Make a cert for domain.tld & www.domain.tld

Please fill out the fields below so we can help you better. Note: you must provide your domain name to get help. Domain names for issued certificates are all made public in Certificate Transparency logs (e.g. crt.sh | example.com), so withholding your domain name here does not increase secrecy, but only makes it harder for us to provide help.

My domain is: tynsol.com

I ran this command: sudo certbot --apache

It produced this output: cert valid for tynsol.com but not www.tynsol.com

My web server is (include version): Apache 2.4.48

The operating system my web server runs on is (include version): Ubuntu 21.10 5.13.0-1009-raspi #10-Ubuntu SMP PREEMPT Mon Oct 25 13:58:43 UTC 2021 aarch64 aarch64 aarch64 GNU/Linux

My hosting provider, if applicable, is: Not applicable - home server

I can login to a root shell on my machine (yes or no, or I don't know): Yes

I'm using a control panel to manage my site (no, or provide the name and version of the control panel):
No
The version of my client is (e.g. output of certbot --version or certbot-auto --version if you're using Certbot): certbot 1.21.0

Additional info, in case it's useful:
tynsol.com.conf

<Directory /var/www/tynsol>
        Options FollowSymLinks
        AllowOverride Limit Options FileInfo
        DirectoryIndex index.php
        Order allow,deny
        Allow from all
</Directory>
<Directory /var/www/tynsol/wp-content>
        Options FollowSymLinks
        Order allow,deny
        Allow from all
</Directory>
<VirtualHost *:80>
        # The ServerName directive sets the request scheme, hostname and port that
        # the server uses to identify itself. This is used when creating
        # redirection URLs. In the context of virtual hosts, the ServerName
        # specifies what hostname must appear in the request's Host: header to
        # match this virtual host. For the default virtual host (this file) this
        # value is not decisive as it is used as a last resort host regardless.
        # However, you must set it for any further virtual host explicitly.
        #ServerName www.example.com

        ServerName tynsol.com
        ServerAlias www.tynsol.com
        ServerAdmin chris.m.solomon@gmail.com
        DocumentRoot /var/www/tynsol

        # Available loglevels: trace8, ..., trace1, debug, info, notice, warn,
        # error, crit, alert, emerg.
        # It is also possible to configure the loglevel for particular
        # modules, e.g.
        #LogLevel info ssl:warn

        ErrorLog ${APACHE_LOG_DIR}/error.log
        CustomLog ${APACHE_LOG_DIR}/access.log combined

        # For most configuration files from conf-available/, which are
        # enabled or disabled at a global level, it is possible to
        # include a line for only one particular virtual host. For example the
        # following line enables the CGI configuration for this host only
        # after it has been globally disabled with "a2disconf".
        #Include conf-available/serve-cgi-bin.conf
RewriteEngine on
RewriteCond %{SERVER_NAME} =tynsol.com [OR]
RewriteCond %{SERVER_NAME} =www.tynsol.com
RewriteRule ^ https://%{SERVER_NAME}%{REQUEST_URI} [END,NE,R=permanent]
</VirtualHost>

# vim: syntax=apache ts=4 sw=4 sts=4 sr noet

tynsol.com-le-ssl.conf:

<IfModule mod_ssl.c>
SSLStaplingCache shmcb:/tmp/stapling_cache(128000)
<VirtualHost *:443>
        # The ServerName directive sets the request scheme, hostname and port that
        # the server uses to identify itself. This is used when creating
        # redirection URLs. In the context of virtual hosts, the ServerName
        # specifies what hostname must appear in the request's Host: header to
        # match this virtual host. For the default virtual host (this file) this
        # value is not decisive as it is used as a last resort host regardless.
        # However, you must set it for any further virtual host explicitly.
        #ServerName www.example.com

        ServerName tynsol.com
        ServerAlias www.tynsol.com
        ServerAdmin chris.m.solomon@gmail.com
        DocumentRoot /var/www/tynsol

        # Available loglevels: trace8, ..., trace1, debug, info, notice, warn,
        # error, crit, alert, emerg.
        # It is also possible to configure the loglevel for particular
        # modules, e.g.
        #LogLevel info ssl:warn

        ErrorLog ${APACHE_LOG_DIR}/error.log
        CustomLog ${APACHE_LOG_DIR}/access.log combined

        # For most configuration files from conf-available/, which are
        # enabled or disabled at a global level, it is possible to
        # include a line for only one particular virtual host. For example the
        # following line enables the CGI configuration for this host only
        # after it has been globally disabled with "a2disconf".
        #Include conf-available/serve-cgi-bin.conf

Include /etc/letsencrypt/options-ssl-apache.conf
#SSLCARevocationCheck chain
#SSLCertificateChainFile /etc/letsencrypt/live/tynsol.com/fullchain.pem
SSLUseStapling on
SSLCertificateFile /etc/letsencrypt/live/tynsol.com/fullchain.pem
SSLCertificateKeyFile /etc/letsencrypt/live/tynsol.com/privkey.pem
</VirtualHost>
</IfModule>
1 Like

Hi @kiwicoder and welcome to the LE community forum :slight_smile:

Please show the output of:
certbot certificates

2 Likes

Hi, Thanks for the speedy response. Here is the output:

 Saving debug log to /var/log/letsencrypt/letsencrypt.log

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Found the following certs:
  Certificate Name: tynsol.com
    Serial Number: 3a847632639b8216747da298b993cea2448
    Key Type: RSA
    Domains: tynsol.com
    Expiry Date: 2022-02-03 04:32:22+00:00 (VALID: 88 days)
    Certificate Path: /etc/letsencrypt/live/tynsol.com/fullchain.pem
    Private Key Path: /etc/letsencrypt/live/tynsol.com/privkey.pem
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
1 Like

Well that cert only has one of the two names on it.
You should delete it and get another one with both.

2 Likes

Ok, I had a look through the documentation.
It never said it explicitly, but I figured trying sudo certbot --apache -d tynsol.com -d www.tynsol.com was worth a go.
It gave me the option of expanding & renewing the cert I already had, and now it works.

Thanks

2 Likes

This topic was automatically closed 30 days after the last reply. New replies are no longer allowed.