業務用エアコン関連の技術情報、エラーコード、環境問題対策に関する別サイト「エアコンの安全な修理・適切なフロン回収」

OpenSUSE16.0 : Obtain SSL Certificate (Let's Encrypt) 、Web / MAIL Server SSL

1.Obtain an SSL Certificate (Let's Encrypt)

1.1 Preparation

①Enable mod_ssl
If mod_ssl is not enabled, enable it.

Installing the Snappy Package Management System
Since the Let's Encrypt SSL certificate issuance tool "certbot" has recommended installation via "snap" since 2021, we will first install Snapd.

Add the snap repository for openSUSE 16

After adding the repository, import its GPG key.

Upgrade the package cache to include the new Snappy repository:

Install snapd

Restart the system and add /snap/bin to the PATH.

Enable and start the snapd.apparmor service.

Enable and start snapd

Check the version of snapd and the snap command-line tool

1.2 Certbot installation
1.3 Certificate Acquisition

# First-time users must register an email address and agree to the terms of use.
# Specify a valid email address

Saving debug log to /var/log/letsencrypt/letsencrypt.log
Enter email address (used for urgent renewal and security notices)
(Enter 'c' to cancel): [mail address]


Please read the Terms of Service at
https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf. You must agree in
order to register with the ACME server. Do you agree?


(Y)es/(N)o: y


Would you be willing, once your first certificate is successfully issued, to
share your email address with the Electronic Frontier Foundation, a founding
partner of the Let's Encrypt project and the non-profit organization that
develops Certbot? We'd like to send you email about our work encrypting the web,
EFF news, campaigns, and ways to support digital freedom.


(Y)es/(N)o: y
Account registered.
Requesting a certificate for [FQDN]

Successfully received certificate.
Certificate is saved at: /etc/letsencrypt/live/[FQDN]/fullchain.pem
Key is saved at: /etc/letsencrypt/live/[FQDN]/privkey.pem
This certificate expires on 2026-01-06.
These files will be updated when the certificate renews.

NEXT STEPS:

  • The certificate will need to be renewed before it expires. Certbot can automatically renew the certificate in the background, but you may need to take steps to enable that functionality. See https://certbot.org/renewal-setup for instructions.
    We were unable to subscribe you the EFF mailing list because your e-mail address appears to be invalid. You can try again later by visiting https://act.eff.org.

If you like Certbot, please consider supporting our work by:

  • Donating to ISRG / Let's Encrypt: https://letsencrypt.org/donate
  • Donating to EFF: https://eff.org/donate-le

If "Successfully received certificate." is displayed, it was successful.
# As stated in the message, the following certificates have been obtained under [/etc/letsencrypt/live/[FQDN]/]

# cert.pem ⇒ SSL server certificate (including public key)
# chain.pem ⇒ Interim Certificate
# fullchain.pem ⇒ A file combining cert.pem and chain.pem
# privkey.pem ⇒ Private key corresponding to the public key

2. Web Server SSL Implementation

2.1 SSL Configuration
2.2 Redirect HTTP traffic to HTTPS

To redirect all HTTP traffic to HTTPS, add the following to virtual_host.conf:

If Firewalld is enabled, you must allow HTTPS services. HTTPS uses port 443/TCP.

3. Configuring SSL/TLS (Let's Encrypt) on the Mail Server

3.1 Obtaining a Certificate for the Mail Server

Obtaining a certificate for the mail server fails even when using the "--standalone" option as shown below, since it cannot be obtained using the same method as above.

After stopping the web server once, it succeeds as follows:

Saving debug log to /var/log/letsencrypt/letsencrypt.log
Requesting a certificate for mail.[Domain]

Successfully received certificate.
Certificate is saved at: /etc/letsencrypt/live/mail.[Domain]/fullchain.pem
Key is saved at: /etc/letsencrypt/live/mail.[Domain]/privkey.pem
This certificate expires on 2026-01-06.
These files will be updated when the certificate renews.
Certbot has set up a scheduled task to automatically renew this certificate in the background.
----------------------------------------------------------------------------------------------------------
If you like Certbot, please consider supporting our work by:
Donating to ISRG / Let's Encrypt: https://letsencrypt.org/donate
Donating to EFF: https://eff.org/donate-le
----------------------------------------------------------------------------------------------------------

Restart Apache

3.2 Postfix Configuration

3.3 Dovecot Configuration

Allow port 587 through the firewall

Restart

3.4 Thunderbird Settings

Incoming mail server
Port  :  143
Connection security   :  STARTTLS
Authentication method  :  Normal password

Outgoing mail server
Port   :  587
Connection security   :  STARTTLS
Authentication method  :  Normal password

Copied title and URL