Successfully received certificate.
Certificate is saved at: /etc/letsencrypt/live/www.newstarmotel.dyn-o-saur.com/fullchain.pem
Key is saved at: /etc/letsencrypt/live/www.newstarmotel.dyn-o-saur.com/privkey.pem
This certificate expires on 2024-10-15.
These files will be updated when the certificate renews.
Certbot has set up a scheduled task to automatically renew this certificate in the background.
Deploying certificate
Successfully deployed certificate for www.newstarmotel.dyn-o-saur.com to /etc/apache2/sites-enabled/newstarmotel-le-ssl.conf
Successfully deployed certificate for newstarmotel.dyn-o-saur.com to /etc/apache2/sites-enabled/newstarmotel-le-ssl.conf
Your existing certificate has been successfully renewed, and the new certificate has been installed.
If you like Certbot, please consider supporting our work by:
<IfModule mod_ssl.c>
<VirtualHost *:443>
ServerAdmin webmaster@localhost
ServerName gilllab.dyndns-wiki.com
ServerAlias www.gilllab.dyndns-wiki.com
DocumentRoot /var/www/GillLabwebsite
ErrorLog ${APACHE_LOG_DIR}/error.log
CustomLog ${APACHE_LOG_DIR}/access.log combined
RewriteEngine on
# Some rewrite rules in this file were disabled on your HTTPS site,
# because they have the potential to create redirection loops.
# RewriteCond %{SERVER_NAME} =www.gilllab.dyndns-wiki.com [OR]
# RewriteCond %{SERVER_NAME} =gilllab.dyndns-wiki.com
# RewriteRule ^ https://%{SERVER_NAME}%{REQUEST_URI} [END,NE,R=permanent]
SSLCertificateFile /etc/letsencrypt/live/gilllab.dyndns-wiki.com/fullchain.pem
SSLCertificateKeyFile /etc/letsencrypt/live/gilllab.dyndns-wiki.com/privkey.pem
Include /etc/letsencrypt/options-ssl-apache.conf
</VirtualHost>
</IfModule>
No, certs are logged in the public Certificate Transparency logs. crt.sh is just one tool that displays the CT log info. This log is an essential part of auditing to monitor for mis-issuance and such. These are "public" certs after all
*:443 is a NameVirtualHost
default server gilllab.dyndns-wiki.com (/etc/apache2/sites-enabled/gilllab-le-ssl.conf:2)
port 443 namevhost gilllab.dyndns-wiki.com (/etc/apache2/sites-enabled/gilllab-le-ssl.conf:2)
alias www.gilllab.dyndns-wiki.com
port 443 namevhost newstarmotel.homelinux.com (/etc/apache2/sites-enabled/homelinux-le-ssl.conf:2)
alias www.newstarmotel.homelinux.com
port 443 namevhost newstarmotel.dyn-o-saur.com (/etc/apache2/sites-enabled/newstarmotel-le-ssl.conf:2)
alias www.newstarmotel.dyn-o-saur.com
port 443 namevhost nsmrentalproperties.from-ca.com (/etc/apache2/sites-enabled/nsmrentalproperties-le-ssl.conf:2)
alias www.nsmrentalproperties.from-ca.com
*:80 is a NameVirtualHost
default server gilllab.dyndns-wiki.com (/etc/apache2/sites-enabled/gilllab.conf:1)
port 80 namevhost gilllab.dyndns-wiki.com (/etc/apache2/sites-enabled/gilllab.conf:1)
alias www.gilllab.dyndns-wiki.com
port 80 namevhost newstarmotel.homelinux.com (/etc/apache2/sites-enabled/homelinux.conf:1)
alias www.newstarmotel.homelinux.com
port 80 namevhost newstarmotel.dyn-o-saur.com (/etc/apache2/sites-enabled/newstarmotel.conf:1)
alias www.newstarmotel.dyn-o-saur.com
port 80 namevhost nsmrentalproperties.from-ca.com (/etc/apache2/sites-enabled/nsmrentalproperties.conf:1)
alias www.nsmrentalproperties.from-ca.com
Okay. Good. The dyn-o-saur looks good. There were no "extra" VirtualHosts for port 80 added anywhere. I was pretty sure there would not be but wanted to be sure.
The first problem with gilllab.dyndns-wiki.com (which you omitted one l by the way) is there is no DNS entry for the www subdomain. You could need to get that setup first.
The homelinux cert can be modified to include both names in the same way.
The difference with this domain is that you have a cert for its www subdomain. But, it is not used by Apache for HTTPS requests to that www name.
So, once you combine the names into one cert like you did for the others you can probably delete the "extra" one. Could you have used this www cert somewhere else? Like copying it to some other server? Or somewhere for a mail server or similar?
I'm guessing it was just a mistake in which case this deletes the local cert files and the Certbot renewal profile for it