Outils pour utilisateurs

Outils du site


auto-heber:certbot

.

Utilisation de certbot pour obtenir un certificat HTTPS avec Let's Encrypt

Guide avec boisvert.info., plusieurs étapes

Commandes à faire sur un portable:

sebhtml@prometheus# xyz

Commandes à faire sur le serveur avec l'utilisateur root (dans mon cas, boisvert.info, un VPS (Virtual Private Server) chez OVH):

root@vps217173$ xyz

01. Vérifier que nginx roule

root@vps217173:~# systemctl|grep nginx
nginx.service                                                                               loaded active running   A high performance web server and a reverse proxy server         

02. Vérifier le système d'exploitation

root@vps217173:~# lsb_release -a 2>/dev/null|grep Desc
Description:	Debian GNU/Linux 9.9 (stretch)

03. Aller sur https://certbot.eff.org/

sebhtml@prometheus:~$ firefox https://certbot.eff.org/

et choisir I'm using “Nginx” on “Debian 9 (stretch)”

04. Ajouter stretch-backport

root@vps217173:~# echo "deb http://deb.debian.org/debian stretch-backports main" \
        > /etc/apt/sources.list.d/stretch-backports.list

Obtenir les clés de signature GPG de Debian (utile pour Yunohost entre autres)

root@vps217173:~# gpg --keyserver http://keys.gnupg.net --recv-key 7638D0442B90D010
root@vps217173:~# gpg -a --export 7638D0442B90D010 | sudo apt-key add -
root@vps217173:~# apt update -y

05. Installer les trucs recommendés de certbot

root@vps217173:~# apt-get install \
                certbot python-certbot-nginx -t stretch-backports

06. Installer le plugin certbot DNS

root@vps217173:~# apt install -y python3-certbot-dns-rfc2136 \
         -t stretch-backports 

07. Demander le certificat avec certbot

root@vps217173:~# certbot certonly \
       --preferred-challenges dns --manual -m seb@boisvert.info \
       --agree-tos --eff-email -d boisvert.info 
Saving debug log to /var/log/letsencrypt/letsencrypt.log
Plugins selected: Authenticator manual, Installer None
Obtaining a new certificate
Performing the following challenges:
dns-01 challenge for boisvert.info
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

08. Configuration DNS

Après avoir dit Yes, il faut ajouter une entrée TXT dans la zone DNS:

root@vps217173:~# (suite de la commande certbot) 
NOTE: The IP of this machine will be publicly logged as having requested this
certificate. If you're running certbot in manual mode on a machine that is not
your server, please ensure you're okay with that.

Are you OK with your IP being logged?

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

(Y)es/(N)o: Y
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Please deploy a DNS TXT record under the name
_acme-challenge.boisvert.info with the following value:

YuR89nq85hwQP-wynyhL1MFpZ6p1p8HOwfmzwYcgnqA

09. Déterminer qui a autorité sur le domaine

sebhtml@prometheus:~$ sudo apt install dnsutils 
sebhtml@prometheus:~$ dig boisvert.info SOA|grep -A1 "ANSWER SECTION" 
;; ANSWER SECTION:
boisvert.info.		3575	IN	SOA	ns39.domaincontrol.com. dns.jomax.net. 2019050104 28800 7200 604800 600

10. Sur GoDaddy (DNS), ajouter l'entrée DNS:

Pour mon DNS à moi chez GoDaddy (dans Firefox):

Type: TXT Host: _acme-challenge TXT Value: wtvvc_WqkbC04qzNvk0ofqYjHwGzoGa4j_cvjYig-7M TTL (Time to Live): 1 hour

11. Attendre 5 minutes et vérifier le DNS

Pour laisser l'information DNS se propager dans les tubes de l'Internet.

root@vps217173:~# sleep $((5 * 60))
sebhtml@prometheus:~$ dig _acme-challenge.boisvert.info TXT | grep -A1 "ANSWER SECTION"
;; ANSWER SECTION:
_acme-challenge.boisvert.info. 905 IN	TXT	"YuR89nq85hwQP-wynyhL1MFpZ6p1p8HOwfmzwYcgnqA"

12. Appuyer sur <ENTER>

root@vps217173:~# (suite de la commande certbot) 
Before continuing, verify the record is deployed.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Press Enter to Continue
Waiting for verification...
Cleaning up challenges

IMPORTANT NOTES:
 - Congratulations! Your certificate and chain have been saved at:
 /etc/letsencrypt/live/boisvert.info/fullchain.pem
 Your key file has been saved at:
 /etc/letsencrypt/live/boisvert.info/privkey.pem
 Your cert will expire on 2019-08-02. To obtain a new or tweaked
 version of this certificate in the future, simply run certbot
 again. To non-interactively renew *all* of your certificates, run
 "certbot renew"
 - If you like Certbot, please consider supporting our work by:

 Donating to ISRG / Let's Encrypt:   https://letsencrypt.org/donate
 Donating to EFF:                    https://eff.org/donate-le

