Before wildcard support, I found it necessary to explicitly specify each domain in the certificate in the form
… -d example.com -d www.example.com -d blog.example.com -d www.blog.example.com …
(that due to the difficulties in odd connection of the forwarded domains I use the best authentication work --webroot).
Thanks to Trojan's description and documentation here:
https://certbot.eff.org/docs/install.html?highlight=wildcard
I managed to create the wildcard certificates that now live. Unfortunately, there is no plug-in for EasyDNS.com yet, so I had to perform a manual check (for example, Trojans saved this day). With this approach, I was able to generate a certificate in the form
… -d *.example.com -d example.com -d *.blog.example.com …
Since (for example, sake) blog.example.com was already included with the * .example.com wildcard, I needed to add a template for * .blog.example.com. In fact, certbot does not allow redundancy (complained if I tried to include both: .example.com and www.example.com).
Currently plugins are available:
https://certbot.eff.org/docs/using.html#dns-plugins
At the time of this writing, they included these DNS providers:
- certbot-DNS-CloudFlare
- certbot-dns-cloudxns
- certbot-dns-digitalocean
- certbot-DNS-dnsimple
- certbot-DNS-dnsmadeeasy
- certbot-DNS for Google
- certbot-dns-luadns
- certbot-dns-nsone
- certbot-DNS-RFC2136
- certbot-DNS-route53
Maybe I'll take a look at the weekend and see how difficult it is to write a plugin for my own DNS provider.
source share