certbot官網:https://certbot.eff.org/lets-encrypt/centosrhel7-nginx
一、安裝步驟
1)安裝certbot,執行
sudo yum install certbot python2-certbot-nginx
2)檢查是否安裝成功,執行
certbot --help
[root@iz2zeb4argxs74khdclp2dz ~]# certbot --help Traceback (most recent call last): File "/usr/bin/certbot", line 9, in <module> load_entry_point('certbot==0.38.0', 'console_scripts', 'certbot')() File "/usr/lib/python2.7/site-packages/pkg_resources/__init__.py", line 561, in load_entry_point return get_distribution(dist).load_entry_point(group, name) File "/usr/lib/python2.7/site-packages/pkg_resources/__init__.py", line 2649, in load_entry_point return ep.load() File "/usr/lib/python2.7/site-packages/pkg_resources/__init__.py", line 2303, in load return self.resolve() File "/usr/lib/python2.7/site-packages/pkg_resources/__init__.py", line 2309, in resolve module = __import__(self.module_name, fromlist=['__name__'], level=0) File "/usr/lib/python2.7/site-packages/certbot/main.py", line 17, in <module> from certbot import account File "/usr/lib/python2.7/site-packages/certbot/account.py", line 17, in <module> from acme import messages File "/usr/lib/python2.7/site-packages/acme/messages.py", line 11, in <module> from acme import challenges File "/usr/lib/python2.7/site-packages/acme/challenges.py", line 12, in <module> import requests File "/usr/lib/python2.7/site-packages/requests/__init__.py", line 58, in <module> from . import utils File "/usr/lib/python2.7/site-packages/requests/utils.py", line 32, in <module> from .exceptions import InvalidURL File "/usr/lib/python2.7/site-packages/requests/exceptions.py", line 10, in <module> from .packages.urllib3.exceptions import HTTPError as BaseHTTPError File "/usr/lib/python2.7/site-packages/requests/packages/__init__.py", line 95, in load_module raise ImportError("No module named '%s'" % (name,)) ImportError: No module named 'requests.packages.urllib3'
3)解決上面沒有requests.packages.urllib3的問題,執行
pip install --upgrade --force-reinstall 'requests==2.6.0' urllib3
4)安裝證書,執行
sudo certbot --nginx
如:
[root@iz2zeb4argxs74khdclp2dz ~]# sudo certbot --nginx Saving debug log to /var/log/letsencrypt/letsencrypt.log The nginx plugin is not working; there may be problems with your existing configuration. The error was: NoInstallationError("Could not find a usable 'nginx' binary. Ensure nginx exists, the binary is executable, and your PATH is set correctly.",)
上面提示信息顯示沒有找到nginx,那么
需要將nginx放到環境變量中,設置nginx軟連接
ln -s /usr/local/nginx/sbin/nginx /usr/bin/nginx
ln -s /usr/local/nginx/conf/ /etc/nginx
再次執行就OK了
sudo certbot --nginx 安裝證書
5)然后再一步一步的根據提示進行配置
如:
[root@iz2zeb4argxs74khdclp2dz sbin]# sudo certbot --nginx Saving debug log to /var/log/letsencrypt/letsencrypt.log Plugins selected: Authenticator nginx, Installer nginx Enter email address (used for urgent renewal and security notices) (Enter 'c' to cancel): 756623607@qq.com // 1)設置郵箱,用於安全提示 Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Please read the Terms of Service at https://letsencrypt.org/documents/LE-SA-v1.2-November-15-2017.pdf. You must agree in order to register with the ACME server at https://acme-v02.api.letsencrypt.org/directory - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - (A)gree/(C)ancel: a // 2)同意協議 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Would you be willing to share your email address with the Electronic Frontier Foundation, a founding partner of the Let's Encrypt project and the non-profit organization that develops Certbot? We'd like to send you email about our work encrypting the web, EFF news, campaigns, and ways to support digital freedom. