You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

429 lines
12 KiB

4 years ago
3 years ago
3 years ago
9 years ago
3 years ago
9 years ago
3 years ago
9 years ago
9 years ago
8 years ago
8 years ago
8 years ago
8 years ago
8 years ago
8 years ago
7 years ago
3 years ago
9 years ago
9 years ago
3 years ago
3 years ago
8 years ago
9 years ago
9 years ago
9 years ago
9 years ago
4 years ago
9 years ago
9 years ago
9 years ago
9 years ago
9 years ago
9 years ago
7 years ago
9 years ago
9 years ago
9 years ago
9 years ago
7 years ago
9 years ago
9 years ago
7 years ago
9 years ago
9 years ago
9 years ago
7 years ago
9 years ago
7 years ago
9 years ago
7 years ago
8 years ago
9 years ago
9 years ago
6 years ago
7 years ago
7 years ago
7 years ago
7 years ago
7 years ago
8 years ago
8 years ago
7 years ago
8 years ago
7 years ago
7 years ago
8 years ago
7 years ago
7 years ago
8 years ago
7 years ago
8 years ago
7 years ago
7 years ago
7 years ago
7 years ago
7 years ago
8 years ago
8 years ago
7 years ago
8 years ago
9 years ago
9 years ago
9 years ago
9 years ago
9 years ago
  1. # An ACME Shell script: acme.sh
  2. - An ACME protocol client written purely in Shell (Unix shell) language.
  3. - Full ACME protocol implementation.
  4. - Support ECDSA certs
  5. - Support SAN and wildcard certs
  6. - Simple, powerful and very easy to use. You only need 3 minutes to learn it.
  7. - Bash, dash and sh compatible.
  8. - Purely written in Shell with no dependencies on python.
  9. - Just one script to issue, renew and install your certificates automatically.
  10. - DOES NOT require `root/sudoer` access.
  11. - Docker ready
  12. - IPv6 ready
  13. - Cron job notifications for renewal or error etc.
  14. - A fork which doesn't target your Apache / Nginx configuration with intention to mess them completely up
  15. It's probably the `easiest & smartest` shell script to automatically issue & renew the free certificates.
  16. Wiki: https://github.com/acmesh-official/acme.sh/wiki
  17. For Docker Fans: [acme.sh :two_hearts: Docker ](https://github.com/acmesh-official/acme.sh/wiki/Run-acme.sh-in-docker)
  18. Twitter: [@neilpangxa](https://twitter.com/neilpangxa)
  19. # [中文说明](https://github.com/acmesh-official/acme.sh/wiki/%E8%AF%B4%E6%98%8E)
  20. # Who:
  21. - [FreeBSD.org](https://blog.crashed.org/letsencrypt-in-freebsd-org/)
  22. - [ruby-china.org](https://ruby-china.org/topics/31983)
  23. - [Proxmox](https://pve.proxmox.com/wiki/Certificate_Management)
  24. - [pfsense](https://github.com/pfsense/FreeBSD-ports/pull/89)
  25. - [webfaction](https://community.webfaction.com/questions/19988/using-letsencrypt)
  26. - [Loadbalancer.org](https://www.loadbalancer.org/blog/loadbalancer-org-with-lets-encrypt-quick-and-dirty)
  27. - [discourse.org](https://meta.discourse.org/t/setting-up-lets-encrypt/40709)
  28. - [Centminmod](https://centminmod.com/letsencrypt-acmetool-https.html)
  29. - [splynx](https://forum.splynx.com/t/free-ssl-cert-for-splynx-lets-encrypt/297)
  30. - [archlinux](https://www.archlinux.org/packages/community/any/acme.sh)
  31. - [opnsense.org](https://github.com/opnsense/plugins/tree/master/security/acme-client/src/opnsense/scripts/OPNsense/AcmeClient)
  32. - [CentOS Web Panel](http://centos-webpanel.com/)
  33. - [lnmp.org](https://lnmp.org/)
  34. - [more...](https://github.com/acmesh-official/acme.sh/wiki/Blogs-and-tutorials)
  35. # Tested OS
  36. Check our [testing project](https://github.com/acmesh-official/acmetest):
  37. https://github.com/acmesh-official/acmetest
  38. # Supported CA
  39. - [ZeroSSL.com CA](https://github.com/acmesh-official/acme.sh/wiki/ZeroSSL.com-CA)(default)
  40. - Letsencrypt.org CA
  41. - [BuyPass.com CA](https://github.com/acmesh-official/acme.sh/wiki/BuyPass.com-CA)
  42. - [SSL.com CA](https://github.com/acmesh-official/acme.sh/wiki/SSL.com-CA)
