= LetsEncrypt = == Certbot Usage == Create a cert using the interactive menu: {{{class="prettyprint" # certbot certonly }}} == Automating Renewal == LetsEncrypt Certs are good for a max of 90 days, so automating renewal is a must. Do a dry-run renewal with certbot: {{{class="prettyprint" # certbot renew --dry-run }}} This will test, and possibly renew all certs that certbot knows about Now you can use `certbot renew --quiet` for scripting this renewal. I do mine with a simple systemd script: {{{class="prettyprint" # /etc/systemd/system/certbot.service [Unit] Description=Let's Encrypt renewal [Service] Type=oneshot ExecStart=/usr/bin/certbot renew --quiet --agree-tos ExecStartPost=/bin/systemctl reload httpd.service }}} == Apache Configuration == There's a couple of considerations when using ssl certs with Apache. The first is to enable the appropriate modules in httpd.conf: {{{class="prettyprint" LoadModule ssl_module modules/mod_ssl.so LoadModule socache_shmcb_module modules/mod_socache_shmcb.so }}} Also, make sure to configure apache to listen on port 443: {{{class="prettyprint" Listen 443 }}} That will get the basic framework ready for your virtualhost definition. Here is a very simple virtualhost configuration: {{{class="prettyprint linenums" ServerName wiki.thurstylark.com # Redirect all except the '.wellk-known' path to https. # This allows automated renewal of ssl certs by certbot RedirectMatch permanent ^/(?!\.well-known)(.*) https://wiki.thurstylark.com/$1 ServerName wiki.thurstylark.com ServerAdmin thurstylark@gmail.com DocumentRoot "/srv/wiki/" AllowOverride None Options None Require all granted SSLEngine on SSLCertificateFile "/etc/letsencrypt/live/wiki.thurstylark.com/cert.pem" SSLCertificateChainFile "/etc/letsencrypt/live/wiki.thurstylark.com/chain.pem" SSLCertificateKeyFile "/etc/letsencrypt/live/wiki.thurstylark.com/privkey.pem" }}} A couple things to note here: First, this defines two virtualhosts, one for port 80 and one for port 443. This is in order to redirect _all_ traffic to HTTPS except for a very small exception. This exception is what you see on line 5 in the code above. Only `*/.well-known/*` is not redirected because this is the dir that certbot uses for domain validation. Certbot will only validate over http, and will fail if given a 301 redirect. This allows validation to complete successfuly without a configuration change, thus aiding our automation efforts. Everything else gets a 301 redirect to HTTPS. Lines 20-23 configure Apache to look for the necessary files in the right places. The locations listed here are actually symlinks to the real files, which are kept in an archive. These links are maintained by certbot automagically. To obtain new certs for a subdomain, copy this config to `/etc/httpd/conf/extra/`, update the config with the appropriate subdomain name, comment out lines 5, 6, 9, 10, and 20-23 to disable the redirect and ssl configuration, and add an include in the main httpd.conf. Once that is all set up, you can run certbot to obtain new certs. Once certbot is finished, you can remove the comments, restart httpd, and begin testing.