2016-04-15 10:50:40 +00:00
# An ACME Shell script: acme.sh
2016-04-16 15:10:46 +00:00
- An ACME protocol client written purely in Shell (Unix shell) language.
2016-04-15 10:50:40 +00:00
- Fully ACME protocol implementation.
- Simple, powerful and very easy to use. You only need 3 minutes to learn.
2016-04-19 15:42:10 +00:00
- Bash, dash and sh compatible.
2016-04-15 10:50:40 +00:00
- Simplest shell script for Let's Encrypt free certificate client.
2016-04-16 15:10:46 +00:00
- Purely written in Shell with no dependencies on python or Let's Encrypt official client.
2016-04-15 10:50:40 +00:00
- Just one script, to issue, renew and install your certificates automatically.
2016-04-21 13:12:48 +00:00
- DOES NOT require `root/sudoer` access.
2015-12-26 13:44:39 +00:00
2016-04-15 10:50:40 +00:00
It's probably the `easiest&smallest&smartest` shell script to automatically issue & renew the free certificates from Let's Encrypt.
2015-12-26 13:44:39 +00:00
2016-04-14 13:44:26 +00:00
Wiki: https://github.com/Neilpang/acme.sh/wiki
2016-04-05 14:48:33 +00:00
2016-09-30 13:27:23 +00:00
# [中文说明](https://github.com/Neilpang/acme.sh/wiki/%E8%AF%B4%E6%98%8E)
2016-01-23 15:04:42 +00:00
#Tested OS
2016-04-21 13:09:08 +00:00
| NO | Status| Platform|
|----|-------|---------|
2016-04-25 05:48:03 +00:00
|1|[![](https://cdn.rawgit.com/Neilpang/acmetest/master/status/ubuntu-latest.svg)](https://github.com/Neilpang/letest#here-are-the-latest-status)| Ubuntu
|2|[![](https://cdn.rawgit.com/Neilpang/acmetest/master/status/debian-latest.svg)](https://github.com/Neilpang/letest#here-are-the-latest-status)| Debian
|3|[![](https://cdn.rawgit.com/Neilpang/acmetest/master/status/centos-latest.svg)](https://github.com/Neilpang/letest#here-are-the-latest-status)|CentOS
2016-04-25 05:49:02 +00:00
|4|[![](https://cdn.rawgit.com/Neilpang/acmetest/master/status/windows-cygwin.svg)](https://github.com/Neilpang/letest#here-are-the-latest-status)|Windows (cygwin with curl, openssl and crontab included)
2016-04-25 05:48:03 +00:00
|5|[![](https://cdn.rawgit.com/Neilpang/acmetest/master/status/freebsd.svg)](https://github.com/Neilpang/letest#here-are-the-latest-status)|FreeBSD
|6|[![](https://cdn.rawgit.com/Neilpang/acmetest/master/status/pfsense.svg)](https://github.com/Neilpang/letest#here-are-the-latest-status)|pfsense
|7|[![](https://cdn.rawgit.com/Neilpang/acmetest/master/status/opensuse-latest.svg)](https://github.com/Neilpang/letest#here-are-the-latest-status)|openSUSE
|8|[![](https://cdn.rawgit.com/Neilpang/acmetest/master/status/alpine-latest.svg)](https://github.com/Neilpang/letest#here-are-the-latest-status)|Alpine Linux (with curl)
|9|[![](https://cdn.rawgit.com/Neilpang/acmetest/master/status/base-archlinux.svg)](https://github.com/Neilpang/letest#here-are-the-latest-status)|Archlinux
|10|[![](https://cdn.rawgit.com/Neilpang/acmetest/master/status/fedora-latest.svg)](https://github.com/Neilpang/letest#here-are-the-latest-status)|fedora
|11|[![](https://cdn.rawgit.com/Neilpang/acmetest/master/status/kalilinux-kali-linux-docker.svg)](https://github.com/Neilpang/letest#here-are-the-latest-status)|Kali Linux
|12|[![](https://cdn.rawgit.com/Neilpang/acmetest/master/status/oraclelinux-latest.svg)](https://github.com/Neilpang/letest#here-are-the-latest-status)|Oracle Linux
