• Are certificates from Let’s Encrypt trusted by my browser?

    For most browsers and operating systems, yes. See the compatibility list for more detail.

  • Will Certbot issue certificates for anything other than SSL/TLS for websites?

    Certbot will fetch Let’s Encrypt certificates that will be standard Domain Validation certificates, so you can use them for any server that uses a domain name, like web servers. You can also use these certificates for other TLS applications such as IMAPS.

  • Can I use certificates from Certbot for code signing or email encryption?

    No. Email encryption and code signing require a different type of certificate than the Let’s Encrypt CA is issuing.

  • Will Certbot generate or store the private keys for my certificates on Let’s Encrypt’s servers?

    No. Never.

    The private key is always generated and managed on your own servers, not by the Let’s Encrypt certificate authority.

  • Will Certbot issue Extended Validation (EV) certificates?

    Certbot and Let’s Encrypt have no plans to issue EV certificates at this time.

  • Can I get a certificate for multiple domain names (SAN certificates)?

    Yes, the same certificate can apply to several different names using the Subject Alternative Name (SAN) mechanism. Certbot automatically requests certificates for multiple names when requested to do so. The resulting certificates will be accepted by browsers for any of the domain names listed in them.

  • Does Let's Encrypt issue wildcard certificates?

    Yes! Let’s Encrypt has begun issuing wildcard certificates in March 2018. Certbot has added support for wildcard certificates as of version 0.22.0. Obtaining a wildcard certificate requires using the DNS authentication method, either via --manual or via a Certbot DNS plugin appropriate to your DNS provider.

    Note that depending how you install Certbot, appropriate plugins to automate the process may not yet be available on your system. Information about the DNS plugins is available in the Certbot documentation.

    Certificates obtained with --manual cannot be renewed automatically with certbot renew (unless you’ve provided a custom authorization script). However, certificates obtained with a Certbot DNS plugin can be renewed automatically. In order to obtain wildcard certificates that can be renewed without human intervention, you’ll need to use a Certbot DNS plugin that’s compatible with an API supported by your DNS provider, or a script that can make appropriate DNS record changes upon demand. Even if your regular DNS provider doesn’t support a compatible update mechanism, you can use a CNAME delegation for the _acme-challenge record in your DNS zone to a different provider that does. You can also point _acme-challenge to an acme-dns instance.

    Note that depending how you install Certbot, appropriate plugins to automate the process may not yet be available on your system.

    Please see Certbot documentation for more information about your situation.

  • Does Certbot support my operating system?

    We currently have Certbot support for major Linux and BSD variant operating systems. There are a large number of other client implementations available too.

  • Will Certbot support automated configuration of my web server?

    This website provides information about the level of support for various web servers and operating systems, which varies and is increasing over time. On supported systems, the automated configuration makes it fast and easy to obtain, install, and automatically renew certificates.

    If automated configuration is not supported for your web server, you can still get a certificate using Certbot and configure your server software manually. In this case, the certificate will not be renewed automatically.

    Note that automated configuration is not required. It can be disabled if you prefer to configure your server software yourself.

  • Does Certbot require root/administrator privileges?

    Whether root is required to run Certbot or not depends on how you intend to use it.

    If you’re asking this question because you have a hosting provider that doesn’t grant you root access, you’ll need to ensure first of all that you have a way to install a certificate if you get one. If the answer is “no”, ask your hosting provider to support Let’s Encrypt (many already do). If the answer is “yes”, or you’re asking the question for security reasons, read on…

    The webroot and manual plugins work well without root privileges. However, you need to provide writable paths for Certbot’s working directories either by ensuring that /etc/letsencrypt/, /var/log/letsencrypt/, /var/lib/letsencrypt/ are writable, or by picking different directories with the --config-dir, --logs-dir, and --work-dir flags.

    The standalone plugin requires root to bind port 80 or 443, although on Linux you could also grant CAP_NET_BIND_SERVICE to the relevant user.

    Certbot’s Apache and Nginx plugins normally require root both for making temporary and persistent changes to webserver configurations, and to perform graceful reload events for those servers.

    The certbot-auto script works on the assumption that root privileges will be used, both in order to install OS dependencies where required and because it needs to support all of the plugins mentioned above. The packaged versions of Certbot are more flexible, and some of the teams building these packages are working toward having Cerbot run with group rather than root privileges where possible.

  • Can I use an existing private key or Certificate Signing Request (CSR) with Certbot?

    Yes. You can obtain a certificate for an existing CSR, which means you may generate your own CSR using your own private key. However, Certbot will not accept a private key as input and generate a CSR for you.

  • What are the current rate limits?
  • Can I issue a certificate without bringing down my web server?

    Yes, the ACME protocol is designed to perform server validation without any downtime. You can use the webroot mode in the Certbot client, which places a validation file at a specific location on your web server, or the Apache mode, which configures a temporary self-signed certificate for validation and gracefully reloads Apache.

  • What IP addresses will the Let's Encrypt servers use to validate my web server?

    The Let’s Encrypt CA doesn’t publish a list of IP addresses it uses to validate, because they may change at any time. In the future, it may validate from multiple IP addresses at once.

  • Can I issue a certificate if my webserver doesn't listen on port 80?

    Yes, using the DNS-01 or TLS-ALPN-01 challenge. However, Certbot does not include support for TLS-ALPN-01 yet. If you’re using any Certbot with any method other than DNS authentication, your web server must listen on port 80, or at least be capable of doing so temporarily during certificate validation.

    If you have an ISP or firewall that blocks port 80 and you can’t get it unblocked, you’ll need to use DNS authentication or a different Let’s Encrypt client.

  • What tools can I use for debugging my site’s HTTPS configuration?

    There are four scanning tools that are commonly suggested on the Let’s Encrypt community forum:

    They all have their strengths. Let’s Debug would be used only by people who don’t have HTTPS working yet, while SSL Labs would be used only by people who (at least sort of) do.

    Let’s Debug: Let’s Debug is most helpful if you have a failed challenge and want a straightforward explanation of why the challenge is failing.

    Check-Your-Website: Jürgen’s scanner is most helpful if you have a confusing DNS or HTTP configuration error where some pages or some browsers work properly and others don’t, or if your HTTP site works in a browser and yet you get failed challenges that you don’t understand

    Why No Padlock: Why No Padlock is most helpful if you already have a certificate but all or some users don’t see a valid HTTPS connection (and it gives very specific information about what’s causing mixed content warnings)

    SSL Labs: SSL Labs is most helpful for cryptographic issues on an already set up HTTPS site, such as a case where some browsers work properly and others give a ciphersuite-related error, or if you want to convince nerds and/or regulatory bodies that you’re following security best practices

  • What's Certbot's privacy policy?

    The Certbot privacy policy can be found here.

  • What are the licenses for Certbot and this website?

    The Certbot software and documentation are licensed under the Apache 2.0 license as described here. Otherwise, this website is generally licensed under EFF’s CC-BY license, except this FAQ page, which is a derivative of the Let’s Encrypt FAQ (which was licensed under Let’s Encrypt’s CC-BY-NC).