certificates:let_s_encrypt_certificates
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revision | |||
certificates:let_s_encrypt_certificates [2017/03/17 01:00] – peter | certificates:let_s_encrypt_certificates [2019/11/26 21:50] (current) – removed peter | ||
---|---|---|---|
Line 1: | Line 1: | ||
- | ====== Certificates - Let's Encrypt Certificates ====== | ||
- | |||
- | Install the Let's Encrypt client, certbot: | ||
- | |||
- | <code bash> | ||
- | sudo apt-get install letsencrypt | ||
- | </ | ||
- | |||
- | If you already have a webserver running, it is recommended choosing the **" | ||
- | |||
- | <code bash> | ||
- | sudo letsencrypt certonly --webroot -w / | ||
- | </ | ||
- | |||
- | |||
- | Note that LE does not issue wildcard certificates by design, so you probably want to get a cert for www.example.com and example.com. | ||
- | |||
- | This command will obtain a single cert for example.com, | ||
- | |||
- | <WRAP note> | ||
- | Note: | ||
- | To use the webroot plugin, your server must be configured to serve files from hidden directories. | ||
- | </ | ||
- | |||
- | |||
- | |||
- | |||
- | To obtain a cert using a built-in “standalone” webserver (you may need to temporarily stop your existing webserver, if any) for example.com and www.example.com: | ||
- | |||
- | <code bash> | ||
- | letsencrypt certonly --standalone -d example.com -d www.example.com | ||
- | </ | ||
- | |||
- | |||
- | The Let's Encrypt client creates a temporary file in webroot-path/ | ||
- | |||
- | |||
- | |||
- | ===== Config Files ===== | ||
- | |||
- | The file / | ||
- | |||
- | <file bash / | ||
- | # the domain we want to get the cert for; | ||
- | # technically it's possible to have multiple of this lines, but it only worked | ||
- | # with one domain for me, another one only got one cert, so I would recommend | ||
- | # separate config files per domain. | ||
- | domains = my-domain | ||
- | #domains = www.example.com, | ||
- | |||
- | # increase key size | ||
- | rsa-key-size = 4096 | ||
- | |||
- | # the current closed beta (as of 2015-Nov-07) is using this server | ||
- | server = https:// | ||
- | |||
- | # this address will receive renewal reminders | ||
- | email = my-email | ||
- | |||
- | # turn off the ncurses UI, we want this to be run as a cronjob | ||
- | text = True | ||
- | |||
- | # authenticate by placing a file in the webroot (under .well-known/ | ||
- | # and then letting LE fetch it | ||
- | authenticator = webroot | ||
- | webroot-path = / | ||
- | </ | ||
- | |||
- | |||
- | ===== NginX config ===== | ||
- | |||
- | Update your nginx sites to use the new certificate and private key: | ||
- | |||
- | <file bash / | ||
- | server { | ||
- | ... | ||
- | |||
- | ssl_certificate / | ||
- | ssl_certificate_key / | ||
- | |||
- | ... | ||
- | } | ||
- | </ | ||
- | |||
- | |||
- | Also add following lines in your nginx config: | ||
- | |||
- | <file bash / | ||
- | # location ~ / | ||
- | # allow all; | ||
- | # } | ||
- | |||
- | # location / | ||
- | # root / | ||
- | # } | ||
- | |||
- | location ~ / | ||
- | allow all; | ||
- | } | ||
- | |||
- | </ | ||
- | |||
- | otherwise it will response an unauthorized error. | ||
- | |||
- | |||
- | ===== Permissions ===== | ||
- | |||
- | We need a user www-data to be able to run the Python script letsencrypt-auto. | ||
- | |||
- | |||
- | ===== Restart Nginx ===== | ||
- | |||
- | Verify the configuration file is syntactically valid and restart NGINX: | ||
- | |||
- | <code bash> | ||
- | sudo nginx -t && sudo nginx -s reload | ||
- | </ | ||
- | |||
- | |||
- | |||
- | ===== Automating renewal ===== | ||
- | |||
- | The Certbot packages on your system come with a cron job that will renew your certificates automatically before they expire. Since Let's Encrypt certificates last for 90 days, it's highly advisable to take advantage of this feature. | ||
- | |||
- | <code bash> | ||
- | letsencrypt renew --dry-run | ||
- | </ | ||
- | |||
- | |||
- | or Monthly cron job in / | ||
- | |||
- | <code bash> | ||
- | #!/bin/sh | ||
- | |||
- | # create new certs | ||
- | cd / | ||
- | |||
- | for conf in $(ls / | ||
- | # ./ | ||
- | ./ | ||
- | done | ||
- | |||
- | **TODO:** Check if letsencrypt-auto is now certbot-auto. | ||
- | |||
- | # make sure nginx picks them up | ||
- | service nginx restart | ||
- | </ | ||
- | |||
- | or | ||
- | |||
- | <code bash> | ||
- | #!/bin/sh | ||
- | |||
- | cd / | ||
- | # | ||
- | ./ | ||
- | |||
- | if [ $? -ne 0 ] | ||
- | then | ||
- | ERRORLOG=`tail / | ||
- | echo -e "The Let's Encrypt cert has not been renewed! \n \n" \ | ||
- | | ||
- | else | ||
- | nginx -s reload | ||
- | fi | ||
- | |||
- | exit 0 | ||
- | </ | ||
- | |||
- | **TODO: | ||
- | |||
- | renew-by-default | ||
- | agree-dev-preview | ||
- | agree-tos | ||
- | |||
- | |||
- | Create / | ||
- | |||
- | |||
- | And now I get new certs on the first of every month. | ||
- | |||
- | |||
- | To test your cron monthly script you can use (as root): | ||
- | |||
- | <code bash> | ||
- | run-parts -v / | ||
- | </ | ||
- | |||
- | |||
- | |||
- | ===== References ===== | ||
- | |||
- | https:// | ||
- | |||
- | https:// | ||
- | |||
- | https:// | ||
- | |||
- | https:// | ||
- | |||
- | https:// | ||
- | |||
certificates/let_s_encrypt_certificates.1489712441.txt.gz · Last modified: 2020/07/15 09:30 (external edit)