I add the debug to the Caddyfile but it has not effect unless I run as root.
I am fairly certain there is some permission issue but not sure where. Below is the debug output when run as caddy
2025/06/29 19:44:38.289 DEBUG http.stdlib http: TLS handshake error from 68.175.54.57:54118: no certificate available for 'twl.patientcareassociates.com'
2025/06/29 19:44:38.766 DEBUG events event {"name": "tls_get_certificate", "id": "d74081c5-b7f7-43f3-87a7-598c7bbfa6c3", "origin": "tls", "data": {"client_hello":{"CipherSuites":[56026,4865,4866,4867,49195,49199,49196,49200,52393,52392,49171,49172,156,157,47,53],"ServerName":"twl.patientcareassociates.com","SupportedCurves":[47802,4588,29,23,24],"SupportedPoints":"AA==","SignatureSchemes":[1027,2052,1025,1283,2053,1281,2054,1537],"SupportedProtos":["h2","http/1.1"],"SupportedVersions":[51914,772,771],"Conn":{}}}}
2025/06/29 19:44:38.766 DEBUG tls.handshake no matching certificates and no custom selection logic {"identifier": "twl.patientcareassociates.com"}
2025/06/29 19:44:38.766 DEBUG tls.handshake no matching certificates and no custom selection logic {"identifier": "*.patientcareassociates.com"}
2025/06/29 19:44:38.766 DEBUG tls.handshake no matching certificates and no custom selection logic {"identifier": "*.*.com"}
2025/06/29 19:44:38.766 DEBUG tls.handshake no matching certificates and no custom selection logic {"identifier": "*.*.*"}
2025/06/29 19:44:38.766 DEBUG tls.handshake all external certificate managers yielded no certificates and no errors {"remote_ip": "68.175.54.57", "remote_port": "54119", "sni": "twl.patientcareassociates.com"}
2025/06/29 19:44:38.766 DEBUG tls.handshake no certificate matching TLS ClientHello {"remote_ip": "68.175.54.57", "remote_port": "54119", "server_name": "twl.patientcareassociates.com", "remote": "68.175.54.57:54119", "identifier": "twl.patientcareassociates.com", "cipher_suites": [56026, 4865, 4866, 4867, 49195, 49199, 49196, 49200, 52393, 52392, 49171, 49172, 156, 157, 47, 53], "cert_cache_fill": 0, "load_if_necessary": true, "obtain_if_necessary": true, "on_demand": false}
2025/06/29 19:44:38.766 DEBUG http.stdlib http: TLS handshake error from 68.175.54.57:54119: no certificate available for 'twl.patientcareassociates.com'
2025/06/29 19:44:38.816 DEBUG events event {"name": "tls_get_certificate", "id": "9371bb17-30c2-4914-bf08-9e50dfdd080e", "origin": "tls", "data": {"client_hello":{"CipherSuites":[10794,4865,4866,4867,49195,49199,49196,49200,52393,52392,49171,49172,156,157,47,53],"ServerName":"twl.patientcareassociates.com","SupportedCurves":[31354,4588,29,23,24],"SupportedPoints":"AA==","SignatureSchemes":[1027,2052,1025,1283,2053,1281,2054,1537],"SupportedProtos":["h2","http/1.1"],"SupportedVersions":[27242,772,771],"Conn":{}}}}
2025/06/29 19:44:38.816 DEBUG tls.handshake no matching certificates and no custom selection logic {"identifier": "twl.patientcareassociates.com"}
2025/06/29 19:44:38.816 DEBUG tls.handshake no matching certificates and no custom selection logic {"identifier": "*.patientcareassociates.com"}
2025/06/29 19:44:38.816 DEBUG tls.handshake no matching certificates and no custom selection logic {"identifier": "*.*.com"}
2025/06/29 19:44:38.816 DEBUG tls.handshake no matching certificates and no custom selection logic {"identifier": "*.*.*"}
2025/06/29 19:44:38.816 DEBUG tls.handshake all external certificate managers yielded no certificates and no errors {"remote_ip": "68.175.54.57", "remote_port": "54120", "sni": "twl.patientcareassociates.com"}