13. Énumérer les certificats Let's Encrypt

root@vps217173:~#  certbot certificates 
Saving debug log to /var/log/letsencrypt/letsencrypt.log

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Found the following certs:
Certificate Name: boisvert.info
  Domains: boisvert.info
  Expiry Date: 2019-08-02 21:57:38+00:00 (VALID: 89 days)
  Certificate Path: /etc/letsencrypt/live/boisvert.info/fullchain.pem
  Private Key Path: /etc/letsencrypt/live/boisvert.info/privkey.pem
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

14. Ajouter la configuration du certificat dans nginx

Ajouter dans la section “server {” du fichier /etc/nginx/sites-available/default :

      # Let's Encrypt configuration
      listen 443 ssl default_server;
      ssl on;
      ssl_certificate /etc/letsencrypt/live/boisvert.info/fullchain.pem;
      ssl_certificate_key /etc/letsencrypt/live/boisvert.info/privkey.pem;

15. Redémarrer nginx (avec systemctl de systemd)

root@vps217173:~# systemctl restart nginx.service

16. Vérifier que le serveur écoute sur le port TCP/IP 443 (HTTPS)

sebhtml@prometheus:~$  sudo apt  install nmap 
sebhtml@prometheus:~$  nmap boisvert.info -p 443 
Starting Nmap 7.60 ( https://nmap.org ) at 2019-05-04 19:17 EDT
Nmap scan report for boisvert.info (144.217.240.68)
Host is up (0.019s latency).
Other addresses for boisvert.info (not scanned): 2607:5300:201:3100::1c3e
rDNS record for 144.217.240.68: 68.ip-144-217-240.net

PORT    STATE SERVICE
443/tcp open  https

Nmap done: 1 IP address (1 host up) scanned in 0.07 seconds

17. Vérifier le certificat SSL avec OpenSSL

sebhtml@prometheus:~$  echo | openssl s_client -showcerts \
           -servername boisvert.info -connect boisvert.info:443 \
             2>/dev/null | openssl x509 -inform pem -noout -text 
Certificate:
  Data:
      Version: 3 (0x2)
      Serial Number:
          03:e4:81:b7:de:61:95:f6:a4:cc:d3:46:cd:77:0c:f9:d6:3e
  Signature Algorithm: sha256WithRSAEncryption
      Issuer: C = US, O = Let's Encrypt, CN = Let's Encrypt Authority X3
      Validity
          Not Before: May  4 21:57:38 2019 GMT
          Not After : Aug  2 21:57:38 2019 GMT
      Subject: CN = boisvert.info
      Subject Public Key Info:
          Public Key Algorithm: rsaEncryption
              Public-Key: (2048 bit)
              Modulus:
                  00:bd:5e:e2:56:1d:76:17:46:34:9f:f4:13:f9:f4:
                  52:79:a8:4e:2c:36:2c:a4:55:29:f3:54:e5:de:c9:
                  ad:c5:bf:da:f9:34:e9:60:56:93:8a:3c:3d:42:a7:
                  62:bd:80:42:14:f0:08:0c:3c:70:e2:c0:af:50:38:
                  e3:d2:30:ec:5d:43:0e:4c:1a:34:78:cb:91:db:c6:
                  24:41:20:7e:c6:56:3f:e0:fa:7c:ff:39:60:8e:be:
                  3b:25:c0:97:49:79:d7:90:5a:9d:4a:c4:46:c2:53:
                  b4:f1:ab:42:02:26:ef:70:cd:62:c8:55:91:1f:e9:
                  0d:3f:3e:ab:88:87:50:d9:ad:d5:e6:f3:cc:18:91:
                  18:30:b2:b7:71:1d:d6:9f:23:65:02:f4:d2:46:b1:
                  f1:b8:c8:74:e7:64:a5:cc:03:33:0a:25:5c:19:35:
                  fc:b6:23:70:78:a7:2e:a5:c4:18:e8:a1:06:bb:31:
                  52:99:af:ea:b3:2b:e0:15:33:d0:6a:b7:72:57:e0:
                  16:64:3e:41:69:8c:12:fb:a3:a7:9d:f8:fd:f0:30:
                  a2:23:4f:e4:4a:74:5a:a9:43:8c:43:0c:5a:17:fc:
                  60:4e:a8:7b:21:f9:ea:64:af:f7:f6:83:e6:6a:75:
                  84:2f:76:85:8a:bf:5c:0d:5e:8c:ba:9a:04:16:2c:
                  c2:b1
              Exponent: 65537 (0x10001)
      X509v3 extensions:
          X509v3 Key Usage: critical
              Digital Signature, Key Encipherment
          X509v3 Extended Key Usage: 
              TLS Web Server Authentication, TLS Web Client Authentication
          X509v3 Basic Constraints: critical
              CA:FALSE
          X509v3 Subject Key Identifier: 
              2D:40:BA:62:94:5D:15:53:6C:38:99:64:A0:12:4E:C6:99:EB:85:40
          X509v3 Authority Key Identifier: 
              keyid:A8:4A:6A:63:04:7D:DD:BA:E6:D1:39:B7:A6:45:65:EF:F3:A8:EC:A1

