Please refer to the following steps on how to generate Let’s Encrypt Free Wildcard Certificate in ubuntu 16.04
Install Certbot
sudo add-apt-repository ppa:certbot/certbot
sudo apt update
sudo apt install certbot
Generate SSL Certificate with TXT records verification
sudo certbot certonly --manual -d *.aventistech.info -d aventistech.info --agree-tos --no-bootstrap --manual-public-ip-logging-ok --preferred-challenges dns-01 --server https://acme-v02.api.letsencrypt.org/directory
-d *.aventistech.info = your wildcard domain
Need to include the based domain (aventistech.info), else it will show untrusted when accessing via https://aventistech.info
Saving debug log to /var/log/letsencrypt/letsencrypt.log
Plugins selected: Authenticator manual, Installer None
Enter email address (used for urgent renewal and security notices) (Enter 'c' to
cancel): [email protected]
Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org
-------------------------------------------------------------------------------
Would you be willing to share your email address with the Electronic Frontier
Foundation, a founding partner of the Let's Encrypt project and the non-profit
organization that develops Certbot? We'd like to send you email about EFF and
our work to encrypt the web, protect its users and defend digital rights.
-------------------------------------------------------------------------------
(Y)es/(N)o: n
Obtaining a new certificate
Performing the following challenges:
dns-01 challenge for aventistech.info
-------------------------------------------------------------------------------
Please deploy a DNS TXT record under the name
_acme-challenge.aventistech.info with the following value:
J4Mh4rLtpKN1_UAdU6wUDiZJkEy_zqzjUzHHWIdn9Jc
Before continuing, verify the record is deployed.
-------------------------------------------------------------------------------
Press Enter to Continue
Enter the following TXT records in public DNS Server
_acme-challenge.aventistech.info with the following value:
J4Mh4rLtpKN1_UAdU6wUDiZJkEy_zqzjUzHHWIdn9Jc
Waiting for verification...
Cleaning up challenges
IMPORTANT NOTES:
- Congratulations! Your certificate and chain have been saved at:
/etc/letsencrypt/live/aventistech.info/fullchain.pem
Your key file has been saved at:
/etc/letsencrypt/live/aventistech.info/privkey.pem
Your cert will expire on 2018-08-29. To obtain a new or tweaked
version of this certificate in the future, simply run certbot
again. To non-interactively renew *all* of your certificates, run
"certbot renew"
- Your account credentials have been saved in your Certbot
configuration directory at /etc/letsencrypt. You should make a
secure backup of this folder now. This configuration directory will
also contain certificates and private keys obtained by Certbot so
making regular backups of this folder is ideal.
- If you like Certbot, please consider supporting our work by:
Donating to ISRG / Let's Encrypt: https://letsencrypt.org/donate
Donating to EFF: https://eff.org/donate-le
Copy all .pem to Windows 10 with Mobaxterm installed
kwyong@mylab:~$ su -
Password:
root@mylab:~# cd /etc/letsencrypt/live/aventistech.info/
root@mylab:/etc/letsencrypt/live/aventistech.info# ls
cert.pem chain.pem fullchain.pem privkey.pem README
You have to install openssl plugin in Mobaxterm to continue the steps below
Export to cer & key files in Mobaxterm
openssl x509 -outform der -in cert.pem -out cert.cer
openssl rsa -outform der -in privkey.pem -out privkey.key
Export to PFX File in Mobaxterm
openssl pkcs12 -export -out cert.pfx -inkey privkey.pem -in cert.pem -certfile chain.pem
Enter Export Password:
Verifying - Enter Export Password:
Import the PFX file to Windows 2012R2 Server