|13|[![](https://cdn.rawgit.com/Neilpang/acmetest/master/status/proxmox.svg)](https://github.com/Neilpang/letest#here-are-the-latest-status)| Proxmox https://pve.proxmox.com/wiki/HTTPSCertificateConfiguration#Let.27s_Encrypt_using_acme.sh
2016-04-24 05:57:50 +00:00
|14|-----| Cloud Linux https://github.com/Neilpang/le/issues/111
2016-04-25 05:48:03 +00:00
|15|[![](https://cdn.rawgit.com/Neilpang/acmetest/master/status/openbsd.svg)](https://github.com/Neilpang/letest#here-are-the-latest-status)|OpenBSD
2016-06-05 11:53:22 +00:00
|16|[![](https://cdn.rawgit.com/Neilpang/acmetest/master/status/mageia.svg)](https://github.com/Neilpang/letest#here-are-the-latest-status)|Mageia
2016-07-25 18:07:34 +00:00
|17|-----| OpenWRT: Tested and working. See [wiki page ](https://github.com/Neilpang/acme.sh/wiki/How-to-run-on-OpenWRT )
2016-08-11 05:47:38 +00:00
|18|[![](https://cdn.rawgit.com/Neilpang/acmetest/master/status/solaris.svg)](https://github.com/Neilpang/letest#here-are-the-latest-status)|SunOS/Solaris
2015-12-26 13:44:39 +00:00
2016-04-15 10:50:40 +00:00
For all build statuses, check our [daily build project ](https://github.com/Neilpang/acmetest ):
2015-12-26 13:44:39 +00:00
2016-04-14 13:44:26 +00:00
https://github.com/Neilpang/acmetest
2016-03-11 13:57:05 +00:00
2016-04-15 10:50:40 +00:00
# Supported Mode
2016-01-10 02:59:51 +00:00
1. Webroot mode
2. Standalone mode
3. Apache mode
2016-01-21 16:17:20 +00:00
4. Dns mode
2016-01-10 02:59:51 +00:00
2016-04-15 10:50:40 +00:00
2016-04-10 04:54:01 +00:00
2016-08-25 14:13:34 +00:00
# 1. How to install
2015-12-26 13:44:39 +00:00
2016-04-13 15:36:32 +00:00
### 1. Install online:
2015-12-26 13:44:39 +00:00
2016-04-24 10:50:09 +00:00
Check this project: https://github.com/Neilpang/get.acme.sh
2016-04-14 14:27:51 +00:00
2016-04-15 10:50:40 +00:00
```bash
2016-04-16 15:10:46 +00:00
curl https://get.acme.sh | sh
2016-03-27 12:43:32 +00:00
```
Or:
2016-04-15 10:50:40 +00:00
```bash
2016-04-16 15:10:46 +00:00
wget -O - https://get.acme.sh | sh
2016-03-27 12:43:32 +00:00
```
2016-04-13 15:36:32 +00:00
### 2. Or, Install from git:
2016-04-15 10:50:40 +00:00
2016-03-27 12:43:32 +00:00
Clone this project:
2016-04-15 10:50:40 +00:00
```bash
2016-04-14 13:44:26 +00:00
git clone https://github.com/Neilpang/acme.sh.git
2016-04-15 10:50:40 +00:00
cd ./acme.sh
2016-04-14 13:44:26 +00:00
./acme.sh --install
2015-12-26 13:44:39 +00:00
```
2016-03-27 12:43:32 +00:00
2016-04-15 10:50:40 +00:00
You `don't have to be root` then, although `it is recommended` .
2016-04-21 13:43:28 +00:00
Advanced Installation: https://github.com/Neilpang/acme.sh/wiki/How-to-install
2016-04-15 10:50:40 +00:00
The installer will perform 3 actions:
2016-01-23 15:04:42 +00:00
2016-04-15 10:50:40 +00:00
1. Create and copy `acme.sh` to your home dir (`$HOME`): `~/.acme.sh/` .
All certs will be placed in this folder.
2016-04-24 10:50:09 +00:00
2. Create alias for: `acme.sh=~/.acme.sh/acme.sh` .
2016-04-15 10:50:40 +00:00
3. Create everyday cron job to check and renew the cert if needed.
Cron entry example:
```bash
0 0 * * * "/home/user/.acme.sh"/acme.sh --cron --home "/home/user/.acme.sh" > /dev/null
```
2015-12-27 05:52:46 +00:00
2016-04-15 10:50:40 +00:00
After the installation, you must close current terminal and reopen again to make the alias take effect.
2015-12-27 05:52:46 +00:00
2016-03-10 05:47:35 +00:00
Ok, you are ready to issue cert now.
