In this tutorial, we will show you how to install and configuration of LetsEncrypt with Nginx on your Ubuntu 15.04 server. For those of you who didn’t know, Let’s Encrypt is a free SSL certificate provider, backed by major companies and organizations, which provides a free, open, and automated system to easily add SSL/TLS based encryption to a website. Unfortunately, LetsEncrypt.org certificates currently have a 3 month lifetime. This means you’ll need to renew your certificate quarterly for now.
This article assumes you have at least basic knowledge of Linux, know how to use the shell, and most importantly, you host your site on your own VPS. The installation is quite simple. I will show you through the step-by-step installation LetsEncrypt SSL in Ubuntu 15.04.
Install LetsEncrypt With Nginx on Ubuntu 15.04
Step 1. First, make sure that all your system packages are up-to-date by running the following
apt-get commands in the terminal.
sudo apt-get update sudo apt-get upgrade
Step 2. Install LEMP server.
A Ubuntu 15.04 LEMP server is required. If you do not have LEMP installed, you can follow our guide here.
Step 3. Installing LetsEncrypt.
Clone LetsEncrypt git project to your server:
git clone https://github.com/letsencrypt/letsencrypt
Then change into the project folder:
Run the commands below to generate an SSL certificate for your website or blogs:
./letsencrypt-auto certonly -a standalone -d yourdomain.com -d www.yourdomain.com
Assuming you did everything right, you should see this:
LetsEncrypt puts its keys in this directory /etc/letsencrypt
Step 3. Generating Your SSL Key and CSR.
First, create an SSL directory to host your SSL certificates.
mkdir /etc/nginx/ssl cd /etc/nginx/ssl
Then follow the steps below to generate a server key, certificate signing request, and self-signed certificate. If you want to install a trusted certificate from a trusted certificate authority, then you’ll need to send a copy of the CSR to a certificate authority to generate a trusted certificate.
Create the server private key, run the commands below:
openssl genrsa -des3 -out server.key 2048
Then run the commands below to generate a certificate signing request key using the server private key to create an SSL certificate:
openssl req -new -key server.key -out server.csr
When you run the above commands, you’ll be prompted to answer a few questions. Follow the simple guide below:
- Common Name: The fully-qualified domain name, or URL, you’re securing.
If you are requesting a Wildcard certificate, add an asterisk (*) to the left of the common name where you want the wildcard, for example, *.idroot.us.
- Organization: The legally registered name for your business. If you are enrolling as an individual, enter the certificate requestor’s name.
- Organization Unit: If applicable, enter the DBA (doing business as) name. If you’re securing a single blog, then type the blog owner’s name here.
- City or Locality: Name of the city where your organization is registered/located.
- State or Province: Name of the state or province where your organization is located.
- Country: The two-letter International Organization for Standardization (ISO) format country code for where your organization is legally registered.
Step 4. Configuring Nginx to use the SSL Certificate.
Now we need to configure NGINX to accept our certificates and redirect our non-HTTPS requests to HTTPS. An example configuration for Nginx webserver is as followed:
listen 443 ssl spdy; listen [::]:443 ssl spdy; ssl on; ssl_certificate /etc/letsencrypt/live/example.com/fullchain.pem; ssl_certificate_key /etc/letsencrypt/live/example.com/privkey.pem; ssl_trusted_certificate /etc/letsencrypt/live/example.com/chain.pem; # # ssl_session_cache shared:SSL:10m; ssl_protocols TLSv1.1 TLSv1.2; # # ssl_ciphers 'ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-DSS-AES128-GCM-SHA256:kEDH+AESGCM:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA:ECDHE-ECDSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-DSS-AES128-SHA256:DHE-RSA-AES256-SHA256:DHE-DSS-AES256-SHA:DHE-RSA-AES256-SHA:!aNULL:!eNULL:!EXPORT:!DES:!RC4:!3DES:!MD5:!PSK'; # # ssl_prefer_server_ciphers on; add_header Strict-Transport-Security max-age=15768000; ssl_stapling on; ssl_stapling_verify on; resolver 188.8.131.52 184.108.40.206 valid=86400; resolver_timeout 10;
Save your configuration and restart the Nginx webserver:
nginx -t systemctl restart nginx
Now your domain should be accessible via HTTPS! Check it out at https://yourdomain.com.
Congratulations! You have successfully installed LetsEncrypt. Thanks for using this tutorial for installing LetsEncrypt SSL with Nginx on your Ubuntu 15.04 system. For additional help or useful information, we recommend you check the official LetsEncrypt SSL website.