=====Info SSL Certs===== openssl x509 -noout -text -in example.crt openssl s_client -showcerts -servername example.com -connect example.com:443 2>/dev/null | openssl x509 -inform pem -noout -text =====Info SSL CSR===== openssl req -noout -text -in example.com.csr =====Validate SSL Key|Cert===== openssl x509 -noout -modulus -in example.com.key|openssl md5; openssl rsa -noout -modulus -in example.com.pem|openssl md5 =====acme.sh===== acme.sh --issue -d example.com -d www.example.com -w /var/lib/letsencrypt --server letsencrypt_test \ --key-file /etc/nginx/ssl/example.com.key \ --fullchain-file /etc/nginx/ssl/example.com.crt \ --reloadcmd "/usr/sbin/nginx -s reload" =====Request letsfncrypt wildcard certificate no-ecc (--keylength 2048) with route53 dns validation (--dns dns_aws) for nginx server.===== export AWS_ACCESS_KEY_ID="XXX" export AWS_SECRET_ACCESS_KEY="XXX" export AWS_DNS_SLOWRATE=1 ./acme.sh --issue --server letsencrypt --keylength 2048 --dns dns_aws -d example.com -d '*.example.com' --dnssleep 10 --reloadcmd "nginx -s reload" =====Several aws accounts to validate==== # .env AWS_ACCESS_KEY_ID="XXX" AWS_SECRET_ACCESS_KEY="XXX" # crontab -e 10 20 * * * . /root/.aws/example.com/.env && "/root/.acme.sh"/acme.sh --renew --home "/root/.acme.sh" -d example.com > /dev/null