  43. - [Pebble strict Mode](https://github.com/letsencrypt/pebble)
  44. - Any other [RFC8555](https://tools.ietf.org/html/rfc8555)-compliant CA
  45. # Supported modes
  46. - Webroot mode
  47. - Standalone mode
  48. - Standalone tls-alpn mode
  49. - DNS mode
  50. - [DNS alias mode](https://github.com/acmesh-official/acme.sh/wiki/DNS-alias-mode)
  51. - [Stateless mode](https://github.com/acmesh-official/acme.sh/wiki/Stateless-Mode)
  52. # 1. How to install
  53. ### 1. Install online
  54. ```bash
  55. curl https://raw.githubusercontent.com/HQJaTu/acme.sh/main/acme.sh | sh -s email=my@example.com
  56. ```
  57. Or:
  58. ```bash
  59. wget -O - https://raw.githubusercontent.com/HQJaTu/acme.sh/main/acme.sh | sh -s email=my@example.com
  60. ```
  61. ### 2. Or, Install from git
  62. Clone this project and launch installation:
  63. ```bash
  64. git clone https://github.com/HQJaTu/acme.sh.git
  65. cd ./acme.sh
  66. ./acme.sh --install -m my@example.com
  67. ```
  68. You `don't have to be root` then, although `it is recommended`.
  69. Advanced Installation: https://github.com/acmesh-official/acme.sh/wiki/How-to-install
  70. The installer will perform 3 actions:
  71. 1. Create and copy `acme.sh` to your home dir (`$HOME`): `~/.acme.sh/`.
  72. All certs will be placed in this folder too.
  73. 2. Create alias for: `acme.sh=~/.acme.sh/acme.sh`.
  74. 3. Create daily cron job to check and renew the certs if needed.
  75. Cron entry example:
  76. ```bash
  77. 0 0 * * * "/home/user/.acme.sh"/acme.sh --cron --home "/home/user/.acme.sh" > /dev/null
  78. ```
  79. After the installation, you must close the current terminal and reopen it to make the alias take effect.
  80. Ok, you are ready to issue certs now.
  81. Show help message:
  82. ```sh
  83. root@v1:~# acme.sh -h
  84. ```
  85. # 2. Just issue a cert
  86. **Example 1:** Single domain.
  87. ```bash
  88. acme.sh --issue -d example.com -w /home/wwwroot/example.com
  89. ```
  90. or:
  91. ```bash
  92. acme.sh --issue -d example.com -w /home/username/public_html
  93. ```
  94. or:
  95. ```bash
  96. acme.sh --issue -d example.com -w /var/www/html
  97. ```
  98. **Example 2:** Multiple domains in the same cert.
  99. ```bash
  100. acme.sh --issue -d example.com -d www.example.com -d cp.example.com -w /home/wwwroot/example.com
  101. ```
  102. The parameter `/home/wwwroot/example.com` or `/home/username/public_html` or `/var/www/html` is the web root folder where you host your website files. You **MUST** have `write access` to this folder.
  103. Second argument **"example.com"** is the main domain you want to issue the cert for.
  104. You must have at least one domain there.
  105. You must point and bind all the domains to the same webroot dir: `/home/wwwroot/example.com`.
  106. The certs will be placed in `~/.acme.sh/example.com/`
  107. The certs will be renewed automatically every **60** days.
  108. More examples: https://github.com/acmesh-official/acme.sh/wiki/How-to-issue-a-cert
  109. # 3. Install the cert to Apache/Nginx etc.
  110. Not with this tool!
  111. If you want a poorly written crappy tool to overwrite your precious configuration, use something else!
  112. # 4. Use Standalone server to issue cert
  113. **(requires you to be root/sudoer or have permission to listen on port 80 (TCP))**
  114. Port `80` (TCP) **MUST** be free to listen on, otherwise you will be prompted to free it and try again.
  115. ```bash
  116. acme.sh --issue --standalone -d example.com -d www.example.com -d cp.example.com
  117. ```
  118. More examples: https://github.com/acmesh-official/acme.sh/wiki/How-to-issue-a-cert
  119. # 5. Use Standalone ssl server to issue cert
  120. **(requires you to be root/sudoer or have permission to listen on port 443 (TCP))**
