Let’s Encrypt 官方部署 HTTPS 证书


一、Let’s Encrypt 官方部署 HTTPS 证书

1、域名

1、通过 http 方式申请证书

使用 acme.sh 配置 Let’s Encrypt 签发的 域名 SSL 证书

1、安装acme.sh

# 第一步:安装 / 升级 acme.sh
# acme.sh 是著名的自动化证书签发程序,支持 Let’s Encrypt、ZeroSSL 等不同的证书提供商。
# # 安装acme.sh(替换为你的邮箱,用于接收证书过期提醒)your-email@example.com
curl https://get.acme.sh | sh -s email=shenweiraki2@163.com
# 如果安装过,那么升级方式:acme.sh --upgrade
# 因为 IP 证书目前只能通过 http-01 和 tls-alpn-01 方式进行验证,所以你需要检查服务器的防火墙,设置允许 TCP 80 和 TCP / UDP 443 端口在公网可以访问。

# 加载环境变量,使 acme.sh 命令立即生效
source ~/.bashrc
# 验证安装是否成功
acme.sh --version
#若输出类似`acme.sh v3.0.7`的版本信息,说明安装成功。

2、配置 Nginx 80 端口的默认站点

# 停止Nginx
systemctl stop nginx

vim /etc/nginx/nginx.conf

新增


# Merge Let's Encrypt and SSL verification path configuration
location ~ ^/.well-known/(acme-challenge|pki-validation)/ {
  add_header Content-Type text/plain;
  root /home/webuser/www/letsencrypt;
}

示例


server {
   # Listen on port 80 for all IPv4 and IPv6 addresses
  listen 80 default_server;
  listen [::]:80 default_server;
 
   # Match all domain names
  server_name _;

   # Merge Let's Encrypt and SSL verification path configuration
  location ~ ^/.well-known/(acme-challenge|pki-validation)/ {
      add_header Content-Type text/plain;
      root /home/webuser/www/letsencrypt;
  }

   # Redirect all other HTTP requests to HTTPS using 301 permanent redirect
  location / {
      return 301 https://$host$request_uri;
  }
}

3、然后创建两个目录并重新加载 Nginx

mkdir -p /home/webuser/www/letsencrypt
mkdir -p /etc/nginx/ssl

nginx -t
nginx -s reload
systemctl restart nginx
systemctl status nginx

4、使用 acme.sh 签发 域名 证书

# 申请IP证书(替换为你的公网IP)
acme.sh --issue --server letsencrypt \
-d website.ouhayo.cloudns.be \
-w /home/webuser/www/letsencrypt \
--certificate-profile shortlived \
--days 3


# 命令具体解析如下:
acme.sh --issue --server letsencrypt \
-d website.ouhayo.cloudns.be \
-w /home/webuser/www/letsencrypt \
--certificate-profile shortlived \
--days 3 \
--standalone

acme.sh 执行 acme.sh 脚本。
--issue:申请一个新证书。
--server letsencrypt:使用 Let’s Encrypt 服务器。
-d website.ouhayo.cloudns.be:证书申请的目标是 域名 地址 website.ouhayo.cloudns.be
--certificate-profile shortlived:申请一个短期证书
--days 3:证书的有效期是 3 天
--standalone:使用 standalone 模式验证,不依赖现有的 Web 服务器。(需要80/443端口)

# 注意这里我们必须使用 shortlived 这个 Profile,因为 Let's Encrypt 的 IP 证书有效期只有 6.66666 天(160 小时),同时 acme.sh 需要更短的时间来进行检查更新证书,所以可以设置 --days 3 参数,让它 3 天检查并更新一次,你也可以设置 4 或 5,但是不要设置 6,否则可能证书过期了都没更新哦。

