0007.html 4.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106
  1. <!DOCTYPE html>
  2. <html lang="en" xmlns="http://www.w3.org/1999/xhtml">
  3. <head>
  4. <title>Creating and Applying SSL Certificate to Apache HTTPD</title>
  5. <meta http-equiv="Content-Type" content="text/html; charset=utf-8">
  6. <meta charset="UTF-8">
  7. <meta name="keywords" content="PKI,Public Key Infrastructure,XCA,SSL,Web Server,Certificates,Certificate Authority,Self-Signed,Tutorial,Apache HTTPD">
  8. <meta name="author" content="i12bretro">
  9. <meta name="description" content="Creating and Applying SSL Certificate to Apache HTTPD">
  10. <meta name="viewport" content="width=device-width, initial-scale=1.0">
  11. <script type="text/javascript" src="https://code.jquery.com/jquery-3.5.1.min.js"></script>
  12. <script type="text/javascript" src="includes/js/steps.js"></script>
  13. <link href="css/steps.css" rel="stylesheet" type="text/css" />
  14. </head>
  15. <body>
  16. <div id="gridContainer">
  17. <div class="topMargin"></div>
  18. <div id="listName" class="topMargin">
  19. <h1>Creating and Applying SSL Certificate to Apache HTTPD</h1>
  20. </div>
  21. <div></div>
  22. <div id="content">
  23. <p>This is part four of a series of creating your own self-signed PKI and some ways to utilize the PKI to setup SSL for your web server or create your own OpenVPN server.</p>
  24. <p>Disclaimer: I am not a security expert. This is just the easiest way I have found to create and utilize SSL for my homelab services.</p>
  25. <h2>Create Your SSL Certificate</h2>
  26. <ol>
  27. <li>Launch XCA</li>
  28. <li>Open the PKI database if it is not already (File &gt; Open DataBase), enter password</li>
  29. <li>Click on the Certificates tab, right click on your Intermediate CA certificate</li>
  30. <li>Select New</li>
  31. <li>On the Source tab, make sure Use this Certificate for signing is selected</li>
  32. <li>Verify your Intermediate CA certificate is selected from the drop down</li>
  33. <li>Click the Subject tab</li>
  34. <li>Complete the Distinguished Name section
  35. <p>internalName: WebDev SSL<br />
  36. countryName: US<br />
  37. stateOrProvinceName: Virginia<br />
  38. localityName: Northern<br />
  39. organizationName: i12bretro<br />
  40. organizationUnitName: i12bretro Certificate Authority<br />
  41. commonName: webdev.i12bretro.local</p>
  42. </li>
  43. <li>Click the Generate a New Key button</li>
  44. <li>Enter a name and set the key size to at least 2048</li>
  45. <li>Click Create</li>
  46. <li>Click on the Extensions tab</li>
  47. <li>Select End Entity from the type list</li>
  48. <li>Click Edit next to Subject Alternative Name</li>
  49. <li>Add any DNS or IP addresses that the certificate will identify</li>
  50. <li>Update the validity dates to fit your needs</li>
  51. <li>Click the Key Usage tab</li>
  52. <li>Under Key Usage select Digital Signature, Key Enchiperment</li>
  53. <li>Under Extended Key Usage select Web Server and Web Client Authentication</li>
  54. <li>Click the Netscape tab</li>
  55. <li>Select SSL Server</li>
  56. <li>Click OK to create the certificate</li>
  57. </ol>
  58. <h2>Exporting Required Files</h2>
  59. <ol>
  60. <li>In XCA, click on the Certificates tab</li>
  61. <li>Right click the Intermediate CA certificate &gt; Export &gt; File</li>
  62. <li>Set the file name with a .crt extension and verify the export format is PEM chain (*.pem)</li>
  63. <li>Click OK</li>
  64. <li>Right click the SSL certificate &gt; Export &gt; File</li>
  65. <li>Set the file name with a .crt extension and verify the export format is PEM (*.crt)</li>
  66. <li>Click OK</li>
  67. <li>Click the Private Keys tab</li>
  68. <li>Right click the private key generated for the SSL certificate &gt; Export &gt; File</li>
  69. <li>Set the file name with a .key extension and verify the export format is PEM private (*.pem)</li>
  70. <li>Click OK</li>
  71. </ol>
  72. <h2>Setting Up Apache For SSL</h2>
  73. <ol>
  74. <li>Navigate to <apacheinstalldir>/conf</apacheinstalldir></li>
  75. <li>Create a certs directory if it does not exist</li>
  76. <li>Copy the exported SSL certificate, private key and certificate chain files to <apacheinstalldir>/conf/certs</apacheinstalldir></li>
  77. <li>Edit <apacheinstalldir>/conf/httpd.conf</apacheinstalldir></li>
  78. <li>At the bottom of the file add a VirtualHost block
  79. <p>Listen 443<br />
  80. &lt;virtualhost :443&gt;<br />
  81. SSLEngine on<br />
  82. SSLProtocol -All +TLSv1.2 +TLSv1.3<br />
  83. SSLCipherSuite HIGH:!aNULL:!MD5<br />
  84. SSLCertificateFile /conf/certs/%ssl.crt file%<br />
  85. SSLCertificateKeyFile /conf/certs/%ssl.key file%<br />
  86. SSLCertificateChainFile /conf/certs/%ssl-chain.crt file%<br />
  87. &lt;/virtualhost&gt;</p>
  88. </li>
  89. <li>Restart the Apache Service</li>
  90. <li>Open a web browser</li>
  91. <li>Navigate to https://DNSorIP from your certificate</li>
  92. <li>Click the lock and select view certificate</li>
  93. <li>Validate the certificate and certificate chain being presented by Apache HTTPD</li>
  94. </ol>
  95. </div>
  96. </div>
  97. </body>
  98. </html>