2025/06/29 19:44:38.816 DEBUG tls.handshake no certificate matching TLS ClientHello {"remote_ip": "68.175.54.57", "remote_port": "54120", "server_name": "twl.patientcareassociates.com", "remote": "68.175.54.57:54120", "identifier": "twl.patientcareassociates.com", "cipher_suites": [10794, 4865, 4866, 4867, 49195, 49199, 49196, 49200, 52393, 52392, 49171, 49172, 156, 157, 47, 53], "cert_cache_fill": 0, "load_if_necessary": true, "obtain_if_necessary": true, "on_demand": false}
2025/06/29 19:44:38.816 DEBUG http.stdlib http: TLS handshake error from 68.175.54.57:54120: no certificate available for 'twl.patientcareassociates.com'
2025/06/29 19:44:54.773 DEBUG events event {"name": "tls_get_certificate", "id": "f52231b0-5094-4912-b4df-76df8f589755", "origin": "tls", "data": {"client_hello":{"CipherSuites":[49195,49199,49196,49200,52393,52392,49161,49171,49162,49172,4865,4866,4867],"ServerName":"","SupportedCurves":[4588,29,23,24,25],"SupportedPoints":"AA==","SignatureSchemes":[2052,1027,2055,2053,2054,1025,1281,1537,1283,1539,513,515],"SupportedProtos":null,"SupportedVersions":[772,771],"Conn":{}}}}
2025/06/29 19:44:54.773 DEBUG tls.handshake no matching certificates and no custom selection logic {"identifier": "172.20.100.32"}
2025/06/29 19:44:54.773 DEBUG tls.handshake all external certificate managers yielded no certificates and no errors {"remote_ip": "204.76.203.208", "remote_port": "38698", "sni": ""}
2025/06/29 19:44:54.773 DEBUG tls.handshake no certificate matching TLS ClientHello {"remote_ip": "204.76.203.208", "remote_port": "38698", "server_name": "", "remote": "204.76.203.208:38698", "identifier": "172.20.100.32", "cipher_suites": [49195, 49199, 49196, 49200, 52393, 52392, 49161, 49171, 49162, 49172, 4865, 4866, 4867], "cert_cache_fill": 0, "load_if_necessary": true, "obtain_if_necessary": true, "on_demand": false}
2025/06/29 19:44:54.773 DEBUG http.stdlib http: TLS handshake error from 204.76.203.208:38698: no certificate available for '172.20.100.32'
2025/06/29 19:44:54.868 DEBUG http.stdlib http: TLS handshake error from 204.76.203.208:38684: EOF
2025/06/29 19:44:38.289 DEBUG http.stdlib http: TLS handshake error from 68.175.54.57:54118: no certificate available for 'twl.patientcareassociates.com'
2025/06/29 19:44:38.766 DEBUG events event {"name": "tls_get_certificate", "id": "d74081c5-b7f7-43f3-87a7-598c7bbfa6c3", "origin": "tls", "data": {"client_hello":{"CipherSuites":[56026,4865,4866,4867,49195,49199,49196,49200,52393,52392,49171,49172,156,157,47,53],"ServerName":"twl.patientcareassociates.com","SupportedCurves":[47802,4588,29,23,24],"SupportedPoints":"AA==","SignatureSchemes":[1027,2052,1025,1283,2053,1281,2054,1537],"SupportedProtos":["h2","http/1.1"],"SupportedVersions":[51914,772,771],"Conn":{}}}}
2025/06/29 19:44:38.766 DEBUG tls.handshake no matching certificates and no custom selection logic {"identifier": "twl.patientcareassociates.com"}
2025/06/29 19:44:38.766 DEBUG tls.handshake no matching certificates and no custom selection logic {"identifier": "*.patientcareassociates.com"}
2025/06/29 19:44:38.766 DEBUG tls.handshake no matching certificates and no custom selection logic {"identifier": "*.*.com"}
2025/06/29 19:44:38.766 DEBUG tls.handshake no matching certificates and no custom selection logic {"identifier": "*.*.*"}
2025/06/29 19:44:38.766 DEBUG tls.handshake all external certificate managers yielded no certificates and no errors {"remote_ip": "68.175.54.57", "remote_port": "54119", "sni": "twl.patientcareassociates.com"}
2025/06/29 19:44:38.766 DEBUG tls.handshake no certificate matching TLS ClientHello {"remote_ip": "68.175.54.57", "remote_port": "54119", "server_name": "twl.patientcareassociates.com", "remote": "68.175.54.57:54119", "identifier": "twl.patientcareassociates.com", "cipher_suites": [56026, 4865, 4866, 4867, 49195, 49199, 49196, 49200, 52393, 52392, 49171, 49172, 156, 157, 47, 53], "cert_cache_fill": 0, "load_if_necessary": true, "obtain_if_necessary": true, "on_demand": false}
