is a simple, powerful and easy to use ACME protocol client written purely in Shell (Unix shell) language, compatible with bash, dash, and sh shells. It helps manage installation, renewal, revocation of SSL certificates. It supports ACME version 1 and ACME version 2 protocols, as well as ACME v2 wildcard certificates. Being a zero dependencies ACME client makes it even better. You don't need to download and install the whole internet to make it running. The tool does not require root or sudo access, but it's recommended to use root. supports the following validation methods that you can use to confirm domain ownership:

  • Webroot mode
  • Standalone mode
  • Standalone tls-alpn mode
  • Apache mode
  • Nginx mode
  • DNS mode
  • DNS alias mode
  • Stateless mode

What is Let's Encrypt

Let’s Encrypt (LE) is a certificate authority (CA) and project that offers free and automated SSL/TLS certificates, with the goal of encrypting the entire web. If you own a domain name and have shell access to your server you can utilize Let's Encrypt to obtain a trusted certificate at no cost. Let's Encrypt can issue SAN certs for up to 100 hostnames and wildcard certificates. All certs are valid for the period of 90 days. usage and basic commands

In this section, I will show some of the most common commands and options. installation

You have a few options to install

Install from web via curl or wget:

curl | sh
source ~/.bashrc


wget -O - | sh
source ~/.bashrc

Install from GitHub:



wget -O - | INSTALLONLINE=1 sh

Git clone and install:

git clone
cd ./
./ --install
source ~/.bashrc

The installer will perform 3 actions:

  1. Create and copy to your home dir ($HOME): ~/ All certs will be placed in this folder too.
  2. Create alias for:
  3. Create daily cron job to check and renew the certs if needed.

Advanced installation:

git clone
./ --install \
--home ~/myacme \
--config-home ~/myacme/data \
--cert-home ~/mycerts \
--accountemail "" \
--accountkey ~/myaccount.key \
--accountconf ~/myaccount.conf \
--useragent "this is my client."

You don't need to set all options, just set those ones you care about.

Options explained:

  • --home is a customized directory to install in. By default, it installs into ~/
  • --config-home is a writable folder, will write all the files(including cert/keys, configs) there. By default, it's in --home.
  • --cert-home is a customized dir to save the certs you issue. By default, it's saved in --config-home.
  • --accountemail is the email used to register account to Let's Encrypt, you will receive renewal notice email here. Default is empty.
  • --accountkey is the file saving your account private key. By default it's saved in --config-home.
  • --useragent is the user-agent header value used to send to Let's Encrypt.

After installation is complete, you can verify it by checking version: --version
# v2.8.1

The program has a lot of commands and parameters that can be used. To get help you can run: --help

Issue an SSL cert

If you already have a web server running, you should use webroot mode. You will need write access to the web root folder. Here are some example commands that can be used to obtain cert via webroot mode:

Single domain + Webroot mode: --issue -d --webroot /var/www/

Multiple domains in the same cert + Webroot mode: --issue -d -d -d --webroot /var/www/

Single domain ECC/ECDSA cert + Webroot mode: --issue -d --webroot /var/www/ --keylength ec-256

Multiple domains in the same ECC/ECDSA cert + Webroot mode: --issue -d -d -d --webroot /var/www/ --keylength ec-256

Valid values for --keylength are: 2048 (default), 3072, 4096, 8192 or ec-256, ec-384.

If you don't have a web server, maybe you are on a SMTP or FTP server, the 80 port is free, then you can use standalone mode. If you want to use this mode, you'll need to install socat tools first.

Single domain + Standalone mode: --issue -d --standalone

Multiple domains in the same cert + Standalone mode: --issue -d -d -d --standalone

If you don't have a web server, maybe you are on a SMTP or FTP server, the 443 port is free. You can use standalone TLS ALPN mode. has a builtin standalone TLS web server, it can listen at 443 port to issue the cert.

Single domain + Standalone TLS ALPN mode: --issue -d --alpn

Multiple domains in the same cert + Standalone TLS ALPN mode: --issue -d -d --alpn

Automatic DNS API integration

If your DNS provider has an API, can use the API to automatically add the DNS TXT record for you. Your cert will be automatically issued and renewed. No manually work is required. Before requesting the certs configure your API keys and Email. Currently has automatic DNS integration with around 60 DNS providers natively and can utilize Lexicon tool for those that are not supported natively.

Single domain + CloudFlare DNS API mode:

export CF_Key="sdfsdfsdfljlbjkljlkjsdfoiwje"
export CF_Email="" --issue -d --dns dns_cf

Wildcard cert + CloudFlare DNS API mode:

export CF_Key="sdfsdfsdfljlbjkljlkjsdfoiwje"
export CF_Email="" --issue -d -d '*' --dns dns_cf

If your DNS provider doesn't support any API access, you can add the TXT record manually. --issue --dns -d -d -d

You should get an output like below:

Add the following txt record:
Txt value:9ihDbjYfTExAYeDs4DBUeuTo18KBzwvTEjUnSwd32-c

Add the following txt record:
Txt value:9ihDbjxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx

Please add those txt records to the domains. Waiting for the dns to take effect.

Then just rerun with renew argument: --renew -d

Keep in mind that this is DNS manual mode and you can't auto renew your certs. You will have to add a new TXT record to your domain by your hand when it's time to renew certs. So use DNS API mode instead, because it can be automated.

Install Let's encrypt SSL cert

After cert(s) are generated, you probably want to install/copy issued certificate(s) to the correct location on the disk. You must use this command to copy the certs to the target files, don't use the certs files in ~/ folder, they are for internal use only, the folder structure may change in the future. Before installation, create a sensible directory to store your certificates. That can be /etc/letsencrypt/etc/nginx/ssl or /etc/apache2/ssl for example, depending on your web server software and your own preferences to store SSL related stuff.

Apache example: --install-cert \
--domain \
--cert-file /path/to/cert/cert.pem \
--key-file /path/to/keyfile/key.pem \
--fullchain-file /path/to/fullchain/fullchain.pem \
--reloadcmd "sudo systemctl reload apache2.service"

Nginx example: --install-cert \
--domain \
--cert-file /path/to/cert/cert.pem \
--key-file /path/to/keyfile/key.pem \
--fullchain-file /path/to/fullchain/fullchain.pem \
--reloadcmd "sudo systemctl reload nginx.service"

The parameters are stored in the configuration file, so you need to get it right for your system as this file is read when the cron job runs renewal. "reloadcmd" is dependent on your operating system and init system. 

Renew the Let's Encrypt SSL certs

You don't need to renew the certs manually. All the certs will be renewed automatically every 60 days.

However, you can also force to renew a cert: --renew -d --force

or, for ECC cert: --renew -d --force --ecc

How to upgrade

You can update to the latest code with: --upgrade

You can also enable auto upgrade: --upgrade --auto-upgrade

Then will be kept up to date automatically.

That's it. If you get stuck on anything visit wiki page at

Was this answer helpful? 0 Users Found This Useful (0 Votes)