输出日志

[root@rockylinux9 ~]# acme.sh --issue --server letsencrypt \
-d website.ouhayo.cloudns.be \
-w /home/webuser/www/letsencrypt \
--certificate-profile shortlived \
--days 3
[Mon Feb 16 07:52:24 PM CST 2026] Using CA: https://acme-v02.api.letsencrypt.org/directory
[Mon Feb 16 07:52:24 PM CST 2026] Creating domain key
[Mon Feb 16 07:52:24 PM CST 2026] The domain key is here: /root/.acme.sh/website.ouhayo.cloudns.be_ecc/website.ouhayo.cloudns.be.key
[Mon Feb 16 07:52:24 PM CST 2026] Single domain='website.ouhayo.cloudns.be'
[Mon Feb 16 07:52:27 PM CST 2026] Getting webroot for domain='website.ouhayo.cloudns.be'
[Mon Feb 16 07:52:27 PM CST 2026] website.ouhayo.cloudns.be is already verified, skipping http-01.
[Mon Feb 16 07:52:27 PM CST 2026] Verification finished, beginning signing.
[Mon Feb 16 07:52:27 PM CST 2026] Let's finalize the order.
[Mon Feb 16 07:52:27 PM CST 2026] Le_OrderFinalize='https://acme-v02.api.letsencrypt.org/acme/finalize/3062356086/480923124236'
[Mon Feb 16 07:52:29 PM CST 2026] Downloading cert.
[Mon Feb 16 07:52:29 PM CST 2026] Le_LinkCert='https://acme-v02.api.letsencrypt.org/acme/cert/05cb3c480425e890fac5b4f173fb348a4de2'
[Mon Feb 16 07:52:30 PM CST 2026] Cert success.
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
[Mon Feb 16 07:52:30 PM CST 2026] Your cert is in: /root/.acme.sh/website.ouhayo.cloudns.be_ecc/website.ouhayo.cloudns.be.cer
[Mon Feb 16 07:52:30 PM CST 2026] Your cert key is in: /root/.acme.sh/website.ouhayo.cloudns.be_ecc/website.ouhayo.cloudns.be.key
[Mon Feb 16 07:52:30 PM CST 2026] The intermediate CA cert is in: /root/.acme.sh/website.ouhayo.cloudns.be_ecc/ca.cer
[Mon Feb 16 07:52:30 PM CST 2026] And the full-chain cert is in: /root/.acme.sh/website.ouhayo.cloudns.be_ecc/fullchain.cer

5、然后我们可以把申请好的证书放在 /etc/nginx/ssl 目录:

acme.sh --install-cert -d website.ouhayo.cloudns.be \
 --key-file       /etc/nginx/ssl/ip.key \
 --fullchain-file /etc/nginx/ssl/ip.crt \
 --ca-file       /etc/nginx/ssl/ip.ca.crt \
 --reloadcmd     "systemctl restart nginx"

输出日志

[root@rockylinux9 ~]# acme.sh --install-cert -d website.ouhayo.cloudns.be \
 --key-file       /etc/nginx/ssl/ip.key \
 --fullchain-file /etc/nginx/ssl/ip.crt \
 --ca-file       /etc/nginx/ssl/ip.ca.crt \
 --reloadcmd     "systemctl restart nginx"
[Mon Feb 16 07:55:37 PM CST 2026] The domain 'website.ouhayo.cloudns.be' seems to already have an ECC cert, let's use it.
[Mon Feb 16 07:55:37 PM CST 2026] Installing CA to: /etc/nginx/ssl/ip.ca.crt
[Mon Feb 16 07:55:37 PM CST 2026] Installing key to: /etc/nginx/ssl/ip.key
[Mon Feb 16 07:55:37 PM CST 2026] Installing full chain to: /etc/nginx/ssl/ip.crt
[Mon Feb 16 07:55:37 PM CST 2026] Running reload cmd: systemctl restart nginx
[Mon Feb 16 07:55:37 PM CST 2026] Reload successful

6、配置 Nginx 443 端口的默认站点


vim /etc/nginx/conf.d/default.conf

新增


ssl_certificate /etc/nginx/ssl/ip.crt;
ssl_certificate_key /etc/nginx/ssl/ip.key;

示例


# HTTPS Server block - Handle all HTTPS requests
server {
   # Standard TLS listening
  listen 443 ssl default_server;
  listen [::]:443 ssl default_server;

   # HTTP/2 protocol support
  http2 on;
 
   # HTTP/3 QUIC protocol support
  listen 443 quic reuseport;
  listen [::]:443 quic reuseport;
  add_header Alt-Svc 'h3=":443"; ma=86400' always;
  add_header X-Protocol $server_protocol always;
 
