVhUQ2pUWUJpTi1DUElScWVPYU9fR0o0MEkuUTlKcDMyQnlNX0taSjVRVTNYTkdXTXFDa0lGVmg4Qm81WDhYNDZpUVA5QSIsIAogICJ0eXBlIjogImh0dHAtMDEiLCAKICAicmVzb3VyY2UiOiAiY2hhbGxlbmdlIgp9", "signature": "ueCqDcerZsPh4chVWj_eIMSzZICFqWwXs5b7gUjxE6cnSI3I3hbq9hpRcWCWrImC8c3M5eRNLUFZpkhB8RBjW0MhGWRt0NuxdHejSca2Qx9OHScRlp1mktxFwwrE_pioV5IPeD2c-GNMhtN1XwUW_mL_OcZd-rTKfMShMCHlZLIG35zW25HyeSZ4z31du0WXn1Urdjq2HwtRzhqWPCL_g_DWoPxA8ZCpc6C9VRG-PW4Cmg7Ycu7ac-0F4DP83--dpqUxbhvrgwTuvXrNCz3G4vkifWVzdJ7yZjLMybrGb-QiNr-m8ij5nTRhEiXbcOCpVm4PoWffpaxAgUD3PGpmxA"}2017-04-12 07:45:29,511:DEBUG:requests.packages.urllib3.connectionpool:https://acme-v01.api.letsencrypt.org:443 "POST /acme/challenge/r3t3uzxDQyPa716N9Yw4QG-eyPZ0_-3Z4ywrja5fRig/1007782231 HTTP/1.1" 202 3362017-04-12 07:45:29,531:DEBUG:acme.client:Received response:HTTP 202Server: nginxContent-Type: application/jsonContent-Length: 336Boulder-Request-Id: XkMosIN3Z0axkkWe20S0RxqyBz5slMwc2CZ6VscQv_EBoulder-Requester: 11855201Link: <https://acme-v01.api.letsencrypt.org/acme/authz/r3t3uzxDQyPa716N9Yw4QG-eyPZ0_-3Z4ywrja5fRig>;rel="up"Location: https://acme-v01.api.letsencrypt.org/acme/challenge/r3t3uzxDQyPa716N9Yw4QG-eyPZ0_-3Z4ywrja5fRig/1007782231Replay-Nonce: t0K8mv3CWDE6hWHfyGJ2u1uAyvQ4oYRZ9FpZ6JV3w9AExpires: Wed, 12 Apr 2017 07:46:32 GMTCache-Control: max-age=0, no-cache, no-storePragma: no-cacheDate: Wed, 12 Apr 2017 07:46:32 GMTConnection: keep-alive{ "type": "http-01", "status": "pending", "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/r3t3uzxDQyPa716N9Yw4QG-eyPZ0_-3Z4ywrja5fRig/1007782231", "token": "0Y19piIBQlg6Wos-WuXTCjTYBiN-CPIRqeOaO_GJ40I", "keyAuthorization": "0Y19piIBQlg6Wos-WuXTCjTYBiN-CPIRqeOaO_GJ40I.Q9Jp32ByM_KZJ5QU3XNGWMqCkIFVh8Bo5X8X46iQP9A"}2017-04-12 07:45:29,532:DEBUG:acme.client:Storing nonce: t0K8mv3CWDE6hWHfyGJ2u1uAyvQ4oYRZ9FpZ6JV3w9A2017-04-12 07:45:32,544:DEBUG:acme.client:Sending GET request to https://acme-v01.api.letsencrypt.org/acme/authz/r3t3uzxDQyPa716N9Yw4QG-eyPZ0_-3Z4ywrja5fRig.2017-04-12 07:45:32,735:DEBUG:requests.packages.urllib3.connectionpool:https://acme-v01.api.letsencrypt.org:443 "GET /acme/authz/r3t3uzxDQyPa716N9Yw4QG-eyPZ0_-3Z4ywrja5fRig HTTP/1.1" 200 19322017-04-12 07:45:32,738:DEBUG:acme.client:Received response:HTTP 200Server: nginxContent-Type: application/jsonContent-Length: 1932Boulder-Request-Id: RwpPlMPuhfI8BGY_ky-g2KtkweZBtARG7stju_Pxa_ALink: <https://acme-v01.api.letsencrypt.org/acme/new-cert>;rel="next"Replay-Nonce: avfJ1mJ2kPRtGuL1ym1n-FbT9I8QolEf8Dj0lOY88egX-Frame-Options: DENYStrict-Transport-Security: max-age=604800Expires: Wed, 12 Apr 2017 07:46:35 GMTCache-Control: max-age=0, no-cache, no-storePragma: no-cacheDate: Wed, 12 Apr 2017 07:46:35 GMTConnection: keep-alive{ "identifier": { "type": "dns", "value": "server1.rlxd.de" }, "status": "invalid", "expires": "2017-04-19T07:46:32Z", "challenges": [ { "type": "dns-01", "status": "pending", "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/r3t3uzxDQyPa716N9Yw4QG-eyPZ0_-3Z4ywrja5fRig/1007782229", "token": "hnw-A0cyQOZhtB4_75iPmzVgg64EaWXGpjSNFyqXcmg" }, { "type": "tls-sni-01", "status": "pending", "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/r3t3uzxDQyPa716N9Yw4QG-eyPZ0_-3Z4ywrja5fRig/1007782230", "token": "F741vBdGCtrbz5jpVkBXCo9juS3viO0w5OBSahULXpQ" }, { "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:unauthorized", "detail": "Invalid response from http://server1.rlxd.de/.well-known/acme-challenge/0Y19piIBQlg6Wos-WuXTCjTYBiN-CPIRqeOaO_GJ40I: \"\u003c!DOCTYPE html\u003e\n\u003chtml lang=\"en\"\u003e\n\u003chead\u003e\n \u003ctitle\u003ei-MSCP internet - Multi Server Control Panel - Error 404\u003c/title\u003e\n \u003cmeta ch\"", "status": 403 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/r3t3uzxDQyPa716N9Yw4QG-eyPZ0_-3Z4ywrja5fRig/1007782231", "token": "0Y19piIBQlg6Wos-WuXTCjTYBiN-CPIRqeOaO_GJ40I", "keyAuthorization": "0Y19piIBQlg6Wos-WuXTCjTYBiN-CPIRqeOaO_GJ40I.Q9Jp32ByM_KZJ5QU3XNGWMqCkIFVh8Bo5X8X46iQP9A", "validationRecord": [ { "url": "http://server1.rlxd.de/.well-known/acme-challenge/0Y19piIBQlg6Wos-WuXTCjTYBiN-CPIRqeOaO_GJ40I", "hostname": "server1.rlxd.de", "port": "80", "addressesResolved": [ "93.159.253.78", "2a00:fe0:1:4d:5054:ff:fe00:c" ], "addressUsed": "93.159.253.78" } ] } ], "combinations": [ [ 1 ], [ 0 ], [ 2 ] ]}2017-04-12 07:45:32,739:WARNING:certbot.auth_handler:Challenge failed for domain server1.rlxd.de2017-04-12 07:45:32,740:INFO:certbot.auth_handler:Cleaning up challenges2017-04-12 07:45:32,740:DEBUG:certbot.plugins.webroot:Removing /var/www/imscp/gui/plugins/LetsEncrypt/acme/.well-known/acme-challenge/0Y19piIBQlg6Wos-WuXTCjTYBiN-CPIRqeOaO_GJ40I2017-04-12 07:45:32,741:DEBUG:certbot.plugins.webroot:All challenges cleaned up, removing /var/www/imscp/gui/plugins/LetsEncrypt/acme/.well-known/acme-challenge2017-04-12 07:45:32,744:DEBUG:certbot.log:Exiting abnormally:Traceback (most recent call last): File "/root/.local/share/letsencrypt/bin/letsencrypt", line 11, in <module> sys.exit(main()) File "/root/.local/share/letsencrypt/local/lib/python2.7/site-packages/certbot/main.py", line 755, in main return config.func(config, plugins) File "/root/.local/share/letsencrypt/local/lib/python2.7/site-packages/certbot/main.py", line 682, in certonly lineage = _get_and_save_cert(le_client, config, domains, certname, lineage) File "/root/.local/share/letsencrypt/local/lib/python2.7/site-packages/certbot/main.py", line 82, in _get_and_save_cert lineage = le_client.obtain_and_enroll_certificate(domains, certname) File "/root/.local/share/letsencrypt/local/lib/python2.7/site-packages/certbot/client.py", line 316, in obtain_and_enroll_certificate certr, chain, key, _ = self.obtain_certificate(domains) File "/root/.local/share/letsencrypt/local/lib/python2.7/site-packages/certbot/client.py", line 285, in obtain_certificate self.config.allow_subset_of_names) File "/root/.local/share/letsencrypt/local/lib/python2.7/site-packages/certbot/auth_handler.py", line 92, in get_authorizations "Challenges failed for all domains")AuthorizationError: Challenges failed for all domains


