Free TLS/SSL certificate from Let’s Encrypt on Centos 6.5/7 and nginx in 6 simple steps

in nginx •  7 years ago  (edited)

Lets Encrypt is a free, automated and open Certificate Authority, an initiative supported by online big companies such as facebook, cisco etc to make web more safe.

I will be guiding you to setup Let’s Encrypt on Centos6.5/7 and nginx webserver. The following steps can be modified as according to your environment needs like other linux distros such as ubuntu etc. Setting this up on ubuntu shouldn’t differ much.

Here’s what you need to get started   

  • Centos 6.5/7 server where you have SSH access or shell access. (You must have SSH access to be able to use Let’s Encrypt)
  • A registered domain name.  www.yourdomainname.com   

Steps:

  1. Point domain name to your server     
    You can point your domain name (both version along with www) to your server by configuring the proper A record provided by your web hosting, usually you do this by logging into your domain name account accessing DNS settings where you can enter the DNS settings, these process should be more or less same for various domain name providers. Let’s Encrypt will only issue certificate to a server which is accessible via domain name.

  2. Now access your Centos6.5/7 via SSH and install nginx webserver using following commands  
    sudo yum install epel-release      
    sudo yum install nginx
           
    Now start nginx       
    sudo systemctl start nginx        
    Now you should be able to go to http://www.yourdomainname.com and you should see something like this



  3. Now Install Let’s Encrypt Client application using git      
    Install git      
    sudo yum install git  
          
    Clone and Install Let’s Encrypt from official github repository to your server at /opt/letsencrypt by      
    sudo git clone https://github.com/letsencrypt/letsencrypt /opt/letsencrypt   

  4. Request SSL Certificate for yourdomainname.com      
    While running Let’s Encrypt SSL Certificate request script it listens on port 80 for Let’s Encrypt to verify that the domain name belongs to your server, so we need to close any programs that is currently running on port 80. So we need to shutdown our nginx server for now, if your are running on different version of Centos the commands to restart, stop, start nginx could be different.
    Usually following command should work
    Now to stop nginx   
    sudo systemctl stop nginx   
    Now Request SSL Certificate   
    cd /opt/letsencrypt
    Use the standalone plugin to request for certificate by executing following command
    ./letsencrypt-auto certonly –standalone
    At the first prompt add your email address and second prompt domain names as follows
    [email protected] and yourdomainname.com www.yourdomainname.com
    If everything goes well the script will output a message with your certificate expiry date usually in 3 months.

  5. Now configure nginx to use the Let’s Encrypt Certificate by
    sudo nano /etc/nginx/sites-available/default

    Now change the server block and comment out 2 lines with listen 80 and add listen 443 ssl; for eg:
    # listen 80 default_server;
    # listen [::]:80 default_server ipv6only=on;
    listen 443 ssl;

    Now add your domain names and ssl certificate like this   
    server_name yourdomainname.com www.yourdomainname.com;  
    ssl   on;  
    ssl_certificate    /etc/letsencrypt/live/yourdomainname.com/fullchain.pem;  
    ssl_certificate_key    /etc/letsencrypt/live/yourdomainname.com/privkey.pem;
    root /usr/share/nginx/html;  index index.html index.htm;
    ssl_protocols TLSv1 TLSv1.1 TLSv1.2;  
    ssl_prefer_server_ciphers on;  
    ssl_ciphers 'EECDH+AESGCM:EDH+AES256+EECDH:AES256+EDH';

    Now add a server block to redirect port 80 traffic to port 443    
    server {    
           listen 80;    
           server_name  yourdomainname.com www.yourdomainname.com;    
           location / {        
                    return 301 https://www.yourdomainname.com$request_uri;    
           }
    }

    Now Save and exit the file and start nginx to put the changes into effect by  
    sudo systemctl start nginx  
    At this point your SSL certificate should be in place and you can test by visiting your domain name.

  6. Since Let’s Encrypt Certificate are valid for 90 days you can automate that renewal process.
    Here’s how you do it
    Add the following location block under ssl server block on your nginx configuration
    location ~ /.well-known {  
    allow all;
    }

    Next we need to setup Let’s Encrypt configuration file for automation of SSL Certificate request.   Copy cli.ini to /usr/local/etc/le-renew-webroot.ini
    sudo cp /opt/letsencrypt/examples/cli.ini /usr/local/etc/le-renew-webroot.ini
    Now edit the configuration file to fit your needs   
    sudo nano /usr/local/etc/le-renew-webroot.ini
    Uncomment line with email and add your email which you entered before  such as
    email = [email protected]
    Uncomment line with domains and add domains as follows (maintaining the order)
    domains = yourdomainname.com, www.yourdomainname.com
    Then uncomment the webroot path and make sure it matches the webroot path specified in you nginx configuration as follows
    webroot-path = /usr/share/nginx/html
    Now cd into cd /opt/letsencrypt and test the renewal request script using the following command
    cd /opt/letsencrypt
    ./letsencrypt-auto certonly -a webroot --renew-by-default --config /usr/local/etc/le-renew-webroot.ini
    Assuming the configuration are correct the script should output Congratulation message with expiry date of the certificate. If the expiry date is less than 30 days the renewal request will be sent.   
    Now to automate the autorenewal process we will be using a shell script and use a cronjob that will schedule this script to be run every week.
    Now download the script by using following command   
    sudo curl -L -o /usr/local/sbin/le-renew-webroot http://do.co/le-nginx-renew
    Make it executable
    sudo chmod +x /usr/local/sbin/le-renew-webroot
    The le-renew-webroot script takes an argument the domain name whose certificate you want to check for renewal. If the renewal isn’t necessary it will simply output the remaining days to expire with the domain name.   
    Now run a cronjob to execute this script to check for certificate renewal every week by running following command   
    sudo nano -c /etc/crontab   
    Then add this line to execute the script every monday at 1:30 am, the output of the log will be saved on /var/log/le-renewal.log
    30 1 * * 1 /usr/local/sbin/le-renew-webroot >> /var/log/le-renewal.log

    Save and exit the cron file. 


Now your domain is using a Free SSL/TLS Certificate from Let’s Encrypt with auto renewal every 3 months. 

Authors get paid when people like you upvote their post.
If you enjoyed what you read here, create your account today and start earning FREE STEEM!