HTTPS Setup for masspirates.org: Difference between revisions
(2 intermediate revisions by the same user not shown) | |||
Line 80: | Line 80: | ||
0 sunny:~$ openssl x509 -fingerprint -noout -in masspirates.org.crt | 0 sunny:~$ openssl x509 -fingerprint -noout -in masspirates.org.crt | ||
SHA1 Fingerprint= | SHA1 Fingerprint=D5:3F:E6:C6:0B:CC:1B:81:A4:C5:1C:80:14:29:61:45:FF:C3:59:A5 | ||
Via MFPL control panel, add an https web configuration. The https | Via MFPL control panel, add an https web configuration. The https | ||
Line 90: | Line 90: | ||
SSLCertificateKeyFile /PATH/TO/masspirates.org/include/cert/masspirates.org.key | SSLCertificateKeyFile /PATH/TO/masspirates.org/include/cert/masspirates.org.key | ||
For mediawiki to work, you'll need to change $ | For mediawiki to work properly, you'll need to change <tt>$wgServer</tt>. | ||
-$wgServer = "<nowiki>http://masspirates.org</nowiki>"; | -$wgServer = "<nowiki>http://masspirates.org</nowiki>"; | ||
Line 98: | Line 98: | ||
refuse to fetch both http and https urls from the same hostname. The | refuse to fetch both http and https urls from the same hostname. The | ||
protocol neutral server avoids this. | protocol neutral server avoids this. | ||
== Wordpress Issues == | == Wordpress Issues == |
Latest revision as of 20:43, 13 April 2014
General Procedure
masspirates.org has a self-signed X509 certificate. Since our cert wasn't issued by one of the well-known members of the certificate cartel, browsers will give a warning about "not being able to identify the site's identity". People accessing our site will have to make the decision to trust us (as opposed to having their web browser make that decision for them).
MFPL supports subject alternative names, so we were able to set up HTTPs without getting a dedicated IP address. However, one has to tweak openssl's configuration, in order to generate a certificate with the x509v3 subjectAltName extension.
Here's what to change in openssl.cnf (or, a local copy of openssl.cnf)
sunny:~$ diff -u /etc/ssl/openssl.cnf .openssl.cnf --- /etc/ssl/openssl.cnf 2013-12-18 08:37:55.000000000 -0500 +++ .openssl.cnf 2014-02-27 20:28:27.728143498 -0500 @@ -63,7 +63,7 @@ cert_opt = ca_default # Certificate field options # Extension copying option: use with caution. -# copy_extensions = copy +copy_extensions = copy # Extensions to add to a CRL. Note: Netscape communicator chokes on V2 CRLs # so this is commented out by default to leave a V1 CRL. @@ -122,7 +122,7 @@ # WARNING: ancient versions of Netscape crash on BMPStrings or UTF8Strings. string_mask = utf8only -# req_extensions = v3_req # The extensions to add to a certificate request +req_extensions = v3_req # The extensions to add to a certificate request [ req_distinguished_name ] countryName = Country Name (2 letter code) @@ -220,6 +220,7 @@ basicConstraints = CA:FALSE keyUsage = nonRepudiation, digitalSignature, keyEncipherment +subjectAltName = DNS:masspirates.org [ v3_ca ] @@ -233,11 +234,16 @@ authorityKeyIdentifier=keyid:always,issuer +basicConstraints = CA:false +keyUsage = nonRepudiation, digitalSignature, keyEncipherment +subjectAltName = DNS:masspirates.org + + # This is what PKIX recommends but some broken software chokes on critical # extensions. #basicConstraints = critical,CA:true # So we do this instead. -basicConstraints = CA:true +# basicConstraints = CA:true # Key usage: this is typical for a CA certificate. However since it will # prevent it being used as an test self-signed certificate it is best
The key points are req_extensions = v3_req, and the lines added to v3_ca. (I added the same three lines to v3_req, but for self signing, only v3_ca seems to matter.)
Next, generate the certificate
openssl req -new -nodes -x509 \ -out masspirates.org.crt \ -newkey rsa:4096 \ -keyout masspirates.org.key \ -config ~/.openssl.cnf \ -days 730
Here is our fingerprint
0 sunny:~$ openssl x509 -fingerprint -noout -in masspirates.org.crt SHA1 Fingerprint=D5:3F:E6:C6:0B:CC:1B:81:A4:C5:1C:80:14:29:61:45:FF:C3:59:A5
Via MFPL control panel, add an https web configuration. The https configuration should contain everything in the http section, along with the following lines
SSLEngine on SSLCertificateFile /PATH/TO/masspirates.org/include/cert/masspirates.org.crt SSLCertificateKeyFile /PATH/TO/masspirates.org/include/cert/masspirates.org.key
For mediawiki to work properly, you'll need to change $wgServer.
-$wgServer = "http://masspirates.org"; +$wgServer = "//masspirates.org";
Mediawiki calls this a "protocol neutral link". Some browsers will refuse to fetch both http and https urls from the same hostname. The protocol neutral server avoids this.
Wordpress Issues
Unfortunately, wordpress seems to insist on absolute URLs - you can't simply say "my site address is /blog/". That's a perfectly legitimate thing to do in the web development world, but not for wordpress. Seems like we have to be all http, or all https. Or, do something like this: http://wordpress.org/support/topic/get-wordpress-running-on-both-https-http.
I've found a number of posts describing the same issue: problems with trying to make both http and https work with a wordpress sites. Several of these attribute the issue to shortcomings in wordpress core.
So, I suppose we use https for our own logins. Until we get a cartel certificate, and can force traffic over https.