All Projects → bruncsak → ght-acme.sh

bruncsak / ght-acme.sh

Licence: GPL-2.0 License
Shell script to sign certificate by the letsencrypt CA

Programming Languages

shell
77523 projects
PHP
23972 projects - #3 most used programming language

Projects that are alternatives of or similar to ght-acme.sh

ACMECert
PHP client library for Let's Encrypt (ACME v2 - RFC 8555)
Stars: ✭ 83 (+167.74%)
Mutual labels:  letsencrypt, acme-client, certificate, acme, acme-v2
Certbot
Certbot is EFF's tool to obtain certs from Let's Encrypt and (optionally) auto-enable HTTPS on your server. It can also act as a client for any other CA that uses the ACME protocol.
Stars: ✭ 28,541 (+91967.74%)
Mutual labels:  letsencrypt, acme-client, certificate, acme
letsencrypt-inwx
A small cli utility for automating the letsencrypt dns-01 challenge for domains hosted by inwx.
Stars: ✭ 43 (+38.71%)
Mutual labels:  letsencrypt, certificate, acme, dns-01
wat
WAT - Windows ACME Tool
Stars: ✭ 28 (-9.68%)
Mutual labels:  letsencrypt, certificate, acme, tls-certificate
acmed
ACME (RFC 8555) client daemon
Stars: ✭ 121 (+290.32%)
Mutual labels:  acme-client, acme, ssl-certificates, tls-certificate
yaac
Yet another ACME client: a decoupled LetsEncrypt client
Stars: ✭ 138 (+345.16%)
Mutual labels:  letsencrypt, acme-client, acme-v2
Certificaat
General-purpose ACME client
Stars: ✭ 88 (+183.87%)
Mutual labels:  letsencrypt, certificate, acme
LetsEncrypt
C# layer for generation of wildcard Let's Encrypt SSL certificates
Stars: ✭ 67 (+116.13%)
Mutual labels:  letsencrypt, certificate, acme-v2
Docker Nginx Gunicorn Flask Letsencrypt
Boilerplate code for setting up Nginx + Gunicorn + Flask + automated LetsEncrypt certificates (https) using docker-compose.
Stars: ✭ 117 (+277.42%)
Mutual labels:  letsencrypt, certificate, ssl-certificates
Chef Acme
Chef cookbook to request SSL certificates at Let's Encrypt
Stars: ✭ 98 (+216.13%)
Mutual labels:  letsencrypt, certificate, acme
Getssl
obtain free SSL certificates from letsencrypt ACME server Suitable for automating the process on remote servers.
Stars: ✭ 1,687 (+5341.94%)
Mutual labels:  letsencrypt, certificate, acme
Letscertbot
Let's Certbot is a tool builds automated scripts base on Certbot for obtaining, renewing, deploying SSL certificates.
Stars: ✭ 84 (+170.97%)
Mutual labels:  letsencrypt, acme, ssl-certificates
Acme client
Java ACME Client application
Stars: ✭ 77 (+148.39%)
Mutual labels:  letsencrypt, certificate, acme
anvil
Tools for distributing ssl certificates
Stars: ✭ 29 (-6.45%)
Mutual labels:  certificate, acme, ssl-certificates
Certify
SSL Certificate Manager UI for Windows, powered by Let's Encrypt. Download from certifytheweb.com
Stars: ✭ 1,075 (+3367.74%)
Mutual labels:  letsencrypt, acme, ssl-certificates
Nginx Proxy Automation
Automated docker nginx proxy integrated with letsencrypt.
Stars: ✭ 2,302 (+7325.81%)
Mutual labels:  letsencrypt, certificate, letsencrypt-certificates
Acmetool
🔒 acmetool, an automatic certificate acquisition tool for ACME (Let's Encrypt)
Stars: ✭ 1,882 (+5970.97%)
Mutual labels:  letsencrypt, certificate, acme
qiniu-auto-cert
七牛 CDN 证书自动化工具
Stars: ✭ 20 (-35.48%)
Mutual labels:  letsencrypt, certificate, acme
Dehydrated
letsencrypt/acme client implemented as a shell-script – just add water
Stars: ✭ 5,261 (+16870.97%)
Mutual labels:  letsencrypt, certificate, acme
Docker Letsencrypt Nginx Proxy Companion
Automated ACME SSL certificate generation for nginx-proxy
Stars: ✭ 6,350 (+20383.87%)
Mutual labels:  letsencrypt, acme, acme-v2

letsencrypt.sh

This script is used to run the required steps to let letsencrypt sign a server certificate for certain domains.

For the most basic workflow an account key must be created and the private key of the server must be available. The following example is for a nginx server, because it is the easiest to setup.

Create an Account

letsencrypt needs an account key for verification of domains and requesting the signed certificate. If such a key already exists and is registered, the following steps can be skipped.

create an account key:

# umask 0177
# openssl genrsa -out account.key 4096
# umask 0022

register the account key to the letsencrypt service

# ./letsencrypt.sh register -a account.key -e [email protected]

Setup Challenge Response

To verify a domain the letsencrypt service gives you a challenge, to which a response must be stored under this domain.

The response is a simple concatenation of a challenge token, a dot ".", and the thumbprint of the account with which the verification request was made. This must be stored at a well known location.

The thumbprint of the private account key can be obtained with this command:

# ./letsencrypt.sh thumbprint -a account.key

With this thumbprint nginx can be configured to create a valid response dynamically. The following configuration must be added to the server section of each domain to be validated:

location ~ "^/\.well-known/acme-challenge/([-_a-zA-Z0-9]*)$" {
    default_type text/plain;
    return 200 "$1.ACCOUNT_THUMBPRINT";
}

The string ACCOUNT_THUMBPRINT in the return statement must be replaced by the actual thumbprint of the account key. Please note that the verification service of letsencrypt asks for the response over a HTTP and not over a HTTPS connection. Do not forget to reload the configuration.

Request a Signed Certificate

When every domain for which the certificate should be used is setup, the signing of the certificate can be requested:

# ./letsencrypt.sh sign -a account.key -k server.key -c server.pem www.example.org www1.example.org example.org

If the script runs successfully the signed certificate is stored in the file server.pem and can be used with the server. Please note that the file only contains the signed server certificate and not the complete chain, which might be needed by some servers.

Renew a Certificate

This is done like the first signing request:

# ./letsencrypt.sh sign -a account.key -k server.key -c server.pem www.example.org www1.example.org example.org

Revoke a Certificate

This is done with the same account key the certificate was originally signed:

# ./letsencrypt.sh revoke -a account.key -c server.pem

Alternatively, it is possible to revoke the certificate with its server key:

# ./letsencrypt.sh revoke -k server.key -c server.pem

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].