summaryrefslogtreecommitdiff
path: root/system/letsencrypt
diff options
context:
space:
mode:
Diffstat (limited to 'system/letsencrypt')
-rw-r--r--system/letsencrypt/README.Slackware8
1 files changed, 4 insertions, 4 deletions
diff --git a/system/letsencrypt/README.Slackware b/system/letsencrypt/README.Slackware
index 1ff60af3be..4a2e7e15fd 100644
--- a/system/letsencrypt/README.Slackware
+++ b/system/letsencrypt/README.Slackware
@@ -8,13 +8,13 @@ Since Slackware is not yet supported, instead of running "letsencrypt-auto certo
as instructed, you can run "letsencrypt certonly" to install certificates manually using standalone plugin.
Here's what i use to create a certificate using port 443 for domain validation
-certbot certonly --webroot-path=<DOCUMENT-ROOT> --standalone-supported-challenges tls-sni-01 -d <DOMAIN-NAME> \
+certbot certonly --webroot-path=<DOCUMENT-ROOT> --preferred-challenges tls-sni-01 -d <DOMAIN-NAME> \
--email <ADMIN-EMAIL> --renew-by-default --agree-tos --text --standalone
If you want to use port 80 for domain validation, replace
---standalone-supported-challenges tls-sni-01
+--preferred-challenges tls-sni-01
with
---standalone-supported-challenges http-01
+--preferred-challenges http-01
NOTE:
You need to make sure that the port (80 or 443) is NOT USED before running above command (ie. you may need to
@@ -58,7 +58,7 @@ rsa-key-size = 4096
# Uncomment to use the standalone authenticator on port 443
# authenticator = standalone
-# standalone-supported-challenges = tls-sni-01
+# preferred-challenges = tls-sni-01
# Uncomment to use the webroot authenticator. Replace webroot-path with the
# path to the public_html / webroot folder being served by your web server.