Install Let’s Encrypt SSL on Debian 8 with Apache webserver

Estimated reading time: 2 min

What you’ll learn

In this tutorial, you will learn the procedure of TLS/SSL certificate installation on Apache web server running on Debian 8 Jessie. Once you are finished, all traffic between server and client will be encrypted and safe. This is a standard practice of securing e-commerce websites and other financial services online.

What you’ll need

Before you begin working with this guide you’ll need these:

  • SSH with non root but sudo user access to the Debian 8 Jessie VPS
  • The apache web server with properly a domain and vhost configured


Step 1 — Installing Let’s Encrypt certbot

The rst step to using Let’s Encrypt to obtain an SSL certificate is to install the certbot Let’s Encrypt client on your server. To access the certbot package, we will have to enable the Jessie backports repository as the certbot package was not available when Debian 8 was released. This repository can be used to install more recent versions of software than the ones included in the stable repositories. Add the backports repository to your server by typing:

$ echo 'deb http://ftp.debian.org/debian jessie-backports main' | sudo tee 
/etc/apt/sources.list.d/backports.list

Now you should be ready to proceed further.

$ sudo apt-get update && sudo apt-get install python-certbot-apache -t jessie- backports

Step 2 — Create and install the SSL certificates)

Generating the SSL Certificate for Apache using the Let’s Encrypt client is quite straightforward. The client will automatically obtain and install a new SSL certificate that is valid for the domains in our Apache configuration. To execute the interactive installation and obtain a certificate for all of the domains de ned in your Apache configuration, type:

Step 3 — Check the SSL certificate(s) configuration

At above stage your certi cate are created and configured. Now check your domain virtualhost con g le with the ssl is like this or not. If not then put these manually on virtualhost’s ssl configuration:


SSLCertificateFile /etc/letsencrypt/live/<your-domain>/cert.pem
SSLCertificateKeyFile /etc/letsencrypt/live/<your-domain>/privkey.pem
SSLCertificateChainFile /etc/letsencrypt/live/<your-domain>/chain.pem

Now need to test as our configuration goes right with this –

$ sudo apachectl configtest

Finally, restart Nginx and You can taste that your SSL is working. 🙂

$ sudo service apache2 reload

Step 4 — Setting up for the auto renewal

The Certbot packages on your system come with a cron job that will renew your certi cates automatically before they expire. Since Let’s Encrypt certi cates last for 90 days, it’s highly advisable to take advantage of this feature. You can test automatic renewal for your certi cates by running this command:

s$ udo certbot renew --dry-run

Finally

You have just secured your apache web server by implementing the most anticipated security feature – free SSL certificates! From now on all traffic between your domain web server and client is secure, you can be assured that no one could intercept the communication and alter or steal crucial information. 😀
Happy Hacking!

Was this article helpful?
Dislike 0
Views: 63

Reader Interactions