Previously, if no server
was provided, or if --set-default-ca
was not run, acme.sh used letsencrypt as the default CA.
https://github.com/acmesh-official/acme.sh/wiki/Server
As of acme.sh v3.0, the default CA is now ZeroSSL.
This change will only affect the newly created(issued) certs after August-1st
(with v3.0), any pre-existing certs will still be renewed automatically against the current CA.
Q&A:
-
As an existing user, what do I need to do?
Generally, nothing needs doing. (If auto-upgrade is enabled, acme.sh can upgrade itself). No matter if acme.sh is upgraded to v3.0 or not, your existing certs will be renewed as before, against the same CA they're currently using.
-
Will I still be able to use letsencrypt then?
Yes, of course. You are still free to use any supported CA by providing
--server
parameter.acme.sh --issue -d example.com --dns dns_cf --server letsencrypt
-
What if I don't like this change, and want to stick to letsencrypt?
Yes, sure. You can
--set-default-ca
now or any time you like. Then acme.sh will always use the default CA you set:acme.sh --set-default-ca --server letsencrypt
If you set the default CA, acme.sh will respect your choice first. It will always use this default CA in the future, in
v2.*
,v3.*
or any futurev4.*
.acme.sh always respects your choice first, and will never make any changes to your files without your permissions.
-
My current cert is using letsencrypt, Will it be changed when renewed then?
No, and never. Don't worry. when your cert is renewed, it will use the current CA, not the default CA.
-
As a new user after
August-1st 2021
(v3.0), what will it look like to me?You can install acme.sh as normal, nothing has changed.
You can also issue certs as normal. See how to issue a cert:
acme.sh --issue -d example.com --dns dns_cf
The cert will be issued with the default CA, ZeroSSL.
You can also try with letsencrypt:
acme.sh --issue -d example.com --dns dns_cf --server letsencrypt
Here is a comparison of ZeroSSL to Let's Encrypt: