security|July 04, 2018|3 min read

How to Renew Lets Encrypt SSL Certificate

TL;DR

Use certbot renew or certbot certonly with the appropriate flags to renew your Let's Encrypt SSL certificate, handling common issues like port conflicts and Cloudflare DNS.

How to Renew Lets Encrypt SSL Certificate

Introduction to problem

This post is applicable for those who has already an SSL certificate from Lets Encrypt. And, wants to renew them.

Some Old Reference to Lets Encrypt commands

For previous posts about Lets Encrypt. See:

To know Certificate Expiry date

There may be a chance that you are running multiple websites from a server. You must be having an utility installed called: certbot. To get expiry date of each websites on your server, run:

sudo certbot certificates

It will list down all the certificates list and their expiry date. Sample output:

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Found the following certs:
  Certificate Name: abcdef.com
    Domains: abcdef.com www.abcdef.com
    Expiry Date: 2018-07-22 01:30:26+00:00 (INVALID: EXPIRED)
    Certificate Path: /etc/letsencrypt/live/abcdef.com/fullchain.pem
    Private Key Path: /etc/letsencrypt/live/abcdef.com/privkey.pem
  Certificate Name: abcdefgh.com
    Domains: abcdefgh.com www.abcdefgh.com
    Expiry Date: 2019-03-07 08:02:01+00:00 (VALID: 89 days)
    Certificate Path: /etc/letsencrypt/live/abcdefgh.com/fullchain.pem
    Private Key Path: /etc/letsencrypt/live/abcdefgh.com/privkey.pem
  Certificate Name: abcdefghij.com
    Domains: abcdefghij.com www.abcdefghij.com
    Expiry Date: 2019-03-07 08:03:10+00:00 (VALID: 89 days)
    Certificate Path: /etc/letsencrypt/live/abcdefghij.com/fullchain.pem
    Private Key Path: /etc/letsencrypt/live/abcdefghij.com/privkey.pem
  Certificate Name: abcdefghijkl.com
    Domains: abcdefghijkl.com www.abcdefghijkl.com
    Expiry Date: 2019-01-06 01:30:19+00:00 (VALID: 29 days)
    Certificate Path: /etc/letsencrypt/live/abcdefghijkl.com/fullchain.pem
    Private Key Path: /etc/letsencrypt/live/abcdefghijkl.com/privkey.pem
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Renew a Certificate

Run command:

sudo certbot certonly -d <your-website>.com -d www.<your-website>.com

Note: I’m asking for both www and non-www version of certificate.

it will then ask for ways to authenticate:

How would you like to authenticate with the ACME CA?
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
1: Spin up a temporary webserver (standalone)
2: Place files in webroot directory (webroot)

Simply type 2 and press Enter. It will then ask for webroot, where your index.html or index.php resides. After typing, it will confirm, and start processing your request.

If everything goes fine, following is the output:

Waiting for verification...
Cleaning up challenges

IMPORTANT NOTES:
 - Congratulations! Your certificate and chain have been saved at:
   /etc/letsencrypt/live/xyz.com/fullchain.pem
   Your key file has been saved at:
   /etc/letsencrypt/live/xyz.com/privkey.pem
   Your cert will expire on 2019-03-07. To obtain a new or tweaked
   version of this certificate in the future, simply run certbot
   again. To non-interactively renew *all* of your certificates, run
   "certbot renew"
 - If you like Certbot, please consider supporting our work by:

   Donating to ISRG / Let's Encrypt:   https://letsencrypt.org/donate
   Donating to EFF:                    https://eff.org/donate-le

And, now if you run:

sudo certbot certificates

You can see the updated expiry date.

Caution while renew SSL certificate

If by any chance, your request failed. You should change your command to:

sudo certbot certonly -d <your-website>.com -d www.<your-website>.com --dry-run

In case, you keeps on retrying. Lets encrypt has a quota of requests that it takes from a client. It will block you for the day or more. And, you will only request after that time limit. What this option does is it will test your configuration, and if everything goes fine, it will just display message: Success. It will not replace your new certificates.

But, this surely helps identifying errors. You should also look at the log file it generates. In the output message on console, it display the logfile path.

Hope you find this post useful.

Related Posts

How to renew SSL certificate from Lets-encrypt when your website is using cloudflare

How to renew SSL certificate from Lets-encrypt when your website is using cloudflare

Lets-Encrypt SSL Certificate Useful Commands

Lets-Encrypt SSL Certificate Useful Commands

You might need to put sudo before above command. The command will show details…

Lets Encrypt SSL Error&#58; The client lacks sufficient authorization 403 Forbidden

Lets Encrypt SSL Error&#58; The client lacks sufficient authorization 403 Forbidden

This is due to our web server are configured to deny accessing this directory…

Dockerfile for building Python 3.9.2 and Openssl for FIPS

Dockerfile for building Python 3.9.2 and Openssl for FIPS

Introduction In previous posts, we saw how to build FIPS enabled Openssl, and…

How to Patch and Build Python 3.9.x for FIPS enabled Openssl

How to Patch and Build Python 3.9.x for FIPS enabled Openssl

Introduction In this post, we will see Python 3.9.x patch for FIPS enabled…

How to build FIPS enabled Openssl in docker

How to build FIPS enabled Openssl in docker

Introduction In this post, we will see how we can build FIPS enabled openssl in…

Latest Posts

Claude Code Skills — Build a Better Engineering Workflow with AI-Powered Code Reviews, Security Scans, and More

Claude Code Skills — Build a Better Engineering Workflow with AI-Powered Code Reviews, Security Scans, and More

Most developers use Claude Code like a search engine — ask a question, get an…

Building an AI Voicebot for Visitor Check-In — A Practical Guide to Handling the Messy Parts

Building an AI Voicebot for Visitor Check-In — A Practical Guide to Handling the Messy Parts

Every office lobby has the same problem: a visitor walks in, nobody’s at the…

Server Security Best Practices — Complete Hardening Guide for Production Systems

Server Security Best Practices — Complete Hardening Guide for Production Systems

Every breach post-mortem tells the same story: an unpatched service, a…

Staff Engineer Study Plan for MAANG Interviews — The Complete 12-Week Roadmap

Staff Engineer Study Plan for MAANG Interviews — The Complete 12-Week Roadmap

If you’re a Senior Engineer (L5) preparing for Staff (L6+) roles at MAANG…

XSS and CSRF Explained — The Complete Guide with Real Attack Examples and Defenses

XSS and CSRF Explained — The Complete Guide with Real Attack Examples and Defenses

XSS and CSRF have been in the OWASP Top 10 for over a decade. They’re among the…

OWASP Top 10 (2021) — Every Vulnerability Explained with Code

OWASP Top 10 (2021) — Every Vulnerability Explained with Code

The OWASP Top 10 is the industry standard for web application security risks. If…