M. Watson and Hazel Virdó
This article is deprecated and no longer maintained.
Due to changes with Certbot, the content in this article has been superseded by our main Apache and Let’s Encrypt tutorial for Ubuntu 16.04.
This article may still be useful as a reference, but may not work or follow best practices. We strongly recommend using How To Secure Apache with Let’s Encrypt on Ubuntu 16.04.
SSL certificates are used within web servers to encrypt the traffic between server and client, providing extra security for users accessing your application. Let’s Encrypt provides an easy way to obtain and install trusted certificates for free. This tutorial will show you how to set up TLS/SSL certificates from Let’s Encrypt for securing multiple virtual hosts on Apache.
In order to complete this guide, you will need:
For the purpose of this guide, we will install Let’s Encrypt certificates for the domains example.com
and test.com
. These will be referenced throughout the guide, but you should substitute them with your own domains while following along.
Let’s Encrypt certificates are fetched via client software running on your server. The official client is called Certbot, and its developers maintain their own Ubuntu software repository with up-to-date versions. Because Certbot is in such active development it’s worth using this repository to install a newer version than Ubuntu provides by default.
First, add the repository:
- sudo add-apt-repository ppa:certbot/certbot
You’ll need to press ENTER
to accept. Afterwards, update the package list to pick up the new repository’s package information:
- sudo apt-get update
And finally, install Certbot from the new repository with apt-get
:
- sudo apt-get install python-certbot-apache
The certbot
Let’s Encrypt client is now ready to use. Next, we’ll create the certificates.
Generating the SSL certificate for Apache is straightforward. Certbot will automatically obtain and install a new SSL certificate that is valid for the domains provided as parameters.
Note: It’s possible to bundle multiple Let’s Encrypt certificates together, even when the domain names are different. However, it’s recommended that you create separate certificates for unique domain names.
As such, you’ll need to follow this step multiple times (once for each virtual host). As a general rule of thumb, only subdomains of a particular domain should be bundled together.
The following command takes a comma-separated list of domain names as parameters after the -d
flag. The first domain name listed is the base domain used by Certbot to create the certificate. For this reason, we recommend that you pass the bare top-level domain name first, followed by any additional subdomains or aliases.
Start the interactive installation for example.com
to create a bundled certificate for that domain:
- sudo certbot --apache -d example.com
You will be asked to provide an email address for lost key recovery and notices, and you will be able to choose whether or not to redirect all http
traffic to https
, thereby removing http
access. It’s more secure to force https
, so you should choose that unless you have a specific need to allow both.
When the installation is finished, you will be able to find the generated certificate files at /etc/letsencrypt/live
. You can verify the status of your SSL certificate at https://www.ssllabs.com/ssltest/analyze.html?d=example.com&latest
, and you can now access your website using a https
prefix. Remember to follow this step again for every domain you’re using.
Let’s Encrypt certificates only last for 90 days. However, the certbot package we installed takes care of this for us by running certbot renew
twice a day via a systemd timer. On non-systemd distributions this functionality is provided by a cron script placed in /etc/cron.d
. The task runs twice daily and will renew any certificate that’s within thirty days of expiration.
To test the renewal process, you can do a dry run with certbot
:
- sudo certbot renew --dry-run
If you see no errors, you’re all set. When necessary, Certbot will renew your certificates and reload Apache to pick up the changes. If the automated renewal process ever fails, Let’s Encrypt will send a message to the email you specified, warning you when your certificate is about to expire.
In this guide, we saw how to install free SSL certificates from Let’s Encrypt in order to secure multiple virtual hosts on Apache. We recommend that you check the official Let’s Encrypt blog for important updates from time to time, and read the Certbot documentation for more details about the Certbot client.
Thanks for learning with the DigitalOcean Community. Check out our offerings for compute, storage, networking, and managed databases.
This textbox defaults to using Markdown to format your answer.
You can type !ref in this text area to quickly search our full set of tutorials, documentation & marketplace offerings and insert the link!
Thanks for the writeup.
After setting up the certificate, it is necessary to create a new VirtualHost:443 block in /etc/apache/sites-available/{site}.conf, referring to the certificate location; e.g.
<VirtualHost *:443> … SSLEngine on SSLCertificateKeyFile /etc/letsencrypt/live/{sitename}/privkey.pem SSLCertificateFile /etc/letsencrypt/live/{sitename}/fullchain.pem
SSLProtocol -ALL +TLSv1 +TLSv1.2 +TLSv1.1 SSLCipherSuite -ALL:AES256:AES128 … </VirtualHost>
The SSLProtocol and SSLCipherSuite change from time to time, as protocols are cracked and deprecated. With the above setting, it works generally but apparently the IOS browser complains that the certificate is not safe.
Does anyone know some better settings, or is LetsEncrypt not supported by IOS ?
@ShanS I get the exact same error. I cannot change the challenge to http and https fails. Tried manually but no luck. I also have no access to the dns of the domain so I am not sure how to overcome this. Have fixed this error?
Cheers
im getting this error: " Domain: xxxxxxxx.com Type: connection Detail: Failed to connect to xx.xx.xx.xx:443 for tls-sni-01 challenge
To fix these errors, please make sure that your domain name was entered correctly and the DNS A record(s) for that domain contain(s) the right IP address. Additionally, please check that your computer has a publicly routable IP address and that no firewalls are preventing the server from communicating with the client. If you’re using the webroot plugin, you should also verify that you are serving files from the webroot path you provided."
disabled the firewall but still having the same issue.