2015-12-26 13:44:39 +00:00
Show help message:
2016-04-15 10:50:40 +00:00
2015-12-26 13:44:39 +00:00
```
2016-05-29 06:08:39 +00:00
root@v1:~# acme.sh -h
2016-04-16 09:27:30 +00:00
2015-12-26 13:44:39 +00:00
```
2016-08-25 14:13:34 +00:00
# 2. Just issue a cert:
2016-03-07 01:52:54 +00:00
2016-04-15 10:50:40 +00:00
**Example 1:** Single domain.
2016-03-07 01:52:54 +00:00
2016-04-15 10:50:40 +00:00
```bash
2016-10-13 02:14:36 +00:00
acme.sh --issue -d example.com -w /home/wwwroot/example.com
2015-12-26 13:44:39 +00:00
```
2016-04-15 10:50:40 +00:00
**Example 2:** Multiple domains in the same cert.
```bash
2016-10-13 02:14:36 +00:00
acme.sh --issue -d example.com -d www.example.com -d cp.example.com -w /home/wwwroot/example.com
2015-12-26 13:44:39 +00:00
```
2016-03-07 01:52:54 +00:00
2016-10-13 02:14:36 +00:00
The parameter `/home/wwwroot/example.com` is the web root folder. You **MUST** have `write access` to this folder.
2015-12-26 13:44:39 +00:00
2016-10-13 02:14:36 +00:00
Second argument ** "example.com"** is the main domain you want to issue cert for.
2016-04-15 10:50:40 +00:00
You must have at least a domain there.
2015-12-26 13:44:39 +00:00
2016-10-13 02:14:36 +00:00
You must point and bind all the domains to the same webroot dir: `/home/wwwroot/example.com` .
2015-12-26 13:44:39 +00:00
2016-10-13 02:14:36 +00:00
Generate/issued certs will be placed in `~/.acme.sh/example.com/`
2015-12-26 13:44:39 +00:00
2016-10-04 13:17:19 +00:00
The issued cert will be renewed every **60** days automatically.
2015-12-26 13:44:39 +00:00
2016-04-14 13:44:26 +00:00
More examples: https://github.com/Neilpang/acme.sh/wiki/How-to-issue-a-cert
2016-04-09 15:40:59 +00:00
2016-09-27 14:03:42 +00:00
# 3. Install the issued cert to apache/nginx etc.
2016-04-09 15:40:59 +00:00
2016-09-27 14:03:42 +00:00
After you issue a cert, you probably want to install/copy the cert to your nginx/apache or other servers you may be using.
2016-04-15 10:50:40 +00:00
```bash
2016-10-13 02:14:36 +00:00
acme.sh --installcert -d example.com \
2016-04-09 15:40:59 +00:00
--certpath /path/to/certfile/in/apache/nginx \
--keypath /path/to/keyfile/in/apache/nginx \
--capath /path/to/ca/certfile/apache/nginx \
--fullchainpath path/to/fullchain/certfile/apache/nginx \
--reloadcmd "service apache2|nginx reload"
2015-12-26 13:44:39 +00:00
```
2016-01-23 15:04:42 +00:00
2016-04-09 15:40:59 +00:00
Only the domain is required, all the other parameters are optional.
2016-09-27 14:03:42 +00:00
Install/copy the issued cert/key to the production apache or nginx path.
2016-01-23 15:04:42 +00:00
2016-10-04 13:17:19 +00:00
The cert will be `renewed every **60** days by default` (which is configurable). Once the cert is renewed, the apache/nginx will be automatically reloaded by the command: `service apache2 reload` or `service nginx reload` .
2015-12-26 13:44:39 +00:00
2016-08-25 14:13:34 +00:00
# 4. Use Standalone server to issue cert
2015-12-26 13:44:39 +00:00
2016-04-15 10:50:40 +00:00
**(requires you be root/sudoer, or you have permission to listen tcp 80 port)**
2016-01-05 13:59:27 +00:00
2016-04-15 10:50:40 +00:00
The tcp `80` port **MUST** be free to listen, otherwise you will be prompted to free the `80` port and try again.
```bash
2016-10-13 02:14:36 +00:00
acme.sh --issue --standalone -d example.com -d www.example.com -d cp.example.com
2016-01-05 13:59:27 +00:00
```
2016-04-14 13:44:26 +00:00
More examples: https://github.com/Neilpang/acme.sh/wiki/How-to-issue-a-cert
2016-04-09 15:40:59 +00:00
2016-08-25 14:13:34 +00:00
# 5. Use Standalone tls server to issue cert
2016-06-17 05:23:44 +00:00
**(requires you be root/sudoer, or you have permission to listen tcp 443 port)**
acme.sh supports `tls-sni-01` validation.
The tcp `443` port **MUST** be free to listen, otherwise you will be prompted to free the `443` port and try again.