2025/06/29 19:44:38.766 DEBUG http.stdlib http: TLS handshake error from 68.175.54.57:54119: no certificate available for 'twl.patientcareassociates.com'
2025/06/29 19:44:38.816 DEBUG events event {"name": "tls_get_certificate", "id": "9371bb17-30c2-4914-bf08-9e50dfdd080e", "origin": "tls", "data": {"client_hello":{"CipherSuites":[10794,4865,4866,4867,49195,49199,49196,49200,52393,52392,49171,49172,156,157,47,53],"ServerName":"twl.patientcareassociates.com","SupportedCurves":[31354,4588,29,23,24],"SupportedPoints":"AA==","SignatureSchemes":[1027,2052,1025,1283,2053,1281,2054,1537],"SupportedProtos":["h2","http/1.1"],"SupportedVersions":[27242,772,771],"Conn":{}}}}
2025/06/29 19:44:38.816 DEBUG tls.handshake no matching certificates and no custom selection logic {"identifier": "twl.patientcareassociates.com"}
2025/06/29 19:44:38.816 DEBUG tls.handshake no matching certificates and no custom selection logic {"identifier": "*.patientcareassociates.com"}
2025/06/29 19:44:38.816 DEBUG tls.handshake no matching certificates and no custom selection logic {"identifier": "*.*.com"}
2025/06/29 19:44:38.816 DEBUG tls.handshake no matching certificates and no custom selection logic {"identifier": "*.*.*"}
2025/06/29 19:44:38.816 DEBUG tls.handshake all external certificate managers yielded no certificates and no errors {"remote_ip": "68.175.54.57", "remote_port": "54120", "sni": "twl.patientcareassociates.com"}
2025/06/29 19:44:38.816 DEBUG tls.handshake no certificate matching TLS ClientHello {"remote_ip": "68.175.54.57", "remote_port": "54120", "server_name": "twl.patientcareassociates.com", "remote": "68.175.54.57:54120", "identifier": "twl.patientcareassociates.com", "cipher_suites": [10794, 4865, 4866, 4867, 49195, 49199, 49196, 49200, 52393, 52392, 49171, 49172, 156, 157, 47, 53], "cert_cache_fill": 0, "load_if_necessary": true, "obtain_if_necessary": true, "on_demand": false}
2025/06/29 19:44:38.816 DEBUG http.stdlib http: TLS handshake error from 68.175.54.57:54120: no certificate available for 'twl.patientcareassociates.com'
2025/06/29 19:44:54.773 DEBUG events event {"name": "tls_get_certificate", "id": "f52231b0-5094-4912-b4df-76df8f589755", "origin": "tls", "data": {"client_hello":{"CipherSuites":[49195,49199,49196,49200,52393,52392,49161,49171,49162,49172,4865,4866,4867],"ServerName":"","SupportedCurves":[4588,29,23,24,25],"SupportedPoints":"AA==","SignatureSchemes":[2052,1027,2055,2053,2054,1025,1281,1537,1283,1539,513,515],"SupportedProtos":null,"SupportedVersions":[772,771],"Conn":{}}}}
2025/06/29 19:44:54.773 DEBUG tls.handshake no matching certificates and no custom selection logic {"identifier": "172.20.100.32"}
2025/06/29 19:44:54.773 DEBUG tls.handshake all external certificate managers yielded no certificates and no errors {"remote_ip": "204.76.203.208", "remote_port": "38698", "sni": ""}
2025/06/29 19:44:54.773 DEBUG tls.handshake no certificate matching TLS ClientHello {"remote_ip": "204.76.203.208", "remote_port": "38698", "server_name": "", "remote": "204.76.203.208:38698", "identifier": "172.20.100.32", "cipher_suites": [49195, 49199, 49196, 49200, 52393, 52392, 49161, 49171, 49162, 49172, 4865, 4866, 4867], "cert_cache_fill": 0, "load_if_necessary": true, "obtain_if_necessary": true, "on_demand": false}
2025/06/29 19:44:54.773 DEBUG http.stdlib http: TLS handshake error from 204.76.203.208:38698: no certificate available for '172.20.100.32'
2025/06/29 19:44:54.868 DEBUG http.stdlib http: TLS handshake error from 204.76.203.208:38684: EOF