You can view the records in the DNS settings, where they were configured.
Did you merge the certificate with the root certificate of the domain after acquisition, or is it self-signed?
Was the certificate generated and signed correctly?
NGINX settings for Cloudflare should be configured as follows:
If you are using Flexible SSL mode, then a certificate is not required on the server, as the traffic between your server and Cloudflare is not encrypted. However, a certificate will be necessary if you are using Full SSL mode, since in this case the traffic between Cloudflare and your server is encrypted.
When you download the certificate from Cloudflare, if the certificate and private key are downloaded separately, they need to be combined using the cat command in the terminal. If you already have a certificate in .crt format, then it is not necessary to combine it with the private key for use in Nginx.
Regarding the certificate format, the .crt format is commonly used, but Nginx also supports the .pem format.
Pay attention to any lines that contain DROP or REJECT, as they indicate traffic is being blocked.
Make sure to verify the following:
Is the http {...} block in nginx configured correctly, along with the header forwarding?
Are the settings in Cloudflare configured properly?
Check the server logs: is Cloudflare trying to connect to your server, and what happens at that moment?
What SSL level are you using in Cloudflare (Flexible, Full, Full (Strict)), and does it match your server settings?
It’s very difficult to assist those who aren’t willing to put in any effort and ask basic questions. It’s in your best interest to provide details about what you’re trying to accomplish, as guessing can take a long time.
I have little to offer beyond implementing your suggestions, most of what I can offer is expressed in the question and my response. Since I am a newbie.
Chain INPUT (policy ACCEPT 5067K packets, 4883M bytes)
pkts bytes target prot opt in out source destination
Chain FORWARD (policy ACCEPT 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
Chain OUTPUT (policy ACCEPT 4570K packets, 4816M bytes)
pkts bytes target prot opt in out source destination
Chain ufw-after-forward (0 references)
pkts bytes target prot opt in out source destination
Chain ufw-after-input (0 references)
pkts bytes target prot opt in out source destination
Chain ufw-after-logging-forward (0 references)
pkts bytes target prot opt in out source destination
Chain ufw-after-logging-input (0 references)
pkts bytes target prot opt in out source destination
Chain ufw-after-logging-output (0 references)
pkts bytes target prot opt in out source destination
Chain ufw-after-output (0 references)
pkts bytes target prot opt in out source destination
Chain ufw-before-forward (0 references)
pkts bytes target prot opt in out source destination
Chain ufw-before-input (0 references)
pkts bytes target prot opt in out source destination
Chain ufw-before-logging-forward (0 references)
pkts bytes target prot opt in out source destination
Chain ufw-before-logging-input (0 references)
pkts bytes target prot opt in out source destination
Chain ufw-before-logging-output (0 references)
pkts bytes target prot opt in out source destination
Chain ufw-before-output (0 references)
pkts bytes target prot opt in out source destination
Chain ufw-reject-forward (0 references)
pkts bytes target prot opt in out source destination
Chain ufw-reject-input (0 references)
pkts bytes target prot opt in out source destination
Chain ufw-reject-output (0 references)
pkts bytes target prot opt in out source destination
Chain ufw-track-forward (0 references)
pkts bytes target prot opt in out source destination
Chain ufw-track-input (0 references)
pkts bytes target prot opt in out source destination
Chain ufw-track-output (0 references)
pkts bytes target prot opt in out source destination
root@h150-66-48-157:~#
@qth301 Could you change your nginx config back to what you had at the beginning? I think it made a lot of sense and is a much better starting point for debugging than what you have now.
@knot I appreciate that you are trying to help others, but please restrict your advice to topics on which you have the knowledge to help others.
So far, some of your recommendations here have been unhelpful at best and introduce security risks.