Certbot SSL Certificates
Its important to encrypt your web traffic to keep you and anyone who passes information through your website secure. To install LetsEncrypt and Certbot to handle this for you, run the below commands.
sudo add-apt-repository ppa:certbot/certbot
sudo apt-get update
sudo apt-get install python-certbot-nginx
sudo certbot --nginx -d domain.com -d www.domain.com
There are a few benefits to using Certbot. Your certificates will automatically be renewed when nearing expiration, and it even configures nginx for you automatically.
Now we need a webserver to redirect traffic over https. The below nginx configuration is verified to be working on Ubuntu 19.04 using certbot certificates to decrypt the traffic on default port 80, then passing it to a container hosted locally on a specific port. See the NGINX Book for more details on configuring nginx.
user www-data;
worker_processes auto;
pid /run/nginx.pid;
include /etc/nginx/modules-enabled/*.conf;
events { }
http {
include mime.types;
# Redirect root domains
server {
listen 80;
server_name knoats.com www.domain.com;
return 301 https://www.domain.com$request_uri;
}
# SSL - domain.com
server {
server_name domain.com www.domain.com;
server_tokens off;
listen 443 ssl;
ssl_certificate /etc/letsencrypt/live/domain.com/fullchain.pem;
ssl_certificate_key /etc/letsencrypt/live/domain.com/privkey.pem;
include /etc/letsencrypt/options-ssl-nginx.conf;
ssl_dhparam /etc/letsencrypt/ssl-dhparams.pem;
# Pass to container
location / {
include proxy_params;
proxy_pass http://localhost:1234/;
}
}
}
To check on the time left until certbot renews -
sudo systemctl status certbot.timer
Dry run renew with your current configuration -
sudo certbot renew --dry-run
Check installed certificates on this system -
sudo certbot certificates
Saving debug log to /var/log/letsencrypt/letsencrypt.log
OCSP check failed for /etc/letsencrypt/live/domain.com/cert.pem (are we offline?)
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Found the following certs:
Certificate Name: domain.com
Domains: domain.com www.domain.com
Expiry Date: 2020-08-18 03:00:10+00:00 (INVALID: EXPIRED)
Certificate Path: /etc/letsencrypt/live/domain.com/fullchain.pem
Private Key Path: /etc/letsencrypt/live/domain.com/privkey.pem
Certificate Name: other-domain.com
Domains: other-domain.com www.other-domain.com
Expiry Date: 2020-08-24 22:16:30+00:00 (VALID: 6 days)
Certificate Path: /etc/letsencrypt/live/other-domain.com/fullchain.pem
Private Key Path: /etc/letsencrypt/live/other-domain.com/privkey.pem
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Errors
Sometimes, if your webserver is running already, you may see the following error
Attempting to renew cert (domain.com) from /etc/letsencrypt/renewal/domain.com.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
To fix this, we can use certbot's --pre-hook
and --post-hook
options
sudo certbot renew --dry-run --pre-hook 'service nginx stop' --post-hook 'service nginx start'
You can also add executables to the /etc/letsencrypt/renewal-hooks/pre
and /etc/letsencrypt/renewal-hooks/post
directories and certbot will automatically handle executing them on a request to renew certificates, removing the need to specify these arguments each time. See Official Certbot Documentation for more info. An important point made there can be seen in the quote below
These hooks are run in alphabetical order and are not run for other subcommands. (The order the hooks are run is determined by the byte value of the characters in their filenames and is not dependent on your locale.)
Hooks specified in the command line, configuration file, or renewal configuration files are run as usual after running all hooks in these directories.