How Free HTTPS Services Work
How Let's Encrypt, Cloudflare, and ACM provide free certificates
Since Let's Encrypt launched in 2015, HTTPS has become essentially free. This article explains how various free HTTPS services work, including automatic issuance via the ACME protocol, Cloudflare's Edge SSL termination, AWS ACM's managed certificates, and the CA trust chain architecture.
Architecture Diagram
| Let's Encrypt | Cloudflare | AWS ACM | |
|---|---|---|---|
| Price | Free | Free (proxy required) | Free (with AWS services) |
| Validity | 90 days | Auto-managed | Auto-renew (13 months) |
| Wildcard | Supported (DNS-01 required) | Supported | Supported |
| Auto-Renewal | certbot cron setup | Fully automatic | Fully automatic |
| Installation | Own server | Cloudflare Edge | ALB / CloudFront |
How It Works
ACME client (certbot) registers account and orders domain certificate from CA server
CA issues a challenge for domain ownership verification (HTTP-01 or DNS-01)
Client fulfills the challenge (places token file on web server or adds DNS TXT record)
CA verifies and issues DV certificate (Root CA โ Intermediate CA โ End-entity chain)
Install certificate on web server โ TLS handshake establishes encrypted communication on client connection
Pros
- ✓ Completely free: Let's Encrypt, Cloudflare, ACM all provide DV certificates for free
- ✓ Automation: fully automated issuance/renewal via ACME protocol
- ✓ SEO benefit: Google uses HTTPS as a ranking signal
- ✓ Enhanced security: prevents MITM attacks, encrypts data
Cons
- ✗ DV certificate limitations: only verifies domain ownership, not organization identity
- ✗ Let's Encrypt 90-day validity: risk of service disruption if auto-renewal fails
- ✗ Cloudflare dependency: Shared SSL means Cloudflare outage = site outage
- ✗ ACM restrictions: only usable with AWS services (ALB, CloudFront), cannot install directly on EC2