```bash
2016-10-13 02:14:36 +00:00
acme.sh --issue --tls -d example.com -d www.example.com -d cp.example.com
2016-06-17 05:23:44 +00:00
```
More examples: https://github.com/Neilpang/acme.sh/wiki/How-to-issue-a-cert
2016-08-25 14:13:34 +00:00
# 6. Use Apache mode
2016-04-15 10:50:40 +00:00
**(requires you be root/sudoer, since it is required to interact with apache server)**
If you are running a web server, apache or nginx, it is recommended to use the `Webroot mode` .
2016-04-09 15:40:59 +00:00
2016-04-15 10:50:40 +00:00
Particularly, if you are running an apache server, you should use apache mode instead. This mode doesn't write any files to your web root folder.
2016-01-10 02:59:51 +00:00
2016-04-15 10:50:40 +00:00
Just set string "apache" as the second argument, it will force use of apache plugin automatically.
2016-01-10 02:59:51 +00:00
```
2016-10-13 02:14:36 +00:00
acme.sh --issue --apache -d example.com -d www.example.com -d user.example.com
2016-01-10 02:59:51 +00:00
```
2016-04-09 15:40:59 +00:00
2016-04-14 13:44:26 +00:00
More examples: https://github.com/Neilpang/acme.sh/wiki/How-to-issue-a-cert
2016-01-10 02:59:51 +00:00
2016-08-25 14:13:34 +00:00
# 7. Use DNS mode:
2016-01-21 16:16:43 +00:00
2016-04-15 10:50:40 +00:00
Support the `dns-01` challenge.
```bash
2016-10-13 02:14:36 +00:00
acme.sh --issue --dns -d example.com -d www.example.com -d user.example.com
2016-01-21 16:16:43 +00:00
```
2016-04-15 10:50:40 +00:00
You should get the output like below:
2016-01-21 16:16:43 +00:00
```
Add the following txt record:
2016-10-13 02:14:36 +00:00
Domain:_acme-challenge.example.com
2016-01-21 16:16:43 +00:00
Txt value:9ihDbjYfTExAYeDs4DBUeuTo18KBzwvTEjUnSwd32-c
Add the following txt record:
2016-10-13 02:14:36 +00:00
Domain:_acme-challenge.www.example.com
2016-01-21 16:16:43 +00:00
Txt value:9ihDbjxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
Please add those txt records to the domains. Waiting for the dns to take effect.
```
2016-04-15 10:50:40 +00:00
Then just rerun with `renew` argument:
```bash
2016-10-13 02:14:36 +00:00
acme.sh --renew -d example.com
2016-01-21 16:16:43 +00:00
```
Ok, it's finished.
2016-08-25 14:13:34 +00:00
# 8. Automatic DNS API integration
2016-01-21 16:16:43 +00:00
2016-04-15 10:50:40 +00:00
If your DNS provider supports API access, we can use API to automatically issue the certs.
2015-12-26 13:44:39 +00:00
2016-04-15 10:50:40 +00:00
You don't have do anything manually!
2016-01-30 15:15:30 +00:00
2016-04-15 10:50:40 +00:00
### Currently acme.sh supports:
2016-02-07 10:37:04 +00:00
2016-04-15 10:50:40 +00:00
1. Cloudflare.com API
2. Dnspod.cn API
3. Cloudxns.com API
2016-07-29 10:07:16 +00:00
4. Godaddy.com API
2016-08-25 05:10:13 +00:00
5. OVH, kimsufi, soyoustart and runabove API
6. AWS Route 53, see: https://github.com/Neilpang/acme.sh/issues/65
2016-10-09 14:17:45 +00:00
7. PowerDNS API
2016-10-09 13:56:04 +00:00
8. lexicon dns api: https://github.com/Neilpang/acme.sh/wiki/How-to-use-lexicon-dns-api
2016-05-08 10:29:30 +00:00
(DigitalOcean, DNSimple, DnsMadeEasy, DNSPark, EasyDNS, Namesilo, NS1, PointHQ, Rage4 and Vultr etc.)
2016-11-14 14:56:07 +00:00
9. nsupdate
2016-01-30 15:15:30 +00:00
2016-04-15 10:50:40 +00:00
##### More APIs are coming soon...
2016-01-30 15:15:30 +00:00
2016-04-15 10:50:40 +00:00
If your DNS provider is not on the supported list above, you can write your own script API easily. If you do please consider submitting a [Pull Request ](https://github.com/Neilpang/acme.sh/pulls ) and contribute to the project.