  121. Port `443` (TCP) **MUST** be free to listen on, otherwise you will be prompted to free it and try again.
  122. ```bash
  123. acme.sh --issue --alpn -d example.com -d www.example.com -d cp.example.com
  124. ```
  125. More examples: https://github.com/acmesh-official/acme.sh/wiki/How-to-issue-a-cert
  126. # 8. Automatic DNS API integration
  127. If your DNS provider supports API access, we can use that API to automatically issue the certs.
  128. You don't have to do anything manually!
  129. ### Currently acme.sh supports most of the dns providers:
  130. https://github.com/acmesh-official/acme.sh/wiki/dnsapi
  131. 1. CloudFlare.com API
  132. 1. DNSPod.cn API
  133. 1. CloudXNS.com API
  134. 1. GoDaddy.com API
  135. 1. PowerDNS.com API
  136. 1. OVH, kimsufi, soyoustart and runabove API
  137. 1. nsupdate API
  138. 1. LuaDNS.com API
  139. 1. DNSMadeEasy.com API
  140. 1. AWS Route 53
  141. 1. aliyun.com(阿里云) API
  142. 1. ISPConfig 3.1 API
  143. 1. Alwaysdata.com API
  144. 1. Linode.com API
  145. 1. FreeDNS (https://freedns.afraid.org/)
  146. 1. cyon.ch
  147. 1. Domain-Offensive/Resellerinterface/Domainrobot API
  148. 1. Gandi LiveDNS API
  149. 1. Knot DNS API
  150. 1. DigitalOcean API (native)
  151. 1. ClouDNS.net API
  152. 1. Infoblox NIOS API (https://www.infoblox.com/)
  153. 1. VSCALE (https://vscale.io/)
  154. 1. Dynu API (https://www.dynu.com)
  155. 1. DNSimple API
  156. 1. NS1.com API
  157. 1. DuckDNS.org API
  158. 1. Name.com API
  159. 1. Dyn Managed DNS API
  160. 1. Yandex PDD API (https://pdd.yandex.ru)
  161. 1. Hurricane Electric DNS service (https://dns.he.net)
  162. 1. UnoEuro API (https://www.unoeuro.com/)
  163. 1. INWX (https://www.inwx.de/)
  164. 1. Servercow (https://servercow.de)
  165. 1. Namesilo (https://www.namesilo.com)
  166. 1. InternetX autoDNS API (https://internetx.com)
  167. 1. Azure DNS
  168. 1. selectel.com(selectel.ru) DNS API
  169. 1. zonomi.com DNS API
  170. 1. DreamHost.com API
  171. 1. DirectAdmin API
  172. 1. KingHost (https://www.kinghost.com.br/)
  173. 1. Zilore (https://zilore.com)
  174. 1. Loopia.se API
  175. 1. acme-dns (https://github.com/joohoi/acme-dns)
  176. 1. TELE3 (https://www.tele3.cz)
  177. 1. EUSERV.EU (https://www.euserv.eu)
  178. 1. DNSPod.com API (https://www.dnspod.com)
  179. 1. Google Cloud DNS API
  180. 1. ConoHa (https://www.conoha.jp)
  181. 1. netcup DNS API (https://www.netcup.de)
  182. 1. GratisDNS.dk (https://gratisdns.dk)
  183. 1. Namecheap API (https://www.namecheap.com/)
  184. 1. MyDNS.JP API (https://www.mydns.jp/)
  185. 1. hosting.de (https://www.hosting.de)
  186. 1. Neodigit.net API (https://www.neodigit.net)
  187. 1. Exoscale.com API (https://www.exoscale.com/)
  188. 1. PointDNS API (https://pointhq.com/)
  189. 1. Active24.cz API (https://www.active24.cz/)
  190. 1. do.de API (https://www.do.de/)
  191. 1. NederHost API (https://www.nederhost.nl/)
  192. 1. Nexcess API (https://www.nexcess.net)
  193. 1. Thermo.io API (https://www.thermo.io)
  194. 1. Futurehosting API (https://www.futurehosting.com)
  195. 1. Rackspace Cloud DNS (https://www.rackspace.com)
  196. 1. Online.net API (https://online.net/)
  197. 1. MyDevil.net (https://www.mydevil.net/)
  198. And:
  199. **lexicon DNS API: https://github.com/Neilpang/acme.sh/wiki/How-to-use-lexicon-dns-api
  200. (DigitalOcean, DNSimple, DNSMadeEasy, DNSPark, EasyDNS, Namesilo, NS1, PointHQ, Rage4 and Vultr etc.)**
  201. **More APIs coming soon...**
  202. If your DNS provider is not on the supported list above, you can write your own DNS API script easily. If you do, please consider submitting a [Pull Request](https://github.com/Neilpang/acme.sh/pulls) and contribute it to the project.
