Please fill out the fields below so we can help you better. Note: you must provide your domain name to get help. Domain names for issued certificates are all made public in Certificate Transparency logs (e.g. https://crt.sh/?q=example.com), so withholding your domain name here does not increase secrecy, but only makes it harder for us to provide help.
My domain is: onolan dot net
I ran this command:
It produced this output:
My web server is (include version):
The operating system my web server runs on is (include version):
My hosting provider, if applicable, is:
I can login to a root shell on my machine (yes or no, or I don't know):
I'm using a control panel to manage my site (no, or provide the name and version of the control panel):
The version of my client is (e.g. output of
certbot --version or
certbot-auto --version if you're using Certbot):
Currently I'm using a LetsEncrypt certificate to help secure remote logins to my Synology Diskstation using DSM 6.2. I'd like to expand it to add a subdomain on different computer (a raspberry pi running Apache). Currently, ports 80 and 443 are forwarded to the Diskstation and a number of services hosted on it are enumerated. My Pi web server traffic is redirected from an external DNS server (DNSmadeEasy) with an http redirect sending with the router port forwarding to port 80.
My understanding is that I can't get a wildcard cert via the Synology except for a Synology domain. I've skimmed this: https://www.blackvoid.club/lets-encrypt-docker-wild-card-certs/, which seems a tad complicated and I'd prefer something that didn't need manual updates every 3 months. Is it really necessary to use Docker?
Should I scrap my existing certificate and move things over to the Pi and then import the private key and certificate from there?