2016-01-30 15:15:30 +00:00
2016-02-07 10:37:04 +00:00
For more details: [How to use dns api ](dnsapi )
2016-01-30 15:15:30 +00:00
2016-08-25 14:13:34 +00:00
# 9. Issue ECC certificate:
2016-04-15 10:50:40 +00:00
`Let's Encrypt` now can issue **ECDSA** certificates.
2016-02-12 09:56:50 +00:00
And we also support it.
2016-03-02 14:53:07 +00:00
Just set the `length` parameter with a prefix `ec-` .
2016-04-15 10:50:40 +00:00
2016-02-12 09:56:50 +00:00
For example:
2016-03-10 06:17:47 +00:00
2016-04-15 10:50:40 +00:00
### Single domain ECC cerfiticate:
2016-03-10 06:17:47 +00:00
2016-04-15 10:50:40 +00:00
```bash
2016-10-13 02:14:36 +00:00
acme.sh --issue -w /home/wwwroot/example.com -d example.com --keylength ec-256
2016-02-12 09:56:50 +00:00
```
2016-04-15 10:50:40 +00:00
SAN multi domain ECC certificate:
```bash
2016-10-13 02:14:36 +00:00
acme.sh --issue -w /home/wwwroot/example.com -d example.com -d www.example.com --keylength ec-256
2016-03-10 06:17:47 +00:00
```
2016-02-12 09:56:50 +00:00
Please look at the last parameter above.
Valid values are:
2016-04-15 10:50:40 +00:00
1. **ec-256 (prime256v1, "ECDSA P-256")**
2. **ec-384 (secp384r1, "ECDSA P-384")**
3. **ec-521 (secp521r1, "ECDSA P-521", which is not supported by Let's Encrypt yet.)**
2016-02-12 09:56:50 +00:00
2016-08-25 14:13:34 +00:00
# 10. How to renew the cert
2016-10-04 13:17:19 +00:00
No, you don't need to renew the certs manually. All the certs will be renewed automatically every **60** days.
2016-08-25 14:13:34 +00:00
However, you can also force to renew any cert:
```
2016-10-13 02:14:36 +00:00
acme.sh --renew -d example.com --force
2016-08-25 14:13:34 +00:00
```
or, for ECC cert:
```
2016-10-13 02:14:36 +00:00
acme.sh --renew -d example.com --force --ecc
2016-08-25 14:13:34 +00:00
```
# 11. How to upgrade `acme.sh`
acme.sh is in developing, it's strongly recommended to use the latest code.
You can update acme.sh to the latest code:
```
acme.sh --upgrade
```
2016-09-28 14:11:00 +00:00
You can enable auto upgrade:
```
acme.sh --upgrade --auto-upgrade
```
Then **acme.sh** will keep up to date automatically.
Disable auto upgrade:
```
acme.sh --upgrade --auto-upgrade 0
```
2016-09-27 14:03:42 +00:00
# 12. Issue a cert from an existing CSR
2016-08-27 06:00:26 +00:00
https://github.com/Neilpang/acme.sh/wiki/Issue-a-cert-from-existing-CSR
2016-04-15 10:50:40 +00:00
# Under the Hood
2015-12-26 13:44:39 +00:00
2016-04-16 15:10:46 +00:00
Speak ACME language using shell, directly to "Let's Encrypt".
2015-12-26 13:44:39 +00:00
TODO:
2016-04-15 10:50:40 +00:00
# Acknowledgment
2016-01-11 05:23:02 +00:00
1. Acme-tiny: https://github.com/diafygi/acme-tiny
2. ACME protocol: https://github.com/ietf-wg-acme/acme
2016-05-14 11:47:03 +00:00
3. Certbot: https://github.com/certbot/certbot
2016-01-11 05:23:02 +00:00
2016-09-27 14:03:42 +00:00
# License & Others
2015-12-26 13:44:39 +00:00
License is GPLv3
2015-12-26 13:47:28 +00:00
Please Star and Fork me.
2015-12-26 13:44:39 +00:00
2016-04-15 10:50:40 +00:00
[Issues ](https://github.com/Neilpang/acme.sh/issues ) and [pull requests ](https://github.com/Neilpang/acme.sh/pulls ) are welcomed.
2015-12-26 13:44:39 +00:00
2016-07-16 13:57:29 +00:00
# Donate
1. PayPal: donate@acme.sh
2015-12-26 13:44:39 +00:00
2016-08-23 15:16:19 +00:00
[Donate List ](https://github.com/Neilpang/acme.sh/wiki/Donate-list )