No-Cost SSL in EasyWP with Let’s Encrypt

Published by Bilal Kaun on

In the year 2020, having a secure connection to your website in imperative. It shows your guests that you care about their data and privacy and an ‘https’ connection with the ever-familiar ‘lock’ icon establishes a sense of safety and trust with your guests.

SSL certificates, however, are still expensive. This is where Electronic Frontier Foundation’s Let’s Encrypt initiative comes to the rescue. By issuing free SSL certificates for everyone, their goal is to have a safer and more secure internet. If you’d like to know more about this initiative, visit

EasyWP is NameCheap’s hosted WordPress solution. So I’m assuming your domain is also from NameCheap, however, I’m sure the steps can be applied to any domain registrar.

The way Let’s Encrypt works is that a utility runs in the background on the server and verifies the server and domain with their own servers and issues as well as configure an SSL certificate on there. Yet for hosted platforms like WordPress on EasyWP, this may not be possible. Thankfully, Let’s Encrypt can be run in ‘manual mode’ where a certificate can be generated on a separate machine by performing additional manual verification steps.


You should have access to *nix based system, for myself I used an Ubuntu LTS VM inside virtual box. It’s worth mentioning that you should be able to escalate yourself to root privileges in said system.

You should also have access to EasyWp control panel for your blog as well as the domain control panel in NameCheap.

The way we intend to use certbot is to execute it in manual mode, ask it to verify our domain via a DNS TXT record challenge. This will yield the necessary private key and certificate which we will proceed to paste into EasyWP control panel.

Install certbot

The Let’s Encrypt utility is called certbot and can be installed on your Ubuntu machine via aptitude package manager.

# apt-get install certbot

If you’d like more information on certbot program usage, check out the certbot command-line documentation here.

Using certbot

Looking at the command-line options for certbot, the options relevant to us are as follows:

  • certonly : Sub-command – We want to not install the certificate in the linux vm, so instruct certbot to only generate it but not install it
  • -d <DOMAINS> : To identify out target domain (e.g.
  • –manual : Run this on our VM and not the hosting server
  • –preferred-challenges : Here we specify we want DNS challenge
  • –rsa-key-size : Size of the key (default is 2k, you may choose to go higher)
  • -m : email address you want to sign up with (used for account registration and identification)

There are some other options we should consider as well

  • –manual-public-ip-logging-ok : As part of transparency to the public, Let’s Encrypt plans to publish the IPs of the servers using the certs as well as the hosts. This flag tells certbot we’re ok with that (it’s a requirement in manual mode so make sure you understand the privacy implication and that you’re comfortable with this). More information here.
  • –agree-tos : You agree to the Terms of Services (ensure you read and understand them).
  • –no-eff-email : Do not share the email with Electronic Frontier Foundation

Generate Cert

In your linux vm, attain root or use sudo and run the following – making sure to replace in the DOMAIN variable and putting in your correct email for the -m option.

# certbot certonly --manual --preferred-challenges dns \
--agree-tos --manual-public-ip-logging-ok \
-m \ 
-d *.$DOMAIN -d $DOMAIN     

You will get a response like so

Saving debug log to /var/log/letsencrypt/letsencrypt.log
Plugins selected: Authenticator manual, Installer None
Obtaining a new certificate
Performing the following challenges:
dns-01 challenge for
dns-01 challenge for

The next bit is where the interesting part happens. certbot will attempt a DNS ownership test by asking you to add some TXT record to your domain.

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Please deploy a DNS TXT record under the name with the following value:


Before continuing, verify the record is deployed.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Press Enter to Continue

Go into your NameCheap dashboard, go into the domain and click on “Manage DNS”. On this page click on the “Add New Record” button in red and..

  • select TXT Record for type of record
  • enter in _acme-challenge for host
  • paste in the challenge value in the value field
  • select 1 minute for ttl (this will ensure shorter dns caching time span for this record).
It should look something like this

Apply your changes by clicking the green check mark. Then wait for any record propagation behind the scenes. Wait at least 2 to 3 minutes. Then return to the linux terminal and press enter for it to check the challenge.

PAY ATTENTION – It will ask your to do ANOTHER challenge. It will give you another challenge to ADD. Do not replace or change the previous challenge. Instead add another TXT record with the same host name (_acme-challenge) but put in the new challenge as the value. You should end up with TWO _acme-challenge records this time. Once again head back to the terminal and press enter to continue.

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Press Enter to Continue
Waiting for verification...
Cleaning up challenges

 - Congratulations! Your certificate and chain have been saved at:
   Your key file has been saved at:

Take note of the two paths; fullchain.pem and privkey.pem. These are your certificate and private key, respectively. The remaining portion is straightforward. You simply have to add the certificate to EasyWP.

Login to your EasyWP dashboard:
Then click on your domain to enter the domain overview. Under the “Website” heading click on “Manage” next to the SSL Certificate item.

Should look something like this

In the resulting page click “Add” and then select “Custom SSL Certificate”. In the private key section you can either paste the entire contents of privkey.pem or upload it. Similarly, for SSL Certificate section, paste the entire contents of, or upload, the fullchain.pem file. The form is auto-saved and soon as both fields are populated it will start blinking. After a couple of blinks it will tell you operation succeeded. At this point your EasyWP is SSL secured.

Some caveat to keep in mind is that Let’s Encrypt issues certificates only for 90 days. Normally this is fine as certbot automatically renews and reinstalls on the servers. However in this case the entire process will have to be repeated every 90 days to ensure certificates remain valid. An invalid certificate can adversely affect your SEO ratings and lose trust with guests.


Leave a Reply

Your email address will not be published. Required fields are marked *