Please fill out the fields below so we can help you better. Note: you must provide your domain name to get help. Domain names for issued certificates are all made public in Certificate Transparency logs (e.g. https://crt.sh/?q=example.com), so withholding your domain name here does not increase secrecy, but only makes it harder for us to provide help.
It produced this output:
Saving debug log to /var/log/letsencrypt/letsencrypt.log
Plugins selected: Authenticator webroot, Installer None
Cert is due for renewal, auto-renewing…
Renewing an existing certificate
Performing the following challenges:
http-01 challenge for bios-living.com
Using the webroot path /usr/local/apache2/htdocs for all unmatched domains.
Waiting for verification…
Challenge failed for domain bios-living.com
http-01 challenge for bios-living.com
Cleaning up challenges
Some challenges have failed.
To fix these errors, please make sure that your domain name was
entered correctly and the DNS A/AAAA record(s) for that domain
contain(s) the right IP address.
My web server is (include version): apache
aps:~ # httpd -v
Server version: Apache/2.4.33 (Linux/SUSE)
Server built: 2020-02-25 09:51:10.000000000 +0000
The operating system my web server runs on is (include version):
My hosting provider, if applicable, is:
ME
I can login to a root shell on my machine (yes or no, or I don’t know):
YES
I’m using a control panel to manage my site (no, or provide the name and version of the control panel):
NEVER
The version of my client is (e.g. output of certbot --version or certbot-auto --version if you’re using Certbot):
aps:~ # certbot-auto --version
certbot 1.3.0
IF i run admin like this:
aps:~ # certbot-auto certonly -d admin.bios-living.com --webroot -w /usr/local/apache2/htdocs --deploy-hook “/usr/local/apache2/bin/apachectl -k graceful”
Saving debug log to /var/log/letsencrypt/letsencrypt.log
Plugins selected: Authenticator webroot, Installer None
Cert is due for renewal, auto-renewing…
Renewing an existing certificate
Performing the following challenges:
http-01 challenge for admin.bios-living.com
Using the webroot path /usr/local/apache2/htdocs for all unmatched domains.
Waiting for verification…
Challenge failed for domain admin.bios-living.com
http-01 challenge for admin.bios-living.com
Cleaning up challenges
Some challenges have failed.
To fix these errors, please make sure that your domain name was
entered correctly and the DNS A/AAAA record(s) for that domain
contain(s) the right IP address.
I see - this is a problem. I can’t open up the authentication. admin.bios-living.com MUST be locked down with the authentication and open access on 80 can’t be done.
aps:~ # certbot-auto certonly -d bios-admin.com --webroot -w /usr/local/apache2/htdocs --deploy-hook "/usr/local/apache2/bin/apachectl -k graceful"
Saving debug log to /var/log/letsencrypt/letsencrypt.log
Plugins selected: Authenticator webroot, Installer None
Obtaining a new certificate
Performing the following challenges:
http-01 challenge for bios-admin.com
Using the webroot path /usr/local/apache2/htdocs for all unmatched domains.
Waiting for verification...
Challenge failed for domain bios-admin.com
http-01 challenge for bios-admin.com
Cleaning up challenges
Some challenges have failed.
IMPORTANT NOTES:
- The following errors were reported by the server:
Domain: bios-admin.com
Type: dns
Detail: DNS problem: NXDOMAIN looking up A for bios-admin.com -
check that a DNS record exists for this domain
aps:~ #
Actually, I got it work. I used the wrong domain. This cert will be good for all of bios-living.com?
aps:~ # certbot-auto certonly -d bios-living.com --webroot -w /usr/local/apache2/htdocs --deploy-hook "/usr/local/apache2/bin/apachectl -k graceful"
Saving debug log to /var/log/letsencrypt/letsencrypt.log
Plugins selected: Authenticator webroot, Installer None
Cert is due for renewal, auto-renewing...
Renewing an existing certificate
Performing the following challenges:
http-01 challenge for bios-living.com
Using the webroot path /usr/local/apache2/htdocs for all unmatched domains.
Waiting for verification...
Cleaning up challenges
Running deploy-hook command: /usr/local/apache2/bin/apachectl -k graceful
IMPORTANT NOTES:
Congratulations! Your certificate and chain have been saved at:
/etc/letsencrypt/live/bios-living.com/fullchain.pem
Your key file has been saved at:
/etc/letsencrypt/live/bios-living.com/privkey.pem
Your cert will expire on 2020-08-02. To obtain a new or tweaked
version of this certificate in the future, simply run certbot-auto
again. To non-interactively renew all of your certificates, run
"certbot-auto renew"
If you like Certbot, please consider supporting our work by:
In either case, you should create a dedicated unique path to handle all the HTTP auth challenges.
You can then use that path with the --webroot option.
Then add that logic to the *:443 vhost instead.
[LE will follow the redirection]
That is called a wildcard cert.
You can get one, but it requires DNS authentication (not HTTP).
The catch is in the automation.
You can do it manually but that would require you to do it manually every 90 days (or less).
So to make it work automated, you will need an API that works with your DNS provider.
[note: not all DNS providers support API updates]
I'm not sure of your point here. That is what is supposed to happen. authentation should happen after authorization. Doing it any other way seems pointless.
I’m NOT referring to how you do auth.
I’m simply stating that LE is forced to AUTH - and it can’t / won’t ever.
[all traffic is being forced to auth]
If you understand SNI, then you can see how your IP is already accepting unauthenticated traffic (via other names).
Separating the “clear text” traffic via name or path is identical (within the same web server).
If you can’t sleep at night knowing HTTP traffic is being accepted through the ADMIN name, then instead of accepting unauthenticated traffic to the challenge folder via that super secure name, redirect that traffic to a less secure name (still on the same system).
Like:
You can do what makes you happy.
But LE needs 80 if only to redirect to 443.
But in all cases it will not authenticate to your system
So plan accordingly.