How to create a certificate

Please fill out the fields below so we can help you better. Note: you must provide your domain name to get help. Domain names for issued certificates are all made public in Certificate Transparency logs (e.g. crt.sh | example.com), so withholding your domain name here does not increase secrecy, but only makes it harder for us to provide help.

My domain is:millermail.com

I ran this command:

It produced this output:

My web server is (include version):

The operating system my web server runs on is (include version):

My hosting provider, if applicable, is:

I can login to a root shell on my machine (yes or no, or I don't know):

I'm using a control panel to manage my site (no, or provide the name and version of the control panel):

The version of my client is (e.g. output of certbot --version or certbot-auto --version if you're using Certbot):

Welcome to the Let's Encrypt Community! :slightly_smiling_face:

We're going to need you to provide more information in that form than just your domain name in order to be of much help to you. With what operating system (e.g. Linux, Windows) are you hosting your website? Do you have administrative access to that hosting?

5 Likes

In addition to that extra info, can you explain more what you need help with?

Because that domain is using a current wildcard cert from Let's Encrypt that was issued on Nov18.

The title says you want help creating a cert but you have a long history of getting Let's Encrypt certs. You also got a cert from Sectigo yesterday but don't seem to be using it.

Most of the helpers here are unpaid volunteers offering our personal time and experience to you for free. Please make it easier for us to help you by providing more info.

4 Likes

Even with all my psychic powers, I'm unable to decipher this request :frowning:

The "mail" clue in the domain name seems to be a red herring; As the domain doesn't receive its' own emails:

millermail.com  MX preference = 0, mail exchanger = mx0.ik2.com
millermail.com  MX preference = 10, mail exchanger = mx1.ik2.com
millermail.com  MX preference = 20, mail exchanger = mx2.ik2.com
millermail.com  MX preference = 30, mail exchanger = mx3.ik2.com

But it might yet be used to send out email???
"v=spf1 ip4:192.185.81.198 +ip4:184.173.239.120 +a +mx +ip4:192.185.31.96 ?all"

I recon that too much was left to the imagination.
We will need some help in order to understand what you need help with.

4 Likes

@Denny take a look here millermail.com Domain Health
check the Mail Server tab and Problems tab

2 Likes

So sorry for the confusion, I have been using a Host Gator Reseller Account (of which I do NOT resell anything there) The host computers are Linux Computer
My Reseller account is for family's personal and business usage. Host Gator has done most of the setup. I have been using (mxguarddog.com) It keeps most SPAM out of our email by itself... grabbing the email as it comes to the millermail servers, filtering out the spam email and sending the clean email to out millermail accounts. (The mx preferences are listed while mxguarddog uses mail exchangers to return the clean email to millermail.com servers. It has been doing a great job for us for many years.

The previous certificates were created by Host Gator in past years.

I do not know the terms being used so my understanding is very limited for these procedures...
I realize that, and did not really WANT to send out for help but I had to start somewhere...

I also understand you guys volunteer your help and it is very much appreciated, but I certainly understand if you bow out of this spaghetti factor LOL ...My main thing is I would like to keep mxguarddog into the security loop Lets Encrypt and no idea what needs to be done for that to happen.

Thanks for any responses back even if its a FU !...lmao

1 Like

I forgot to mention The host uses Apache...

Server: Apache

$ curl -Ii http://millermail.com
HTTP/1.1 200 OK
Date: Mon, 27 Nov 2023 04:21:29 GMT
Server: Apache
Link: <https://millermail.com/wp-json/>; rel="https://api.w.org/"
Upgrade: h2,h2c
Connection: Upgrade
Vary: User-Agent
Content-Type: text/html; charset=UTF-8

Server: cloudflare

$ curl -Ii http://mxguarddog.com
HTTP/1.1 301 Moved Permanently
Date: Mon, 27 Nov 2023 04:22:05 GMT
Content-Type: text/html; charset=iso-8859-1
Connection: keep-alive
X-Frame-Options: SAMEORIGIN
Location: https://mxguarddog.com/
CF-Cache-Status: DYNAMIC
Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=6D5AirTB6PVTReA5mS%2Fplv2kUT3dhKkhmmo2DS4rE1pIYlpnfX%2F8Ng%2Fj%2FH0s5xgtQlOPIQE1fMzFpSxX4c3XspBxZXJTrrtqoWIVIelVwKstu6Qk%2FHfHDhcbWZW%2BiBxI"}],"group":"cf-nel","max_age":604800}
NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
Server: cloudflare
CF-RAY: 82c796892b895ec7-PDX
alt-svc: h3=":443"; ma=86400
2 Likes

How did you get the previous certs?
Where/how did you use them?

The renewal history seems on task:
[a wildcard cert was issued like one week ago]
image

3 Likes

This topic was automatically closed 30 days after the last reply. New replies are no longer allowed.