    How imscp is configured:


    1. Hostname: server1.rlxd.de
    2. Domain name for the panel: imscp.rlxd.de



    I've been trying different combinations (i don't know if that makes sense)


    Hostname server1.rlxd.de, domain name for the panel server1.rlxd.de
    Hostname server1.rlxd.de, domain name for the panel rlxd.de


    My hosts:



    One weird thing is that the reconfiguration of the panel always deletes the ipv6-address. I had to add it myself.

    You're right. I reconfigured the hoe.


    Now the hostname is:


    server1.rlxd.de


    I reconfigured the panel to listen to imscp.rlxd.de.



    Code
    1. 127.0.0.1 server1.rlxd.de.local localhost
    2. 93.159.253.78 server1.rlxd.de server1
    3. # The following lines are desirable for IPv6 capable hosts
    4. ::1 localhost ip6-localhost ip6-loopback
    5. fe00::0 ip6-localnet
    6. ff00::0 ip6-mcastprefix
    7. ff02::1 ip6-allnodes
    8. ff02::2 ip6-allrouters


    I reconfigured everything following this tut:


    https://www.serverbiz.de/debia…aft-andern-fqdn-anpassen/



    My provider checked the DNS settings and said "everything is fine". Creating a certificate still fails. any idea?

    Hey,


    i'm trying to create some ssl certificates for my panel but it's failing.


    i changed my panels domain today. It was "server1.rlxd.de" and now it's "rlxd.de"



    The first issue is: It's showing me


    Code
    1. Challenge failed for domain server1.rlxd.deChallenge failed for domain rlxd.deChallenges failed for all domains


    Why is it still showing "server1.rlxd.de" eben though i changed it?


    Why does it fail?


    i-MSCP 1.4.1
    Build: 20170328
    Codename: Zimmer


    Debian 8.7

    I don't know if this is relevant but heres the info from my host file:
    127.0.0.1 www.rlxd.de.local localhost
    93.159.253.78 www.rlxd.de www



    I dont know which part you'll need so here's the complete logfile:




    Oh...i used google search and the thread was not listed yet probably.


    Thank you! I figured it out (just copied it to PMA). Okay, i've found the user. So this is just an old user which was marked "to delete"?
    Is it sufficient to just press the delete button (screenshot attached)?



    And thanks a lot. Especially for your offer to do it yourself!


    kind regards

    Files

    • delete.png

      (23.17 kB, downloaded 7 times, last: )