Please fill out the fields below so we can help you better. Note: you must provide your domain name to get help. Domain names for issued certificates are all made public in Certificate Transparency logs (e.g. https://crt.sh/?q=example.com), so withholding your domain name here does not increase secrecy, but only makes it harder for us to provide help.
Yes but how do I apply it? There is only one place for the ssl.conf
file and it has
letsencrypt certificates ssl_certificate
/etc/letsencrypt/live/bell-computing.com/fullchain.pem;
ssl_certificate_key
/etc/letsencrypt/live/bell-computing.com/privkey.pem; . . . ||# verify chain of trust of OCSP response ssl_trusted_certificate
/etc/letsencrypt/live/bell-computing.com/chain.pem; How can I include
the contents of the new folder? ie |
It may be obvious to you perhaps. I have existing certificates in ...bell-computing.com but the new certificate went into a different folder and I don't get how to add that folder to the ssl.conf file.||||
Does paulmarshallcarpetsandflooring.bell-computing.com have a separate server block in your nginx configuration file? How does paulmarshallcarpetsandflooring.bell-computing.com relate to nginxs configuration file? Is it an alias?
I don’t know what a server block is so probably not, paulmarshall…com is a subdomain of a multisite wordpress network whose root domain is bell-computing.com. I just needed to add another certificate.
I’m glad you got things working, but I’m a little confused about how this relates to the problem that you described before.
The change you made would definitely affect your ability to obtain a certificate from Let’s Encrypt, but earlier in the thread you seemed to agree that you were already able to obtain it, but didn’t know how to install it in your nginx. However, both --standalone and --webroot have in common that they try to obtain a certificate without subsequently installing that certificate in your web server configuration. So, I would expect that you would still have the problem that you would still need to do something else in order to get the newly-issued certificate installed in your web server!
The answer is the difference between “Obtaining” and “Installing”. I had “obtained” it but not “installed” it because I didn’t realise I had used --standalone
Following more than one tutorial (because no one of them exactly matched my setup) led to my confusion.
Hmm. So how DO I install it? I used --expand to insert it into my existing certificate chain. What I did certainly allows me to develop which it was a problem connecting up to jetpack before and not now. But yes if I use a previously unused browser it does indeed error.
Previously I used the same command to add several certificates and then configured my ssl.conf. I thought the conf lines pointing to the chain files would do the job. I searched long and hard but nothing seems to guide me to actually ADDing further certificates. Hence this post.
What do I do now to install this new one then?
If it helps, below is the content of nginx-sp.ssl.conf which afaicr was all I had to do after running the original certbot command (for the working certificates, eg cle-france.com
Unfortunately, that's not what --expand means, although it might look like it. --expand means "if the names requested here are a superset of the names covered by an existing certificate, replace that certificate without asking". It does not expand an existing certificate unless all of the names in that certificate, plus additional names, are mentioned with -d.
In Certbot, only the --apache and --nginx plugins can install certificates for you without requiring you to edit configuration files. If you don't know of a reason why you can't use --nginx, perhaps you can do that (which will also get a further certificate).
Otherwise, you'll have to edit your configuration files. As @Osiris suggested, there should be an HTTPS virtualhost for paulmarshallcarpetsandflooring.bell-computing.com; if there is, you can add a reference to this certificate to it. If there isn't, you'll have to add a new server block describing accessing that virtual host via HTTPS.
So, notwithstanding the other advice I have yet to grok, could I run the original certbot certonly command with --expand (below) adding the new site I want to certificate and that would work?
Yes, that is the intended way to “expand” a certificate.
If that works as you expected, then you should also run certbot certificates to find the extra certificate that is only for paulmarshallcarpetsandflooring.bell-computing.com, and then certbot delete --cert-name whatever to delete it (so that you don’t get errors related to renewal in the future).
I should also note that it would be surprising if all of these different sites had the same webroot directory. Maybe they do initially for testing purposes but then are configured to point at different webroots later on (which is a common pattern leading to renewal failures, because Certbot doesn’t know the right place to put the challenge files for the individual sites during renewal). Normally you want one -w per site, immediately preceding each corresponding -d (unless the different sites in fact serve exactly the same content from exactly the same directory, and will continue to do so in the future).
To fix these errors, please make sure that your domain name was
entered correctly and the DNS A/AAAA record(s) for that domain
contain(s) the right IP address.
root@bell-computing:~#