Thanks for the reply.
I tried what you suggested and it started requesting certs but I don't think it worked. I can't find the certficiate.
Saving debug log to /var/log/letsencrypt/letsencrypt.log
/usr/lib/python3.9/site-packages/urllib3/connectionpool.py:1013: InsecureRequestWarning: Unverified HTTPS request is being made to host 'acme-v02.api.letsencrypt.org'. Adding certificate verification is strongly advised. See: https://urllib3.readthedocs.io/en/1.26.x/advanced-usage.html#ssl-warnings
warnings.warn(
Requesting a certificate for play.atavismxi.com
/usr/lib/python3.9/site-packages/urllib3/connectionpool.py:1013: InsecureRequestWarning: Unverified HTTPS request is being made to host 'acme-v02.api.letsencrypt.org'. Adding certificate verification is strongly advised. See: https://urllib3.readthedocs.io/en/1.26.x/advanced-usage.html#ssl-warnings
warnings.warn(
/usr/lib/python3.9/site-packages/urllib3/connectionpool.py:1013: InsecureRequestWarning: Unverified HTTPS request is being made to host 'acme-v02.api.letsencrypt.org'. Adding certificate verification is strongly advised. See: https://urllib3.readthedocs.io/en/1.26.x/advanced-usage.html#ssl-warnings
warnings.warn(
/usr/lib/python3.9/site-packages/urllib3/connectionpool.py:1013: InsecureRequestWarning: Unverified HTTPS request is being made to host 'acme-v02.api.letsencrypt.org'. Adding certificate verification is strongly advised. See: https://urllib3.readthedocs.io/en/1.26.x/advanced-usage.html#ssl-warnings
warnings.warn(
/usr/lib/python3.9/site-packages/urllib3/connectionpool.py:1013: InsecureRequestWarning: Unverified HTTPS request is being made to host 'acme-v02.api.letsencrypt.org'. Adding certificate verification is strongly advised. See: https://urllib3.readthedocs.io/en/1.26.x/advanced-usage.html#ssl-warnings
warnings.warn(
/usr/lib/python3.9/site-packages/urllib3/connectionpool.py:1013: InsecureRequestWarning: Unverified HTTPS request is being made to host 'acme-v02.api.letsencrypt.org'. Adding certificate verification is strongly advised. See: https://urllib3.readthedocs.io/en/1.26.x/advanced-usage.html#ssl-warnings
warnings.warn(
/usr/lib/python3.9/site-packages/urllib3/connectionpool.py:1013: InsecureRequestWarning: Unverified HTTPS request is being made to host 'acme-v02.api.letsencrypt.org'. Adding certificate verification is strongly advised. See: https://urllib3.readthedocs.io/en/1.26.x/advanced-usage.html#ssl-warnings
warnings.warn(
/usr/lib/python3.9/site-packages/urllib3/connectionpool.py:1013: InsecureRequestWarning: Unverified HTTPS request is being made to host 'acme-v02.api.letsencrypt.org'. Adding certificate verification is strongly advised. See: https://urllib3.readthedocs.io/en/1.26.x/advanced-usage.html#ssl-warnings
warnings.warn(
/usr/lib/python3.9/site-packages/urllib3/connectionpool.py:1013: InsecureRequestWarning: Unverified HTTPS request is being made to host 'acme-v02.api.letsencrypt.org'. Adding certificate verification is strongly advised. See: https://urllib3.readthedocs.io/en/1.26.x/advanced-usage.html#ssl-warnings
warnings.warn(
Certbot failed to authenticate some domains (authenticator: webroot). The Certificate Authority reported these problems:
Domain: play.atavismxi.com
Type: connection
Detail: Fetching http://play.atavismxi.com/.well-known/acme-challenge/mPOcDlFzQjDMYEuTvMN6l3gu7wxR-X2HA05wUVCPifA: Timeout during connect (likely firewall problem)
Hint: The Certificate Authority failed to download the temporary challenge files created by Certbot. Ensure that the listed domains serve their content from the provided --webroot-path/-w and that files created there can be downloaded from the internet.
Now this is a different problem.
LE can't reach your site to verify the challenge request:
You must have a working HTTP site before you can secure it (via HTTP authentication).
Please switch to the staging system while you troubleshoot this problem.
Add: --dry-run
Each FQDN is handled separately.
The "play" name is not using netlify and can be dealt with individually.
As such, the router at: cpe-24-74-121-169.carolina.res.rr.com
needs to port forward HTTP in to a working web server.
I did that with a systemd service. But it never updated. I think because certbot basically stopped working for me unless I pass the no verify argument you suggested.
I can show the server I'm using where the certificates are if I can just get certificates. Is there Anyway to just get a certificate on my computer without having to setup another we server or another webpage I'll never use?
There is the DNS-01 authentication method.
Which, to automate, requires that the DNS Service Provider (DSP) for your domain all for DNS updates via API. And that your ACME client have a DNS plugin that supports that DSP.
OR
You could make the DNS changes manually (but that can't be automated).
Your statement seems contradictory.
As long as you are using anything, if only to renew the certs, it doesn't fit the "I'll never use" case.
Alright I got certificates somehow. I did sudo certbot certonly --manual --preferred-challenges dns --no-verify-ssl
after that it asked me for a domain name. I put in play.atavismxi.com
then it asked me to...
Please deploy a DNS TXT record under the name:
_acme-challenge.play.atavismxi.com.
with the following value:
hdsf84398f4fjef930ur09jfoiefjoifjaf09ajf093
I went to netlify.com, signed into my account, created a new TXT DNS record, named it _acme-challenge.play.atavismxi.com, and gave it the value certbot asked me to.
Then it finally spit out a cert.
Thank you. Sometimes it helps have a place to vent and struggle with someone.
Glad to see you and Rudy got that sorted. I wanted to remind you that these certificates expire in 90 days. The certbot renew usually automatically renews certs 30 days before expiry.
But, certs created with the --manual method are not automatically refreshed when running certbot renew so you must do this again every 60 days or so.
Your cert from Aug did not auto-renew in Oct and expired in Nov. I wanted to make sure you were aware of this.
Ideally you would use an automated method to do your DNS challenge. If you cannot sort that out from the docs or other examples in this forum you could create a new topic for help on that. As part of this automation you will need to update the certbot renew command to include --no-verify-ssl too unless you resolve that issue.
No, it did not and I understand. It did not work due to the cert expiration last time and it will not work with a --manual method going forward. I wanted to make sure you knew about the --manual method exclusion - that is all.