sudo certbot certonly --cert-name weeby.store --manual --preferred-challenges dns -d "weeby.store,*.weeby.store"
Saving debug log to /var/log/letsencrypt/letsencrypt.log
You are updating certificate weeby.store to include new domain(s):
weeby.store
You are also removing previously included domain(s):
(None)
Did you intend to make this change?
(U)pdate certificate/(C)ancel: U
Renewing an existing certificate for weeby.store and *.weeby.store
Successfully received certificate.
Certificate is saved at: /etc/letsencrypt/live/weeby.store/fullchain.pem
Key is saved at: /etc/letsencrypt/live/weeby.store/privkey.pem
This certificate expires on 2021-10-04.
These files will be updated when the certificate renews.
NEXT STEPS:
This certificate will not be renewed automatically. Autorenewal of --manual certificates requires the use of an authentication hook script (--manual-auth-hook) but one was not provided. To renew this certificate, repeat this same certbot command before the certificate's expiry date.
If you like Certbot, please consider supporting our work by:
You didn't need to deploy the two TXT records because your ACME account already had cached valid authorizations for both weeby.store and *.weeby.store from the other certificates you've had issued in the last 30 days.
It might already be clear to you, but this warning refers to a transparency feature in Let's Encrypt that was never actually implemented, so it was belatedly removed in later Certbot versions.
The idea is that Let's Encrypt briefly considered publishing its log files related to certificate requests, which include the IP address from which the certificate was requested. Some fraction of early --manual users were running Certbot on their own personal computers rather than on their dedicated web servers, and this warning related to a concern that people might be surprised when their personal computers' IP addresses turned up in the certificate request log files.
As it turned out, Let's Encrypt ended up choosing not to publicly post its certificate request and challenge validation logs. (Issued certificates, but not the IP addresses from which they were requested, are all published in Certificate Transparency.) Also, most people using --manual today are using it for wildcard certificatesālike yoursāand typically running on their dedicated web servers rather than home PCs. So this warning message was never really helpful or relevant in practice.
it has been renewed , for automatic renewal , I can see it requires the use of authentication hook script
as it says
NEXT STEPS:
- This certificate will not be renewed automatically. Autorenewal of --manual certificates requires the use of an authentication hook script (--manual-auth-hook) but one was not provided. To renew this certificate, repeat this same certbot command before the certificate's expiry date.