[GH-ISSUE #2147] Question/RFE - Generate Certificate RSA not ECC - npm - Cloudflare #1538

Open
opened 2026-02-26 07:31:28 +03:00 by kerem · 7 comments
Owner

Originally created by @redtripleAAA on GitHub (Jul 7, 2022).
Original GitHub issue: https://github.com/NginxProxyManager/nginx-proxy-manager/issues/2147

Is your feature request related to a problem? Please describe.

It's more like a question if it's possible, if not, then that would be a RFE
Is it possible to generate RSA type cert instead of ECC.

Describe the solution you'd like

It would be nice to have this feature to select RSA or ECC in npm

Describe alternatives you've considered

Currently I am using Certbot to generate the RSA cert via Let's Encrypt and it's working fine.

Originally created by @redtripleAAA on GitHub (Jul 7, 2022). Original GitHub issue: https://github.com/NginxProxyManager/nginx-proxy-manager/issues/2147 <!-- Are you in the right place? - If you are looking for support on how to get your upstream server forwarding, please consider asking the community on Reddit. - If you are writing code changes to contribute and need to ask about the internals of the software, Gitter is the best place to ask. - If you think you found a bug with NPM (not Nginx, or your upstream server or MySql) then you are in the *right place.* --> **Is your feature request related to a problem? Please describe.** <!-- A clear and concise description of what the problem is. Ex. I'm always frustrated when [...] --> It's more like a question if it's possible, if not, then that would be a RFE Is it possible to generate RSA type cert instead of ECC. **Describe the solution you'd like** <!-- A clear and concise description of what you want to happen. --> It would be nice to have this feature to select RSA or ECC in npm **Describe alternatives you've considered** <!-- A clear and concise description of any alternative solutions or features you've considered. --> Currently I am using Certbot to generate the RSA cert via Let's Encrypt and it's working fine.
Author
Owner

@shaojs321 commented on GitHub (Oct 16, 2022):

同问 群辉不支持ecc的证书

<!-- gh-comment-id:1279985314 --> @shaojs321 commented on GitHub (Oct 16, 2022): 同问 群辉不支持ecc的证书
Author
Owner

@github-actions[bot] commented on GitHub (Feb 14, 2024):

Issue is now considered stale. If you want to keep it open, please comment 👍

<!-- gh-comment-id:1942964668 --> @github-actions[bot] commented on GitHub (Feb 14, 2024): Issue is now considered stale. If you want to keep it open, please comment :+1:
Author
Owner

@redtripleAAA commented on GitHub (Feb 14, 2024):

Any update on this?

<!-- gh-comment-id:1942971501 --> @redtripleAAA commented on GitHub (Feb 14, 2024): Any update on this?
Author
Owner

@gazedreamily commented on GitHub (Aug 14, 2024):

Is there any update?

<!-- gh-comment-id:2288035063 --> @gazedreamily commented on GitHub (Aug 14, 2024): Is there any update?
Author
Owner

@github-actions[bot] commented on GitHub (Mar 30, 2025):

Issue is now considered stale. If you want to keep it open, please comment 👍

<!-- gh-comment-id:2764342944 --> @github-actions[bot] commented on GitHub (Mar 30, 2025): Issue is now considered stale. If you want to keep it open, please comment :+1:
Author
Owner

@reyo commented on GitHub (Jun 2, 2025):

Just docker override this file /etc/letsencrypt.ini copy repo one (docker/rootfs/etc/letsencrypt.ini) and change key-type to rsa, comment the elliptic-curve line and add rsa-key-size = 4096 (or what ever the size you prefer. This is mine and it works, generates RSA 4096 for all domains. It would be nice, if this would be a per cert thing, but this works as well.

text = True
non-interactive = True
webroot-path = /data/letsencrypt-acme-challenge
key-type = rsa
rsa-key-size = 4096

preferred-chain = ISRG Root X1

You can use this one. Be sure to mount is as :ro

  • /your-path-to/letsencrypt.ini:/etc/letsencrypt.ini:ro
<!-- gh-comment-id:2929874762 --> @reyo commented on GitHub (Jun 2, 2025): Just docker override this file /etc/letsencrypt.ini copy repo one (docker/rootfs/etc/letsencrypt.ini) and change key-type to rsa, comment the elliptic-curve line and add rsa-key-size = 4096 (or what ever the size you prefer. This is mine and it works, generates RSA 4096 for all domains. It would be nice, if this would be a per cert thing, but this works as well. ``` text = True non-interactive = True webroot-path = /data/letsencrypt-acme-challenge key-type = rsa rsa-key-size = 4096 preferred-chain = ISRG Root X1 ``` You can use this one. Be sure to mount is as :ro - /your-path-to/letsencrypt.ini:/etc/letsencrypt.ini:ro
Author
Owner

@github-actions[bot] commented on GitHub (Dec 29, 2025):

Issue is now considered stale. If you want to keep it open, please comment 👍

<!-- gh-comment-id:3695274384 --> @github-actions[bot] commented on GitHub (Dec 29, 2025): Issue is now considered stale. If you want to keep it open, please comment :+1:
Sign in to join this conversation.
No milestone
No project
No assignees
1 participant
Notifications
Due date
The due date is invalid or out of range. Please use the format "yyyy-mm-dd".

No due date set.

Dependencies

No dependencies set.

Reference
starred/nginx-proxy-manager-NginxProxyManager#1538
No description provided.