Let’s Encrypt is an open and automated certificate authority that uses the ACME (Automatic Certificate Management Environment ) protocol to provide free TLS/SSL certificates to any compatible client. These certificates can be used to encrypt communication between your web server and your users. There are dozens of clients available, written in various programming languages, and many integrations with popular administrative tools, services, and servers.
The most popular ACME client, Certbot, is now developed by the Electronic Frontier Foundation. In addition to verifying domain ownership and fetching certificates, Certbot can automatically configure TLS/SSL on both Apache and Nginx web servers.
This tutorial will briefly discuss certificate authorities and how Let’s Encrypt works, then review a few popular ACME clients.
Certificate authorities (CAs) are entities that cryptographically sign TLS/SSL certificates to vouch for their authenticity. Browsers and operating systems have a list of trusted CAs that they use to verify site certificates.
Until recently, most CAs were commercial operations that charged money for their verification and signing services. Let’s Encrypt has made this process free for users by completely automating the procedure, and by relying on sponsorship and donations to fund the necessary infrastructure.
For more information on certificates and the different types of certificate authorities, you can read “A Comparison of Let’s Encrypt, Commercial and Private Certificate Authorities, and Self-Signed SSL Certificates.”
Next, we’ll look at how Let’s Encrypt does automated domain verification.
Let’s Encrypt’s ACME protocol defines how clients communicate with its servers to request certificates, verify domain ownership, and download certificates. It is currently in the process of becoming an official IETF standard.
Let’s Encrypt offers domain-validated certificates, meaning they have to check that the certificate request comes from a person who actually controls the domain. They do this by sending the client a unique token, and then making a web or DNS request to retrieve a key derived from that token.
For example, with the HTTP-based challenge, the client will compute a key from the unique token and an account token, then place the results in a file to be served by the web server. The Let’s Encrypt servers then retrieve the file at http://example.com/.well-known/acme-challenge/token
. If the key is correct, the client has proven it can control resources on example.com
, and the server will sign and return a certificate.
The ACME protocol defines multiple challenges your client can use to prove domain ownership. The HTTPS challenge is similar to HTTP, except instead of a text file, the client will provision a self-signed certificate with the key included. The DNS challenge looks for the key in a DNS TXT record.
Certbot is by far the most popular Let’s Encrypt client. It is included in most major Linux distributions, and includes convenient automatic configuration capabilities for Apache and Nginx. Once installed, fetching a certificate and updating your Apache configuration can be done like so:
- sudo certbot --apache -d www.example.com
Certbot will ask a few questions, run the challenge, download certificates, update your Apache config, and reload the server. You should then be able to navigate to https://www.example.com
with your web browser. A green lock will appear indicating that the certificate is valid and the connection is encrypted.
Because Let’s Encrypt certificates are only valid for ninety days, it’s important to set up an automated renewal process. The following command will renew all certificates on a machine:
- sudo certbot renew
Put the above command in a crontab to run it every day, and certificates will be automatically renewed thirty days before they expire. If a certificate was initially created with the --apache
or --nginx
options, Certbot will reload the server after a successful renewal.
If you’d like to learn more about cron and crontabs, please refer to the tutorial “How To Use Cron To Automate Tasks.”
Because the ACME protocol is open and well-documented, many alternate clients have been developed. Let’s Encrypt maintains a list of ACME clients on their website. Most of the other clients don’t have the automatic web server configuration features of Certbot, but they have other features that may appeal to you:
Some of the more popular clients are:
Many more clients are available, and many other servers and services are automating TLS/SSL setup by integrating Let’s Encrypt support.
We’ve gone over the basics of how Let’s Encrypt works, and discussed some of the client software available. If you’d like more detailed instructions on using Let’s Encrypt with various software, the following tutorials are a good place to start:
Thanks for learning with the DigitalOcean Community. Check out our offerings for compute, storage, networking, and managed databases.
This textbox defaults to using Markdown to format your answer.
You can type !ref in this text area to quickly search our full set of tutorials, documentation & marketplace offerings and insert the link!
Sign up for Infrastructure as a Newsletter.
Working on improving health and education, reducing inequality, and spurring economic growth? We'd like to help.
Get paid to write technical tutorials and select a tech-focused charity to receive a matching donation.
Thanks. Is chrome trust to let’s encrypt certificates? They already banned chinese startcom and have some issues with Symantec’s.
And does free certificates affect on seo?
Good!
Hi,
Do you have a working configuration for like if I have 2-3 domains on same server with nginx configuration and I want to install certificate on them at once with single command. Also, renewal should be with single command only.
Thanks Manideep