Free SSL powered by Let's Encrypt
We use ACMEv2 and the official Let's Encrypt CA to give you unlimited 90-day certificates.
Simply paste your CSR and verify domain ownership.
Certificates are free, forever.
We will never ask you for your private key.
A CSR (Certificate Signing Request) contains the public key and identifying information about the site. You generate a private key locally and create a CSR that you send to the CA as part of the issuance process.
Use a trusted, open source website like csrgenerator.com to generate your CSR and private key.
openssl genpkey -algorithm RSA -out private.key -pkeyopt rsa_keygen_bits:2048 openssl req -new -key private.key -out request.csr -subj "/CN=example.com/O=My Org/C=US"
$privkey = openssl_pkey_new(['private_key_bits'=>2048,'private_key_type'=>OPENSSL_KEYTYPE_RSA]); openssl_pkey_export($privkey, $privkeyPem); $dn = [ "commonName" => "example.com", "organizationName" => "My Org", "countryName" => "US" ]; $csrRes = openssl_csr_new($dn, $csrRes, ['digest_alg'=>'sha256']); openssl_csr_export($csrRes, $csrPem); // store $privkeyPem securely and send $csrPem to the CA
Many sites advertise 'free certs' then gate or limit renewals, or require signup that funnels you into paid plans. getfreessl.org aims to keep SSL free, forever.
No. Private keys should be generated and stored by you. Our UI supports uploading a CSR so the private key never leaves your environment.
Yes — we use DNS-01 validation, which supports wildcard certificates.
You must complete the domain validation within 1 hour of requesting a certificate. After that, your authorization and certificate access expire and you will need to start again.
Certificates are valid for 90 days from the date of issuance. This is a Let’s Encrypt policy and cannot be changed. You should renew before they expire by returning here and requesting a new certificate.
No. You do not need to register or log in. Just provide your CSR, validate your domain, and download your certificate.
All certificates are publicly logged in Certificate Transparency (CT) logs, so abuse can be detected. If a certificate is used for phishing, malware, or other illegal activity, we reserve the right to block or limit access to the service.