openSUSE ; Let’s Encrypt & Web Server SSL

1.Obtaining an SSL Certificate (Let’s Encrypt)

Pre-assignment
Enable mod_ssl

# a2enmod ssl

1.1 Install the certificate

# zypper -n install certbot
# certbot certonly –webroot -w /srv/www/htdocs/[Web site directory] -d  [Domain name]
Saving debug log to /var/log/letsencrypt/letsencrypt.log
Plugins selected: Authenticator webroot, Installer None
# First time only, you need to register your email address and agree to the terms of use.
# Specify an email address that can be received.
Enter email address (used for urgent renewal and security notices)
(Enter ‘c’ to cancel):<mail address>
– – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – –
Please read the Terms of Service at
https://letsencrypt.org/documents/LE-SA-v1.2-November-15-2017.pdf. You must
agree in order to register with the ACME server at
https://acme-v02.api.letsencrypt.org/directory
– – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – –
#I agree to the terms of use
(A)gree/(C)ancel: A
– – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – –
# Acceptance or rejection of registration with the Electronic Frontier Foundation
Would you be willing to share your email address with the Electronic Frontier
Foundation, a founding partner of the Let’s Encrypt project and the non-profit
organization that develops Certbot? We’d like to send you email about our work
encrypting the web, EFF news, campaigns, and ways to support digital freedom.
– – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – –
(Y)es/(N)o: Y
Obtaining a new certificate
Performing the following challenges:
http-01 challenge for sample1.korodes.com
Using the webroot path /srv/www/htdocs/sample1.korodes.com for all unmatched domains.
Waiting for verification…
Cleaning up challengesIMPORTANT NOTES:
– Congratulations! Your certificate and chain have been saved at:
/etc/letsencrypt/live/ [Domain name]/fullchain.pem
Your key file has been saved at:
/etc/letsencrypt/live/ [Domain name]/privkey.pem
Your cert will expire on 2022-04-16. To obtain a new or tweaked
version of this certificate in the future, simply run certbot
again. To non-interactively renew *all* of your certificates, run
“certbot renew”
– If you like Certbot, please consider supporting our work by:Donating to ISRG / Let’s Encrypt: https://letsencrypt.org/donate
Donating to EFF: https://eff.org/donate-le

If successful, the following file will be created under /etc/letsencrypt/live/[Web site directory] # cert.pem ⇒ SSL server certificate (including public key)
# chain.pem ⇒ intermediate certificate
# fullchain.pem ⇒ A file containing the concatenation of cert.pem and chain.pem
# privkey.pem ⇒ Private key to public key

2. Web Server SSL

2.1 SSL Settings

# a2enmod ssl
# a2enmod -l
actions alias auth_basic authn_core authn_file authz_host authz_groupfile authz_core authz_user autoindex cgi dir env expires include log_config mime negotiation setenvif ssl socache_shmcb userdir reqtimeout php7
# vi /etc/apache2/listen.conf
●Line  17:Uncomment
Listen 443
# vi /etc/apache2/vhosts.d/default-ssl.conf
● Create new
<VirtualHost *:443>
DocumentRoot “/srv/www/htdocs/[Web site directory]”
SSLEngine on
SSLProtocol all -SSLv2 -SSLv3
SSLCertificateFile /etc/letsencrypt/live/[Domain name]/cert.pem
SSLCertificateKeyFile /etc/letsencrypt/live/[Domain name]/privkey.pem
SSLCertificateChainFile /etc/letsencrypt/live/[Domain name]/chain.pem
<FilesMatch “\.(cgi|shtml|phtml|php)$”>
SSLOptions +StdEnvVars
</FilesMatch>
<Directory “/srv/www/cgi-bin”>
SSLOptions +StdEnvVars
</Directory>
</VirtualHost>
# systemctl restart apache2
タイトルとURLをコピーしました