   # Match all domain names
  server_name _;
  return 403;

   # modern configuration
  ssl_protocols TLSv1.3;
  ssl_ecdh_curve X25519:prime256v1:secp384r1;
  ssl_prefer_server_ciphers off;

  ssl_certificate /etc/nginx/ssl/ip.crt;
  ssl_certificate_key /etc/nginx/ssl/ip.key;
}

7、然后检查并重新加载 Nginx:

nginx -t
nginx -s reload
systemctl restart nginx
systemctl status nginx

# 验证证书生效
# 访问https://你的域名,浏览器地址栏显示 “安全锁” 图标,或执行命令验证:
curl -v website.ouhayo.cloudns.be  # 替换为你的域名

8、自动续签

# 查看证书详情
openssl x509 -in /etc/nginx/ssl/ip.crt -noout -text
# Not After:显示证书过期时间

# 查看定时任务
[root@rockylinux9 ~]# crontab -l | grep acme.sh
30 8 * * * "/root/.acme.sh"/acme.sh --cron --home "/root/.acme.sh" > /dev/null
# 任务执行时间:每天早上 8 点 30 分(分钟 小时 日 月 周)

9、更新SSL证书

Let’s Encrypt 的证书有效期为3个月,每3个月得重新申请证书。通过 acme.sh 可以自动管理SSL证书的申请。通过上面步骤的安装后 acme.sh 会定期自动更新SSL证书。

当然,acme.sh 也提供手动更新方式。

acme.sh --renew -d website.ouhayo.cloudns.be

10、取消SSL证书的自动续期

有时候你可能需要移除特定域名的自动申请,这时候可以使用下面的命令让 acme.sh 取消对特定域名的自动续期。当然已申请的证书仍然有效,不会失效。

acme.sh --remove -d website.ouhayo.cloudns.be

输出


[root@rockylinux9 ~]# acme.sh --remove -d website.ouhayo.cloudns.be
[Mon Feb 16 07:51:01 PM CST 2026] The domain 'website.ouhayo.cloudns.be' seems to already have an ECC cert, let's use it.
[Mon Feb 16 07:51:01 PM CST 2026] website.ouhayo.cloudns.be has been removed. The key and cert files are in /root/.acme.sh/website.ouhayo.cloudns.be_ecc
[Mon Feb 16 07:51:01 PM CST 2026] You can remove them by yourself.

2、ip

使用 acme.sh 配置 Let’s Encrypt 签发的 IP 地址 SSL 证书

参考:https://u.sb/acme-sh-ip-ssl/

参考:https://www.appinn.com/letsencrypt-issue-ip-ssl-certificates/

1、安装acme.sh

# 第一步:安装 / 升级 acme.sh
# acme.sh 是著名的自动化证书签发程序,支持 Let’s Encrypt、ZeroSSL 等不同的证书提供商。
# # 安装acme.sh(替换为你的邮箱,用于接收证书过期提醒)your-email@example.com
curl https://get.acme.sh | sh -s email=shenweiraki2@163.com
# 如果安装过,那么升级方式:acme.sh --upgrade
# 因为 IP 证书目前只能通过 http-01 和 tls-alpn-01 方式进行验证,所以你需要检查服务器的防火墙,设置允许 TCP 80 和 TCP / UDP 443 端口在公网可以访问。

# 加载环境变量,使 acme.sh 命令立即生效
source ~/.bashrc
# 验证安装是否成功
acme.sh --version
#若输出类似`acme.sh v3.0.7`的版本信息,说明安装成功。

2、配置 Nginx 80 端口的默认站点


# 停止Nginx
systemctl stop nginx

vim /etc/nginx/nginx.conf

新增

# Merge Let's Encrypt and SSL verification path configuration
location ~ ^/.well-known/(acme-challenge|pki-validation)/ {
  add_header Content-Type text/plain;
  root /home/webuser/www/letsencrypt;
}

示例


server {
   # Listen on port 80 for all IPv4 and IPv6 addresses
  listen 80 default_server;
  listen [::]:80 default_server;
 
   # Match all domain names
  server_name _;

   # Merge Let's Encrypt and SSL verification path configuration
  location ~ ^/.well-known/(acme-challenge|pki-validation)/ {
      add_header Content-Type text/plain;
      root /home/webuser/www/letsencrypt;
  }

   # Redirect all other HTTP requests to HTTPS using 301 permanent redirect
  location / {
      return 301 https://$host$request_uri;
  }
}