  203. For more details: [How to use DNS API](dnsapi)
  204. # 9. Use DNS manual mode:
  205. See: https://github.com/acmesh-official/acme.sh/wiki/dns-manual-mode first.
  206. If your dns provider doesn't support any api access, you can add the txt record by hand.
  207. ```bash
  208. acme.sh --issue --dns -d example.com -d www.example.com -d cp.example.com
  209. ```
  210. You should get an output like below:
  211. ```sh
  212. Add the following txt record:
  213. Domain:_acme-challenge.example.com
  214. Txt value:9ihDbjYfTExAYeDs4DBUeuTo18KBzwvTEjUnSwd32-c
  215. Add the following txt record:
  216. Domain:_acme-challenge.www.example.com
  217. Txt value:9ihDbjxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
  218. Please add those txt records to the domains. Waiting for the dns to take effect.
  219. ```
  220. Then just rerun with `renew` argument:
  221. ```bash
  222. acme.sh --renew -d example.com
  223. ```
  224. Ok, it's done.
  225. **Take care, this is dns manual mode, it can not be renewed automatically. you will have to add a new txt record to your domain by your hand when you renew your cert.**
  226. **Please use dns api mode instead.**
  227. # 10. Issue ECC certificates
  228. `Let's Encrypt` can now issue **ECDSA** certificates.
  229. And we support them too!
  230. Just set the `keylength` parameter with a prefix `ec-`.
  231. For example:
  232. ### Single domain ECC certificate
  233. ```bash
  234. acme.sh --issue -w /home/wwwroot/example.com -d example.com --keylength ec-256
  235. ```
  236. ### SAN multi domain ECC certificate
  237. ```bash
  238. acme.sh --issue -w /home/wwwroot/example.com -d example.com -d www.example.com --keylength ec-256
  239. ```
  240. Please look at the `keylength` parameter above.
  241. Valid values are:
  242. 1. **ec-256 (prime256v1, "ECDSA P-256")**
  243. 2. **ec-384 (secp384r1, "ECDSA P-384")**
  244. 3. **ec-521 (secp521r1, "ECDSA P-521", which is not supported by Let's Encrypt yet.)**
  245. # 11. Issue Wildcard certificates
  246. It's simple, just give a wildcard domain as the `-d` parameter.
  247. ```sh
  248. acme.sh --issue -d example.com -d '*.example.com' --dns dns_cf
  249. ```
  250. # 12. How to renew the certs
  251. No, you don't need to renew the certs manually. All the certs will be renewed automatically every **60** days.
  252. However, you can also force to renew a cert:
  253. ```sh
  254. acme.sh --renew -d example.com --force
  255. ```
  256. or, for ECC cert:
  257. ```sh
  258. acme.sh --renew -d example.com --force --ecc
  259. ```
  260. # 13. How to stop cert renewal
  261. To stop renewal of a cert, you can execute the following to remove the cert from the renewal list:
  262. ```sh
  263. acme.sh --remove -d example.com [--ecc]
  264. ```
  265. The cert/key file is not removed from the disk.
  266. You can remove the respective directory (e.g. `~/.acme.sh/example.com`) by yourself.
  267. # 14. How to upgrade `acme.sh`
  268. acme.sh is in constant development, so it's strongly recommended to use the latest code.
  269. You can update acme.sh to the latest code:
  270. ```sh
  271. acme.sh --upgrade
  272. ```
  273. # 15. Issue a cert from an existing CSR
  274. https://github.com/acmesh-official/acme.sh/wiki/Issue-a-cert-from-existing-CSR
  275. # 16. Send notifications in cronjob
  276. https://github.com/acmesh-official/acme.sh/wiki/notify
  277. # 16. Send notifications in cronjob
  278. https://github.com/Neilpang/acme.sh/wiki/notify
  279. # 17. Under the Hood
  280. Speak ACME language using shell, directly to "Let's Encrypt".
  281. TODO:
  282. # 18. Acknowledgments
  283. 1. Acme-tiny: https://github.com/diafygi/acme-tiny
  284. 2. ACME protocol: https://github.com/ietf-wg-acme/acme
  285. # 19. License & Others
  286. License is GPLv3
  287. Please Star and Fork me.