Let’s Encrypt is a new Certificate Authority (CA) that provides a way to obtain and install free TLS/SSL certificates, thereby enabling encrypted HTTPS on web servers. It streamlines the process by providing a software client, Certbot, that attempts to automate most (if not all) of the required steps. Currently, the entire process of obtaining and installing a certificate is fully automated on both Apache and Nginx web servers.
In this tutorial, we will show you how to use the certbot
Let’s Encrypt client to obtain a free SSL certificate and use it with Nginx on CentOS 7. We will also show you how to automatically renew your SSL certificate.
Before following this tutorial, you’ll need a few things.
sudo
privileges. You can learn how to set up such a user account by following steps 1-3 in our initial server setup for CentOS 7 tutorial.example.com
, that domain must resolve to your server for the validation process to work. Our setup will use example.com and www.example.com as the domain names, so both DNS records are required.Once you have all of the prerequisites out of the way, let’s move on to installing the Let’s Encrypt client software.
The first step to using Let’s Encrypt to obtain an SSL certificate is to install the certbot
software on your server. Currently, the best way to install this is through the EPEL repository.
Enable access to the EPEL repository on your server by typing:
- sudo yum install epel-release
Once the repository has been enabled, you can obtain the certbot-nginx
package by typing:
- sudo yum install certbot-nginx
The certbot
Let’s Encrypt client is now installed and ready to use.
If you haven’t installed Nginx yet, you can do so now. The EPEL repository should already be enabled from the previous section, so you can install Nginx by typing:
- sudo yum install nginx
Then, start Nginx using systemctl
:
- sudo systemctl start nginx
Certbot can automatically configure SSL for Nginx, but it needs to be able to find the correct server
block in your config. It does this by looking for a server_name
directive that matches the domain you’re requesting a certificate for. If you’re starting out with a fresh Nginx install, you can update the default config file using vi
or your favorite text editor:
- sudo vi /etc/nginx/nginx.conf
Find the existing server_name
line:
server_name _;
Replace the _
underscore with your domain name:
server_name example.com www.example.com;
Save the file and quit your editor. If you are using vi
, enter :x
, then y
when prompted, to save and quit. Verify the syntax of your configuration edits with:
- sudo nginx -t
If that runs with no errors, reload Nginx to load the new configuration:
- sudo systemctl reload nginx
Certbot will now be able to find the correct server
block and update it. Now we’ll update our firewall to allow HTTPS traffic.
If you have a firewall enabled, make sure port 80 and 443 are open to incoming traffic. If you are not running a firewall, you can skip ahead.
If you have a firewalld firewall running, you can open these ports by typing:
- sudo firewall-cmd --add-service=http
- sudo firewall-cmd --add-service=https
- sudo firewall-cmd --runtime-to-permanent
If have an iptables firewall running, the commands you need to run are highly dependent on your current rule set. For an initial rule set, you can add HTTP and HTTPS access by typing:
- sudo iptables -I INPUT -p tcp -m tcp --dport 80 -j ACCEPT
- sudo iptables -I INPUT -p tcp -m tcp --dport 443 -j ACCEPT
We’re now ready to run Certbot and fetch our certificates.
Certbot provides a variety of ways to obtain SSL certificates, through various plugins. The Nginx plugin will take care of reconfiguring Nginx and reloading the config whenever necessary:
- sudo certbot --nginx -d example.com -d www.example.com
This runs certbot
with the --nginx
plugin, using -d
to specify the names we’d like the certificate to be valid for.
If this is your first time running certbot
, you will be prompted to enter an email address and agree to the terms of service. After doing so, certbot
will communicate with the Let’s Encrypt server, then run a challenge to verify that you control the domain you’re requesting a certificate for. The configuration will be updated, and Nginx will reload to pick up the new settings. certbot
will wrap up with a message telling you the process was successful and where your certificates are stored:
OutputIMPORTANT NOTES:
- Congratulations! Your certificate and chain have been saved at:
/etc/letsencrypt/live/your_domain/fullchain.pem
Your key file has been saved at:
/etc/letsencrypt/live/your_domain/privkey.pem
Your certificate will expire on 2022-10-20. To obtain a new or
tweaked version of this certificate in the future, simply run
certbot again with the "certonly" option. To non-interactively
renew *all* of your certificates, run "certbot renew"
- If you like Certbot, please consider supporting our work by:
Donating to ISRG / Let's Encrypt: https://letsencrypt.org/donate
Donating to EFF: https://eff.org/donate-le
Your certificates are downloaded, installed, and loaded. Try reloading your website using https://
and notice your browser’s security indicator. It should represent that the site is properly secured, usually with a green lock icon.