          Authority Information Access: 
              OCSP - URI:http://ocsp.int-x3.letsencrypt.org
              CA Issuers - URI:http://cert.int-x3.letsencrypt.org/

          X509v3 Subject Alternative Name: 
              DNS:boisvert.info
          X509v3 Certificate Policies: 
              Policy: 2.23.140.1.2.1
              Policy: 1.3.6.1.4.1.44947.1.1.1
                CPS: http://cps.letsencrypt.org

          CT Precertificate SCTs: 
              Signed Certificate Timestamp:
                  Version   : v1 (0x0)
                  Log ID    : E2:69:4B:AE:26:E8:E9:40:09:E8:86:1B:B6:3B:83:D4:
                              3E:E7:FE:74:88:FB:A4:8F:28:93:01:9D:DD:F1:DB:FE
                  Timestamp : May  4 22:57:38.890 2019 GMT
                  Extensions: none
                  Signature : ecdsa-with-SHA256
                              30:45:02:20:3D:1C:FD:0F:56:E2:9B:64:F1:40:40:A4:
                              DE:73:18:70:B8:39:D3:CE:06:3C:04:47:29:93:7D:20:
                              F0:87:8B:1F:02:21:00:BD:17:EE:B4:0F:21:60:F6:9E:
                              BD:7F:54:5A:54:95:31:C3:2E:8D:00:11:F6:CB:3F:4C:
                              29:82:CB:88:04:A3:F8
              Signed Certificate Timestamp:
                  Version   : v1 (0x0)
                  Log ID    : 63:F2:DB:CD:E8:3B:CC:2C:CF:0B:72:84:27:57:6B:33:
                              A4:8D:61:77:8F:BD:75:A6:38:B1:C7:68:54:4B:D8:8D
                  Timestamp : May  4 22:57:38.821 2019 GMT
                  Extensions: none
                  Signature : ecdsa-with-SHA256
                              30:45:02:21:00:88:18:40:79:FC:C0:D4:79:49:37:1B:
                              3C:2F:58:03:BF:20:3D:02:F4:9A:D4:5A:30:CD:B1:73:
                              1C:AC:92:11:5B:02:20:01:11:3A:B0:7B:D8:38:7F:C4:
                              6F:44:FB:46:AC:1C:5F:C2:B7:F3:D4:17:E9:A4:D1:62:
                              F6:6E:B1:35:8D:EA:08
  Signature Algorithm: sha256WithRSAEncryption
       29:9d:33:5f:3b:c4:98:2b:1b:fb:f7:f7:f2:01:2d:5a:c2:9b:
       d6:1e:2b:fa:10:e6:d1:81:50:9a:10:b2:7d:5f:54:75:97:58:
       2c:7a:5b:2c:ab:db:93:ac:e7:69:0e:52:17:d0:eb:3e:c2:1f:
       5b:fb:95:a3:ee:7f:1d:12:67:97:80:00:1b:a7:a3:f3:a5:5b:
       26:fd:f5:e5:4c:39:52:59:df:2e:a3:1b:a5:3e:87:38:1e:c2:
       a2:4c:3b:0e:67:79:a2:cf:7a:d3:be:e2:96:5a:ef:af:1b:0e:
       f0:6f:22:8c:cc:ce:09:63:37:0e:76:68:25:39:0f:e0:0b:5c:
       81:f9:90:86:39:4f:3e:40:17:a7:1e:53:e5:c0:7f:31:00:e2:
       20:cd:58:ec:04:e3:17:a0:4f:b4:06:9e:df:c3:0c:3f:d9:92:
       d1:56:b1:9c:3e:b5:87:05:5a:64:f0:74:ca:2a:48:00:a0:69:
       9c:c6:97:e6:31:83:05:ce:cf:cf:51:23:95:f5:7b:e9:59:a1:
       bf:9a:2d:2f:a0:2a:c1:7c:e1:33:16:91:ba:c6:a0:b2:f6:4f:
       80:6b:bf:09:72:a7:a8:bd:ab:53:e4:b4:99:00:d5:7f:f5:86:
       77:74:08:10:26:67:29:4a:2e:28:d8:b9:34:fd:20:ed:e6:36:
       3c:cb:e7:77
       

18. Tester la connection TCP/IP avec le protocole HTTPS sur le port 443

sebhtml@prometheus:~$ curl -I https://boisvert.info/
HTTP/1.1 200 OK
Server: nginx/1.10.3
Date: Sat, 04 May 2019 23:10:05 GMT
Content-Type: text/html
Content-Length: 5079
Last-Modified: Mon, 08 Apr 2019 00:30:31 GMT
Connection: keep-alive
ETag: "5caa9627-13d7"
Accept-Ranges: bytes

19. Fin :-)

auto-heber/certbot.txt · Dernière modification : 2024/01/28 23:48 de 127.0.0.1