Using Cert Bot to get a Valid SSL certificate
This guide will detail how to get a valid SSL cert using certbot on Linux operating systems
Commands for defining Key Type
https://www.onepagezen.com/letsencrypt-auto-renew-certbot-apache/
https://eff-certbot.readthedocs.io/en/stable/using.html#config-file
Follow this guide to force Cerbot to use Elliptical Curve Diffe-Hellman Curves for all certificates. Any existing certs will be updated upon the next reboot.
Certbot accepts a global configuration file that applies its options to all invocations of Certbot. Certificate specific configuration choices should be set in the By default no cli.ini file is created (though it may exist already if you installed Certbot via a package manager, for instance). After creating one it is possible to specify the location of this configuration file with |
# This is an example of the kind of things you can do in a configuration file. # All flags used by the client can be configured here. Run Certbot with # "--help" to learn more about the available options. # # Note that these options apply automatically to all use of Certbot for # obtaining or renewing certificates, so options specific to a single # certificate on a system with several certificates should not be placed # here. # Use ECC for the private key key-type = ecdsa elliptic-curve = secp384r1 # Use a 4096 bit RSA key instead of 2048 rsa-key-size = 4096 # Uncomment and update to register with the specified e-mail address # email = foo@example.com # Uncomment to use the standalone authenticator on port 443 # authenticator = standalone # Uncomment to use the webroot authenticator. Replace webroot-path with the # path to the public_html / webroot folder being served by your web server. # authenticator = webroot # webroot-path = /usr/share/nginx/html # Uncomment to automatically agree to the terms of service of the ACME server # agree-tos = true # An example of using an alternate ACME server that uses EAB credentials # server = https://acme.sectigo.com/v2/InCommonRSAOV # eab-kid = somestringofstuffwithoutquotes # eab-hmac-key = yaddayaddahexhexnotquoted |
If on the internal network set the DNS on the machine to use CloudFlared or Google. DNS will not resolve properly if using the internal DNS servers
- install the package certbot sudo apt install certbot -y
- navigate to the /etc/letsencrypt directory
- Two types on install Manual and Auto
- sudo certbot certonly --manual --preferred-challenges dns -d "*.coltscomputer.services"
- this will pull a SSL cert from Let's Encrypt
- Go to the DNS hosted domain on Route 53 and add the _acme-challenge text to the existing _acme-challenge TXT record
- sudo certbot certonly --manual --preferred-challenges dns -d "*.coltscomputer.services"
- For the auto install
- This guide shows how to configure a virtual host
- cd /etc/apache2/sites-enabled
- edit the .conf files there for the necessary domain name
- sudo nano *.conf
- edit the YOUR-DOMAIN-NAME line
- sudo certbot certonly --apache --key-type ecdsa --preferred-challenges dns -d "*.coltscomputer.services"
- This should auto renew
- use sudo certbot renew --dry-run to test if the renewal will work automatically
- This guide shows how to configure a virtual host
No Comments