3、然后创建两个目录并重新加载 Nginx

mkdir -p /home/webuser/www/letsencrypt
mkdir -p /etc/nginx/ssl

nginx -t
nginx -s reload
systemctl restart nginx
systemctl status nginx

4、使用 acme.sh 签发 IP 证书

# 申请IP证书(替换为你的公网IP)
acme.sh --issue --server letsencrypt \
-d 156.224.28.84 \
-w /home/webuser/www/letsencrypt \
--certificate-profile shortlived \
--days 3 \
--standalone


# 命令具体解析如下:
acme.sh 执行 acme.sh 脚本。
--issue:申请一个新证书。
--server letsencrypt:使用 Let’s Encrypt 服务器。
-d 156.224.28.84:证书申请的目标是 IP 地址 156.224.28.84
--certificate-profile shortlived:申请一个短期证书
--days 3:证书的有效期是 3 天
--standalone:使用 standalone 模式验证,不依赖现有的 Web 服务器。(需要80/443端口)

# 注意这里我们必须使用 shortlived 这个 Profile,因为 Let's Encrypt 的 IP 证书有效期只有 6.66666 天(160 小时),同时 acme.sh 需要更短的时间来进行检查更新证书,所以可以设置 --days 3 参数,让它 3 天检查并更新一次,你也可以设置 4 或 5,但是不要设置 6,否则可能证书过期了都没更新哦。

输出日志


[root@rockylinux9 ~]# acme.sh --issue --server letsencrypt \
-d 156.224.28.84 \
-w /home/webuser/www/letsencrypt \
--certificate-profile shortlived \
--days 3 \
--standalone
[Sat Feb 14 03:58:19 PM CST 2026] Using CA: https://acme-v02.api.letsencrypt.org/directory
[Sat Feb 14 03:58:19 PM CST 2026] Creating domain key
[Sat Feb 14 03:58:19 PM CST 2026] The domain key is here: /root/.acme.sh/156.224.28.84_ecc/156.224.28.84.key
[Sat Feb 14 03:58:19 PM CST 2026] Single domain='156.224.28.84'
[Sat Feb 14 03:58:22 PM CST 2026] Getting webroot for domain='156.224.28.84'
[Sat Feb 14 03:58:23 PM CST 2026] 156.224.28.84 is already verified, skipping http-01.
[Sat Feb 14 03:58:23 PM CST 2026] Verification finished, beginning signing.
[Sat Feb 14 03:58:23 PM CST 2026] Let's finalize the order.
[Sat Feb 14 03:58:23 PM CST 2026] Le_OrderFinalize='https://acme-v02.api.letsencrypt.org/acme/finalize/3062356086/480145527016'
[Sat Feb 14 03:58:24 PM CST 2026] Downloading cert.
[Sat Feb 14 03:58:24 PM CST 2026] Le_LinkCert='https://acme-v02.api.letsencrypt.org/acme/cert/05cefbaf7923fdbecea60081b29347025019'
[Sat Feb 14 03:58:25 PM CST 2026] Cert success.
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
[Sat Feb 14 03:58:25 PM CST 2026] Your cert is in: /root/.acme.sh/156.224.28.84_ecc/156.224.28.84.cer
[Sat Feb 14 03:58:25 PM CST 2026] Your cert key is in: /root/.acme.sh/156.224.28.84_ecc/156.224.28.84.key
[Sat Feb 14 03:58:25 PM CST 2026] The intermediate CA cert is in: /root/.acme.sh/156.224.28.84_ecc/ca.cer
[Sat Feb 14 03:58:25 PM CST 2026] And the full-chain cert is in: /root/.acme.sh/156.224.28.84_ecc/fullchain.cer

5、然后我们可以把申请好的证书放在 /etc/nginx/ssl 目录:

acme.sh --install-cert -d 156.224.28.84 \
 --key-file       /etc/nginx/ssl/ip.key \
 --fullchain-file /etc/nginx/ssl/ip.crt \
 --ca-file       /etc/nginx/ssl/ip.ca.crt \
 --reloadcmd     "systemctl restart nginx"