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - (Y)es/(N)o: n // 3)不共享你的郵箱 Which names would you like to activate HTTPS for? - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 1: admin.talkilla.jiushiyaokuaile.cn 2: consultant.talkilla.jiushiyaokuaile.cn 3: student.talkilla.jiushiyaokuaile.cn 4: teacher.talkilla.jiushiyaokuaile.cn 5: wechat.talkilla.jiushiyaokuaile.cn - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Select the appropriate numbers separated by commas and/or spaces, or leave input blank to select all options shown (Enter 'c' to cancel): 1 2 3 4 5 // 4)選擇需要激活https的域名 Obtaining a new certificate Performing the following challenges: http-01 challenge for admin.talkilla.jiushiyaokuaile.cn http-01 challenge for consultant.talkilla.jiushiyaokuaile.cn http-01 challenge for student.talkilla.jiushiyaokuaile.cn http-01 challenge for teacher.talkilla.jiushiyaokuaile.cn http-01 challenge for wechat.talkilla.jiushiyaokuaile.cn Waiting for verification... Cleaning up challenges Deploying Certificate to VirtualHost /usr/local/nginx/conf/conf.d/admin-talkilla.conf Deploying Certificate to VirtualHost /usr/local/nginx/conf/conf.d/consultant-talkilla.conf Deploying Certificate to VirtualHost /usr/local/nginx/conf/conf.d/student-talkilla.conf Deploying Certificate to VirtualHost /usr/local/nginx/conf/conf.d/teacher-talkilla.conf Deploying Certificate to VirtualHost /usr/local/nginx/conf/conf.d/wechat-talkilla.conf Please choose whether or not to redirect HTTP traffic to HTTPS, removing HTTP access. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 1: No redirect - Make no further changes to the webserver configuration. 2: Redirect - Make all requests redirect to secure HTTPS access. Choose this for new sites, or if you're confident your site works on HTTPS. You can undo this change by editing your web server's configuration. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Select the appropriate number [1-2] then [enter] (press 'c' to cancel): 2 // 5)設置是否將http自動重定向到https,1否2是 Redirecting all traffic on port 80 to ssl in /usr/local/nginx/conf/conf.d/admin-talkilla-http.conf Redirecting all traffic on port 80 to ssl in /usr/local/nginx/conf/conf.d/consultant-talkilla.conf Redirecting all traffic on port 80 to ssl in /usr/local/nginx/conf/conf.d/student-talkilla.conf Redirecting all traffic on port 80 to ssl in /usr/local/nginx/conf/conf.d/teacher-talkilla.conf Redirecting all traffic on port 80 to ssl in /usr/local/nginx/conf/conf.d/wechat-talkilla.conf - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Congratulations! You have successfully enabled https://admin.talkilla.jiushiyaokuaile.cn, https://consultant.talkilla.jiushiyaokuaile.cn, https://student.talkilla.jiushiyaokuaile.cn, https://teacher.talkilla.jiushiyaokuaile.cn, and https://wechat.talkilla.jiushiyaokuaile.cn You should test your configuration at: https://www.ssllabs.com/ssltest/analyze.html?d=admin.talkilla.jiushiyaokuaile.cn https://www.ssllabs.com/ssltest/analyze.html?d=consultant.talkilla.jiushiyaokuaile.cn https://www.ssllabs.com/ssltest/analyze.html?d=student.talkilla.jiushiyaokuaile.cn https://www.ssllabs.com/ssltest/analyze.html?d=teacher.talkilla.jiushiyaokuaile.cn https://www.ssllabs.com/ssltest/analyze.html?d=wechat.talkilla.jiushiyaokuaile.cn - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - IMPORTANT NOTES: - Congratulations! Your certificate and chain have been saved at: /etc/letsencrypt/live/admin.talkilla.jiushiyaokuaile.cn/fullchain.pem Your key file has been saved at: /etc/letsencrypt/live/admin.talkilla.jiushiyaokuaile.cn/privkey.pem Your cert will expire on 2020-01-06. To obtain a new or tweaked version of this certificate in the future, simply run certbot again with the "certonly" option. To non-interactively renew *all* of your certificates, run "certbot renew" - Your account credentials have been saved in your Certbot configuration directory at /etc/letsencrypt. You should make a secure backup of this folder now. This configuration directory will also contain certificates and private keys obtained by Certbot so making regular backups of this folder is ideal. - If you like Certbot, please consider supporting our work by: Donating to ISRG / Let's Encrypt: https://letsencrypt.org/donate Donating to EFF: https://eff.org/donate-le
6) 配置自動更新證書
在證書到期之后更新證書,我們可以通過 certbot renew 命令來更新證書
借助 Crontab 來編寫一個定時任務,定期強制更新一個這個證書,然后重啟 Nginx:
Crontab 通過 crontab -e 命令編輯,通過 crontab -l 查看。
這樣就完成了 SSL 安全證書更新了。
使用crontab -e 命令:
0 0 1 * * certbot renew 10 0 1 * * systemctl restart nginx
注意:
若執行certbot renew時,出現: 'ascii' codec can't decode byte 0xe8 in position 2: ordinal not in range(128) 錯誤,參考如下:
7)當需要安裝新的證書
執行:
sudo certbot run --nginx