How to create a certificate

Please fill out the fields below so we can help you better. Note: you must provide your domain name to get help. Domain names for issued certificates are all made public in Certificate Transparency logs (e.g. |, so withholding your domain name here does not increase secrecy, but only makes it harder for us to provide help.

My domain

I ran this command:

It produced this output:

My web server is (include version):

The operating system my web server runs on is (include version):

My hosting provider, if applicable, is:

I can login to a root shell on my machine (yes or no, or I don't know):

I'm using a control panel to manage my site (no, or provide the name and version of the control panel):

The version of my client is (e.g. output of certbot --version or certbot-auto --version if you're using Certbot):

Welcome to the Let's Encrypt Community! :slightly_smiling_face:

We're going to need you to provide more information in that form than just your domain name in order to be of much help to you. With what operating system (e.g. Linux, Windows) are you hosting your website? Do you have administrative access to that hosting?


In addition to that extra info, can you explain more what you need help with?

Because that domain is using a current wildcard cert from Let's Encrypt that was issued on Nov18.

The title says you want help creating a cert but you have a long history of getting Let's Encrypt certs. You also got a cert from Sectigo yesterday but don't seem to be using it.

Most of the helpers here are unpaid volunteers offering our personal time and experience to you for free. Please make it easier for us to help you by providing more info.


Even with all my psychic powers, I'm unable to decipher this request :frowning:

The "mail" clue in the domain name seems to be a red herring; As the domain doesn't receive its' own emails:  MX preference = 0, mail exchanger =  MX preference = 10, mail exchanger =  MX preference = 20, mail exchanger =  MX preference = 30, mail exchanger =

But it might yet be used to send out email???
"v=spf1 ip4: +ip4: +a +mx +ip4: ?all"

I recon that too much was left to the imagination.
We will need some help in order to understand what you need help with.


@Denny take a look here Domain Health
check the Mail Server tab and Problems tab


So sorry for the confusion, I have been using a Host Gator Reseller Account (of which I do NOT resell anything there) The host computers are Linux Computer
My Reseller account is for family's personal and business usage. Host Gator has done most of the setup. I have been using ( It keeps most SPAM out of our email by itself... grabbing the email as it comes to the millermail servers, filtering out the spam email and sending the clean email to out millermail accounts. (The mx preferences are listed while mxguarddog uses mail exchangers to return the clean email to servers. It has been doing a great job for us for many years.

The previous certificates were created by Host Gator in past years.

I do not know the terms being used so my understanding is very limited for these procedures...
I realize that, and did not really WANT to send out for help but I had to start somewhere...

I also understand you guys volunteer your help and it is very much appreciated, but I certainly understand if you bow out of this spaghetti factor LOL ...My main thing is I would like to keep mxguarddog into the security loop Lets Encrypt and no idea what needs to be done for that to happen.

Thanks for any responses back even if its a FU !...lmao

1 Like

I forgot to mention The host uses Apache...

Server: Apache

$ curl -Ii
HTTP/1.1 200 OK
Date: Mon, 27 Nov 2023 04:21:29 GMT
Server: Apache
Link: <>; rel=""
Upgrade: h2,h2c
Connection: Upgrade
Vary: User-Agent
Content-Type: text/html; charset=UTF-8

Server: cloudflare

$ curl -Ii
HTTP/1.1 301 Moved Permanently
Date: Mon, 27 Nov 2023 04:22:05 GMT
Content-Type: text/html; charset=iso-8859-1
Connection: keep-alive
X-Frame-Options: SAMEORIGIN
CF-Cache-Status: DYNAMIC
Report-To: {"endpoints":[{"url":"https:\/\/\/report\/v3?s=6D5AirTB6PVTReA5mS%2Fplv2kUT3dhKkhmmo2DS4rE1pIYlpnfX%2F8Ng%2Fj%2FH0s5xgtQlOPIQE1fMzFpSxX4c3XspBxZXJTrrtqoWIVIelVwKstu6Qk%2FHfHDhcbWZW%2BiBxI"}],"group":"cf-nel","max_age":604800}
NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
Server: cloudflare
CF-RAY: 82c796892b895ec7-PDX
alt-svc: h3=":443"; ma=86400

How did you get the previous certs?
Where/how did you use them?

The renewal history seems on task:
[a wildcard cert was issued like one week ago]


This topic was automatically closed 30 days after the last reply. New replies are no longer allowed.