输出日志


[root@rockylinux9 ~]# acme.sh --install-cert -d 156.224.28.84 \
 --key-file       /etc/nginx/ssl/ip.key \
 --fullchain-file /etc/nginx/ssl/ip.crt \
 --ca-file       /etc/nginx/ssl/ip.ca.crt \
 --reloadcmd     "systemctl restart nginx"
[Sat Feb 14 04:03:06 PM CST 2026] The domain '156.224.28.84' seems to already have an ECC cert, let's use it.
[Sat Feb 14 04:03:06 PM CST 2026] Installing CA to: /etc/nginx/ssl/ip.ca.crt
[Sat Feb 14 04:03:06 PM CST 2026] Installing key to: /etc/nginx/ssl/ip.key
[Sat Feb 14 04:03:06 PM CST 2026] Installing full chain to: /etc/nginx/ssl/ip.crt
[Sat Feb 14 04:03:06 PM CST 2026] Running reload cmd: systemctl restart nginx
[Sat Feb 14 04:03:07 PM CST 2026] Reload successful

6、配置 Nginx 443 端口的默认站点


vim /etc/nginx/conf.d/default.conf

新增


ssl_certificate /etc/nginx/ssl/ip.crt;
ssl_certificate_key /etc/nginx/ssl/ip.key;

示例


# HTTPS Server block - Handle all HTTPS requests
server {
   # Standard TLS listening
  listen 443 ssl default_server;
  listen [::]:443 ssl default_server;

   # HTTP/2 protocol support
  http2 on;
 
   # HTTP/3 QUIC protocol support
  listen 443 quic reuseport;
  listen [::]:443 quic reuseport;
  add_header Alt-Svc 'h3=":443"; ma=86400' always;
  add_header X-Protocol $server_protocol always;
 
   # Match all domain names
  server_name _;
  return 403;

   # modern configuration
  ssl_protocols TLSv1.3;
  ssl_ecdh_curve X25519:prime256v1:secp384r1;
  ssl_prefer_server_ciphers off;

  ssl_certificate /etc/nginx/ssl/ip.crt;
  ssl_certificate_key /etc/nginx/ssl/ip.key;
}

7、然后检查并重新加载 Nginx:


nginx -t
nginx -s reload
systemctl restart nginx
systemctl status nginx

# 验证证书生效
# 访问https://你的公网IP,浏览器地址栏显示 “安全锁” 图标,或执行命令验证:
curl -v https://156.224.28.84  # 替换为你的IP

8、自动续签


# 查看证书详情
openssl x509 -in /etc/nginx/ssl/ip.crt -noout -text
# Not After:显示证书过期时间

# 查看定时任务
[root@rockylinux9 ~]# crontab -l | grep acme.sh
30 8 * * * "/root/.acme.sh"/acme.sh --cron --home "/root/.acme.sh" > /dev/null
# 任务执行时间:每天早上 8 点 30 分(分钟 小时 日 月 周)

评论

  1. 博主
    2 小时前
    2026-2-16 21:43:36

    试一下评论

  2. 匿名xx
    已编辑
    2 小时前
    2026-2-16 21:44:45

    测试一下 ok

发送评论 编辑评论


				
|´・ω・)ノ
ヾ(≧∇≦*)ゝ
(☆ω☆)
(╯‵□′)╯︵┴─┴
 ̄﹃ ̄
(/ω\)
∠( ᐛ 」∠)_
(๑•̀ㅁ•́ฅ)
→_→
୧(๑•̀⌄•́๑)૭
٩(ˊᗜˋ*)و
(ノ°ο°)ノ
(´இ皿இ`)
⌇●﹏●⌇
(ฅ´ω`ฅ)
(╯°A°)╯︵○○○
φ( ̄∇ ̄o)
ヾ(´・ ・`。)ノ"
( ง ᵒ̌皿ᵒ̌)ง⁼³₌₃
(ó﹏ò。)
Σ(っ °Д °;)っ
( ,,´・ω・)ノ"(´っω・`。)
╮(╯▽╰)╭
o(*////▽////*)q
>﹏<
( ๑´•ω•) "(ㆆᴗㆆ)
😂
😀
😅
😊
🙂
🙃
😌
😍
😘
😜
😝
😏
😒
🙄
😳
😡
😔
😫
😱
😭
💩
👻
🙌
🖕
👍
👫
👬
👭
🌚
🌝
🙈
💊
😶
🙏
🍦
🍉
😣
Source: github.com/k4yt3x/flowerhd
颜文字
Emoji
小恐龙
花!
上一篇