The operating system my web server runs on is (include version):
ubuntu 20.04
My hosting provider, if applicable, is: ovh.com
I can login to a root shell on my machine (yes or no, or I don't know):
yes
The version of my client is (e.g. output of certbot --version or certbot-auto --version if you're using Certbot):
certbot 0.40.0
Hello I made an certificate today with upper link instructions.
When I put certbot certificates in terminal i got :
"Found the following certs:
Certificate Name: mmbot.online
Domains: mmbot.online *.mmbot.online
Expiry Date: 2021-07-05 20:13:45+00:00 (VALID: 89 days)
Certificate Path: /etc/letsencrypt/live/mmbot.online/fullchain.pem
Private Key Path: /etc/letsencrypt/live/mmbot.online/privkey.pem"
but the website is not avilable under https://mmbot.online
what I could made wrong any ideas?
Thanks for all answers <3 !
So at first glance I can see that you have obtained certificates for mmbot.online
But you didn't tell us which server you are using or the actual command you used to obtain your certificate(s).
The command you used makes a huge difference if certbot updates your server configuration for you or not. The output you gave us is good, and it shows where the certificates live on your server.
But the link you provided offers solutions for apache and nginx. Which do you use?
We definitely can help you out, but we need more info to do it.
Which steps of the guide did you follow? It seems you've gotten a wildcard certificate using step 4. Step 3 however includes the part where a non-wildcard certificate is installed into your webserver, which is required for the certificate to actually do something. That installation step is missing from step 4 entirely.
You seem to be running nginx (not sure why you removed the question about the webserver from the questionnaire.......), so you might be able to install it into your webserver by running:
certbot install --nginx --cert-name mmbot.online
Sometimes the install subcommand doesn't work, but we'll tackle that later if it doesn't.
Also note that if you probably used the --manual process like in the guide, you can't automatically renew the certificate when it expires (which is 90 days from issuance). Do you actually require a wildcard certificate or could you just as easily have things working with a certificate with mmbot.online and www.mmbot.online (and perhaps a few more subdomains)? That would make your life much more easily..
Hi guys! Thanks for so much support so starting from the beginning sorry for not precisely describe which commend I used.
I used for ngnix
when I put certbot install --nginx --cert-name mmbot.online, right now this is output which I got
" Which server blocks would you like to modify?
Select the appropriate numbers separated by commas and/or spaces, or leave input
blank to select all options shown (Enter 'c' to cancel):"
last question was about firewall or filtering port,I'm sorry I have no idea I'm just started my career with front-end so terminal for me is a little black magic
This is a wildcard certificate, which you likely acquired using manual authentication in certbot by satisfying a dns-01 challenge. Am I correct in assuming that you had to manually add DNS TXT records when you got your certificate? Since it's not possible to use the nginx authenticator to acquire a wildcard certificate since it only supports the http-01 challenge and not the dns-01 challenge necessary to acquire a wildcard certificate, you clearly don't want to use nginx for authentication unless you are OK with not using a wildcard certificate, which is usually the case for the majority of people who initially acquire a wildcard certificate. Installing a wildcard certificate with the nginx installer, on the other hand, is perfectly fine.
As for the port 443 filter, you would need to check the settings in your hosting with ovh.com.
Saving debug log to /var/log/letsencrypt/letsencrypt.log
Plugins selected: Authenticator nginx, Installer nginx
Obtaining a new certificate
Performing the following challenges:
http-01 challenge for mmbot.online
http-01 challenge for www.mmbot.online
Waiting for verification...
Cleaning up challenges
IMPORTANT NOTES:
- The dry run was successful.
- Your account credentials have been saved in your Certbot
configuration directory at /etc/letsencrypt. You should make a
secure backup of this folder now. This configuration directory will
also contain certificates and private keys obtained by Certbot so
making regular backups of this folder is ideal.
Plugins selected: Authenticator nginx, Installer nginx
Obtaining a new certificate
Performing the following challenges:
http-01 challenge for mmbot.online
http-01 challenge for www.mmbot.online
Waiting for verification...
Cleaning up challenges
IMPORTANT NOTES:
- The dry run was successful.
- Your account credentials have been saved in your Certbot
configuration directory at /etc/letsencrypt. You should make a
secure backup of this folder now. This configuration directory will
also contain certificates and private keys obtained by Certbot so
making regular backups of this folder is ideal.
root@vps-c0a9c57f:~#
root@vps-c0a9c57f:~# nano /etc/nginx/sites-enabled/default
root@vps-c0a9c57f:~# sudo nginx -s reload
root@vps-c0a9c57f:~# sudo certbot certonly --nginx -d "mmbot.online,www.mmbot.online" --dry-run
Saving debug log to /var/log/letsencrypt/letsencrypt.log
Plugins selected: Authenticator nginx, Installer nginx
Obtaining a new certificate
Performing the following challenges:
http-01 challenge for mmbot.online
http-01 challenge for www.mmbot.online
Waiting for verification...
Cleaning up challenges
IMPORTANT NOTES:
- The dry run was successful.
I promise that if my advanture with front-end will grow NEVER EVER TAKE MONEY FROM CUSTOMERS FOR SSL and I will tell everyone who will be interested about this service and website !
Once again THANKK YOOOOU VERY MUCH <3!