Por favor, preencha todos os campos abaixo para que nós possamos ajudar você. Obs.: você deve indicar seu nome de domínio para receber ajuda. Os nomes de domínio dos certificados emitidos são divulgados nos logs da Transparência de Certificados (por exemplo, crt.sh | example.com). Assim, não indicar seu nome de domínio não o mantém em segredo, mas torna a nossa ajuda mais difícil.
Posso ler respostas em inglês: sim
Meu nome de domínio é: aguiapiscinas.ind.br
Executei esse comando: Certbot renew, certbot -cert-name xxxxxx --force-renewal
Produziu essa saída: prints
Meu servidor web é (com versão): certbot
0.26.1
O sistema operacional no meu servidor web é (com versão): Ubuntu 16
O serviço de hospedagem do meu site (se aplicável) é: OceanDigital
Posso acessar um shell root na minha máquina (sim ou não, ou não sei):Sim
Uso um painel de controle para administrar meu site (não, ou indique o nome e a versão do painel de controle): não
I have an error when I renew my certificate, it does not allow connection for renewal, my file and the error output follow.
Hi @danielicaro and welcome to the LE community forum
First, let me apologize for my use of English.
Please don't use --force-renewal it really doesn't force things to work.
Things should just work; And we are here to help you with doing that.
I see "connection refused" error.
You must have a "working" HTTP server before you can secure it (via HTTP validation).
LE validations can come from anywhere.everywhere on the Internet.
Make sure you aren't doing Geolocation blocking on inbound HTTP connections.
Also, it would be beneficial to handle the HTTP request in HTTP (and not redirect them to HTTPS):
The hostname is taken from your own certbot request.
If you say: certbot ... -d EXAMPLE.COM
LE will try to validate to: http://EXAMPLE.COM/.well-known/acme-challenge/...
You must get a certificate that has the name of the site being reached.
If anyone with be reaching the same site via multiple names, then you will need all those names on the cert.
SNI can handle multiple names being served from a single IP.
The TLS constraint is that whatever names are in the vhost config must all be served by its' cert.
[the name(s) being served by the vhost config must be a subset of the list of names (SAN) in that cert]
So that once the name is matched to a vhost, that vhost must have a cert that covers that name.
If you make one vhost config for each name, then you can have one cert for each name.
It's not possible to make vhost configs that use multiple certs (with different names).
[so it's not possible to make one vhost that covers ten names and then try to fit ten certs into that vhost]
It is possible to make one cert that has all the names; And that same cert can be used by all the vhosts.
You create the cert, you control the contents of the SAN.
If you want to review a cert already created, there are many ways to do that; The simplest being to "inspect the cert" and look at the Subject Alternat Names (SAN) field.
Here is a picture of the cert being used by this site:
I don't think you understand, where can I pass this information, where do I pass these names? Which file contains them?
another question, in this print you sent has applicant, is this a random name or where he will get the certificate, for example, the site is teste.com and the name in applicant has to be teste.com or can it be test?
it's really confusing for me, the print follows, the applicant's name is a name that is not in my domain, when I try to renew the certificate it's giving an error precisely in this .com domain, I wanted to know how to change it