Our hostname check won’t allow this one through because if we go up the chain and ask the authoritative servers, for your hostname, for CNAME, A and AAAA records, we get nothing. It seems to resolve fine from Google DNS though.
Here’s what seems to be happening:
We lookup custom-domain.nathanfelix.com and find that it has a CNAME to domains.dev.picflow.com
We lookup domains.dev.picflow.com via its SOA (Start of Authority).
It has none because it’s not a root domain.
So we check if it has a public suffix. It does: picflow.com
We get the SOA of picflow.com and we get: ns-1513.awsdns-61.org
We resolve ns-1513.awsdns-61.org to an IP.
We also get the NS of the root domain:
ns-1513.awsdns-61.org
ns-1734.awsdns-24.co.uk
ns-677.awsdns-20.net
ns-99.awsdns-12.com
We resolve all of these to IPs and create a dns client that will use the SOA and the NS we got. Both IPv4 and IPv6 addresses
We try to resolve either another CNAME or an A or AAAA record for domains.dev.picflow.com using the DNS client with the servers we just found
We get nothing for it.
This is all to “emulate” the process Let’s Encrypt goes through when it attempts to verify challenges. This works for almost all hostnames.
I’m not entirely sure why that’s not true for yours. It’s as if AWS is not aware of the records you’ve setup. I’m assuming you’re with AWS Route53 here.
Good news! We figured out what’s up with this one.
dev.picflow.com has a different SOA record than picflow.com (likely because the zone is managed separately). We weren’t detecting the right authority for subdomains, so your DNS looked wrong to us. That’s fixed, now, and you should see certificates generate properly.
Can you help me out and post how you accomplished this? I am also looking to support custom domains for my customers but at the moment I am thinking only way I can do this is to create certs for each of their domains which seems overkill.
Hi Alphapage, we use fly.io to create the certs for us. The only issue that we had was a bug on the fly.io side, which they solved and it has been working great since.