I ran this command: certbot --nginx -d *.phill030.de
It produced this output:
Client with the currently selected authenticator does not support any combination of challenges that will satisfy the CA. You may need to use an authenticator plugin that can do challenges over DNS.
My web server is (include version): Linux VPS
The operating system my web server runs on is (include version): (Ubuntu 22.04)
My hosting provider, if applicable, is: Strato
I can login to a root shell on my machine (yes or no, or I don't know): Yes
I'm using a control panel to manage my site (no, or provide the name and version of the control panel): No
Hi @Phill030, and welcome to the LE community forum
Wildcard certs require DNS-01 authentication.
[you can't use --nginx as the authenticator for wildcard certs]
[--nginx may work if you used names like: -d phill030.de OR -d www.phill030.de OR both.]
If you can't use DNS-01 authentication, then you can't get cert that contains a wildcard entry.
You can get a cert that contains up to 100 entries.
So, you could do something like: certbot --nginx -d phill030.de -d www.phill030.de -d blog.phill030.de -d smtp.phill030.de etc.
So long as the names point to the IP of that same system, it can process all those names and put them all on one cert.
Is your [HTTP] site operational?
If not, you should get that going first.
Using an HTTP site to get a cert is the easiest method.
But maybe I should ask: What will the cert be for?
Because if it is NOT for HTTPS, then you really don't need to spin up an HTTP server [just to process the ACME challenge requests].
Then I recommend to forget about a wildcard certificate and just enter the required hostnames on the command line, either as a comma separated value to one -d option or multiple -d options with one hostname per option. E.g.:
curl phill030.de
Warning: Binary output can mess up your terminal. Use "--output -" to tell
Warning: curl to output it to your terminal anyway, or consider "--output
Warning: <FILE>" to save to a file.