All Projects → eustasy → Bubbly

eustasy / Bubbly

Licence: mit
Better SSL in Nginx in 10 minutes. Configuration files and setup scripts for Certbot.

Programming Languages

shell
77523 projects

Projects that are alternatives of or similar to Bubbly

Bubbly
Better SSL in Nginx in 10 minutes. Configuration files and setup scripts for Certbot.
Stars: ✭ 217 (+1.88%)
Mutual labels:  ssl, certificate, certbot
Serverpilot Letsencrypt
Automate the installation of Let's Encrypt SSL on the free plan of ServerPilot
Stars: ✭ 129 (-39.44%)
Mutual labels:  ssl, certbot, nginx
Ssl Proxy
🔒 Simple zero-config SSL reverse proxy with real autogenerated certificates (LetsEncrypt, self-signed, provided)
Stars: ✭ 427 (+100.47%)
Mutual labels:  ssl, certificate, nginx
Acme Nginx
python acme client for nginx
Stars: ✭ 248 (+16.43%)
Mutual labels:  ssl, certificate, nginx
Ansible Role Certbot
Ansible Role - Certbot (for Let's Encrypt)
Stars: ✭ 477 (+123.94%)
Mutual labels:  ssl, certificate, certbot
Bitnami Docker Nginx
Bitnami nginx Docker Image
Stars: ✭ 198 (-7.04%)
Mutual labels:  ssl, nginx
Lua Resty Auto Ssl
On the fly (and free) SSL registration and renewal inside OpenResty/nginx with Let's Encrypt.
Stars: ✭ 1,786 (+738.5%)
Mutual labels:  ssl, nginx
Nginxconfig.io
⚙️ NGINX config generator on steroids 💉
Stars: ✭ 14,983 (+6934.27%)
Mutual labels:  ssl, nginx
Cert
Cert is the Go tool to get TLS certificate information.
Stars: ✭ 166 (-22.07%)
Mutual labels:  ssl, certificate
Pem
Easy PEM file parsing in Python.
Stars: ✭ 122 (-42.72%)
Mutual labels:  ssl, certificate
Certbot Route53
Helping create Let's Encrypt certificates for AWS Route53
Stars: ✭ 159 (-25.35%)
Mutual labels:  ssl, certbot
Ssl exporter
Exports Prometheus metrics for SSL certificates
Stars: ✭ 211 (-0.94%)
Mutual labels:  ssl, certificate
Aspnetcorecertificates
Certificate Manager in .NET Core for creating and using X509 certificates
Stars: ✭ 135 (-36.62%)
Mutual labels:  ssl, certificate
Acmetool
🔒 acmetool, an automatic certificate acquisition tool for ACME (Let's Encrypt)
Stars: ✭ 1,882 (+783.57%)
Mutual labels:  ssl, certificate
Certstrap
Tools to bootstrap CAs, certificate requests, and signed certificates.
Stars: ✭ 1,689 (+692.96%)
Mutual labels:  ssl, certificate
Website Ssl.sh
低门槛跨入Https大门!网站ssl证书自动生成工具(http到https的转变),燥起来吧!
Stars: ✭ 160 (-24.88%)
Mutual labels:  ssl, nginx
Lhttps
Create https for local development environment or localhost.
Stars: ✭ 172 (-19.25%)
Mutual labels:  certificate, nginx
Sslfie
Generate self-signed x.509 certificates for use with SSL/TLS
Stars: ✭ 169 (-20.66%)
Mutual labels:  ssl, certificate
Guacamole Install Rhel 7
Apache Guacamole installation bash script for RHEL 7 and CentOS 7 including options for Nginx, HTTPS, SSL, LDAP, Let's Encrypt certificates and more
Stars: ✭ 174 (-18.31%)
Mutual labels:  ssl, nginx
Badssl.com
🔒 Memorable site for testing clients against bad SSL configs.
Stars: ✭ 2,234 (+948.83%)
Mutual labels:  ssl, nginx

Bubbly

For configuring Certbot with Nginx

Build Status Codacy Badge Maintainability

If you want an instant A+ score on Qualys SSL Labs and A score on SecurityHeaders.io, then this is what you'll need to do. You won't need any familiarity with Certbot, Let's Encrypt, the ACME spec, or SSL in general, just basic Nginx configuration.

1. Install Certbot and Clone Bubbly

We'll start off by cloning the project into the home folder with git.

cd &&
sudo apt install git certbot &&
git clone https://github.com/eustasy/bubbly

2. Generate Statics

Generate the static keys once per server.

~/bubbly/bubbly_generate-statics.sh

As it will warn, this will take a while.

Have a seat.

3. Copy config blocks

When you've gone and made something in the 15 minutes that could well take, or you've just set up a new SSH session, copy the Nginx configuration over to the Nginx area.

~/bubbly/bubbly_copy-configs.sh

4. Configure & Enable Verification

Copy the verification site template and replace the instances of example.com in the file with your actual domain name.

sudo cp /etc/nginx/sites-available/bubbly_verify.conf /etc/nginx/sites-available/example.com.conf
sudo nano /etc/nginx/sites-available/example.com.conf

Use Ctrl and \ to initiate a search and replace for example.com with your domain.

sudo ln -s /etc/nginx/sites-available/example.com.conf /etc/nginx/sites-enabled/example.com.conf
sudo nginx -t && sudo service nginx reload

Alternatively, you can simply add include location/bubbly_well-known-passthrough.conf; to an existing site you want to continue working while we upgrade.

5. Fetch Certificates

Fetch your certificates like this:

~/bubbly/bubbly_renew-ssl.sh -d example.com -d www.example.com

It will ask for the root password, and an email address, so hang around, it shouldn't take more than a few seconds.

6. Start using the Certificates

Remove the verification config you just made, and replace it with a live version of the site. You'll need to more carefully review the [OPTION]s in this file, as you'll also need to change the certificate location to match the domain name you requested. Consider taking a look at the [OPTION]s and [WARNING]s in other linked config files.

sudo rm /etc/nginx/sites-available/example.com.conf
sudo cp /etc/nginx/sites-available/bubbly_live.conf /etc/nginx/sites-available/example.com.conf
sudo nano /etc/nginx/sites-available/example.com.conf

Use Ctrl and \ to initiate a search and replace for example.com with your domain.

sudo nginx -t && sudo service nginx reload

7. Automate Renewal

Edit crontab.conf and append it to your existing cron jobs for automatic renewal. This is important, since Let's Encrypt certificates expire in three months.

nano ~/bubbly/crontab.conf
cat ~/bubbly/crontab.conf > /tmp/bubbly-crontab
crontab -l >> /tmp/bubbly-crontab
crontab /tmp/bubbly-crontab

Screenshot of SSLLabs.com

Screenshot of SecurityHeaders.io

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].