Can AWS create a network traffic exemption for SSL issuers?

0

We are running a t3 instance (was large, now extra large). We have traced network outages to AutoSSL which makes a large of number of requests to Sectigo or Lets Encrypt (free SSL issuers). These requests trigger an AWS network block/throttle which shuts down all network traffic until the instance is rebooted. The best solution is AWS adds the issuer IP addresses as an exception to traffic monitoring. How can we get this to the AWS team as a request?

질문됨 3달 전102회 조회
2개 답변
0

Hi,

Thanks for the reply. The issue is not Sectigo / LetsEncrypt, the issue is that ALL traffic to and from the AWS instance is being blocked by AWS until the instance is restarted. This is all ports, there is literally zero traffic. This seems to be triggered by the AutoSSL process with Sectigo / LetsEncrypt, but any similar process would trigger the same AWS block. There are some posts on the internet about other users having similar experiences, and have experimented to confirm this is some sort of AWS limit in addition to standard bandwith. Presumbly its designed to stop spammers or similar, but is also being triggered by legitmate processes.

답변함 3달 전
0

Are you able to view the error messages returned from AutoSSL?

This could be a rate limit from LetsEncrypt or Sectigo API

As per Lets Encrypt Rate Limits, some of the limits are

You can create a maximum of 10 Accounts per IP Address per 3 hours. You can create a maximum of 500 Accounts per IP Range within an IPv6 /48 per 3 hours.

You can create a maximum of 300 New Orders per account per 3 hours.

Renewals are treated specially: they don’t count against your Certificates per Registered Domain limit, but they are subject to a Duplicate Certificate limit of 5 per week.

If you believe blocking is by AWS, I suggest you create a support case

AWS
전문가
Mike_L
답변함 3달 전

로그인하지 않았습니다. 로그인해야 답변을 게시할 수 있습니다.

좋은 답변은 질문에 명확하게 답하고 건설적인 피드백을 제공하며 질문자의 전문적인 성장을 장려합니다.

질문 답변하기에 대한 가이드라인

관련 콘텐츠