Let’s Encrypt’s certificates are only valid for ninety days. This is to encourage users to automate their certificate renewal process. We’ll need to set up a regularly run command to check for expiring certificates and renew them automatically.
To run the renewal check daily, we will use cron
, a standard system service for running periodic jobs. We tell cron
what to do by opening and editing a file called a crontab
.
- sudo crontab -e
Your text editor will open the default crontab which is an empty text file at this point. Paste in the following line, then save and close it:
. . .
15 3 * * * /usr/bin/certbot renew --quiet
The 15 3 * * *
part of this line means “run the following command at 3:15 am, every day”. You may choose any time.
The renew
command for Certbot will check all certificates installed on the system and update any that are set to expire in less than thirty days. --quiet
tells Certbot not to output information or wait for user input.
cron
will now run this command daily. All installed certificates will be automatically renewed and reloaded when they have thirty days or less before they expire.
For more information on how to create and schedule cron jobs, you can check our How to Use Cron to Automate Tasks in a VPS guide.
In this tutorial we’ve installed the Let’s Encrypt client certbot
, downloaded SSL certificates for our domain, configured Nginx to use these certificates, and set up automatic certificate renewal. If you have further questions about using Certbot, their documentation is a good place to start.
Thanks for learning with the DigitalOcean Community. Check out our offerings for compute, storage, networking, and managed databases.
This textbox defaults to using Markdown to format your answer.
You can type !ref in this text area to quickly search our full set of tutorials, documentation & marketplace offerings and insert the link!
Great tutorial, thanks! Just a question… using cloudflare DNS, do I have to disable their services also for renewals or only for installation?
How do i Auto renew the certificates for multiple websites ? Do i need to manually edit the
le-renew-webroot
script and run it separately for every website?Thank a lot for great tutorial! Tried “Let’s Encrypt” first time and got “A” from https://www.ssllabs.com/ssltest/ :) You can use strong DH Group also, see https://weakdh.org/sysadmin.html
This all works great. But how can I get this to work over PHP? When I serve my PHP pages over SSL the browser downloads them. The PHP pages work fine over non-SSL.
Also, how would I add extra subdomains to an existing cert?
Thanks from a non-server admin.
My Certificate generation is failing with below error. Anyone knows how it can be resolved?
{standard input}: Assembler messages: {standard input}:12293: Warning: end of file not at end of a line; newline inserted {standard input}:12327: Error: unknown pseudo-op: `.lo’ gcc: internal compiler error: Killed (program cc1) Please submit a full bug report, with preprocessed source if appropriate. See http://bugzilla.redhat.com/bugzilla for instructions. error: command ‘gcc’ failed with exit status 4
Great tutorial, although it’s the most difficult tutorial on DO but it works like a charm for me at the first try :). Thanks.
can we add git pull to cronjob too ?
I have followed this article, but I am getting an error:
The following errors were reported by the server:
Domain: xxx.com Type: connection Detail: DNS problem: SERVFAIL looking up A for xxx.com
To fix these errors, please make sure that your domain name was entered correctly and the DNS A record(s) for that domain contain(s) the right IP address. Additionally, please check that your computer has a publicly routable IP address and that no firewalls are preventing the server from communicating with the client. If you’re using the webroot plugin, you should also verify that you are serving files from the webroot path you provided.
please suggest. my iptables accept 80 and 443 port INPUT and OUTPUT
I tried the following command also after stopping nginx, but result is same. Please support.
sudo certbot certonly --standalone -d xxx.com
I tried using Certbot but found multiple issues in AWS. Hence, I had to settle with an alternative. I have blogged about it here: https://www.attosol.com/implementing-ssl-free-quick/. Thanks for sharing though. It really helped me get up to speed with LetsEncrypt!
this worked for me but with one caveat, now I have to run node with sudo in order for my app to successfully read the cert and key files (I’m using HapiJS).
I can chown the dir (/etc/letsencrypt/live/MYAPP.com/) but i can’t change the ownership of the cert.pem or privkey.pem files
there has to be a way that I can do this so I’m not running this with sudo