The use of Secure HTTP (or HTTPS) is essential to avoid getting my browser communication hijacked, or hacked. For savvy web users, browsing a site with HTTPS is a must to protect login and other private information. As a Web Application administrator, the way to accomplish this is to use the Secure Socket Layer (SSL) library in combination with an Apache web server.
The widely used SSL library is by OpenSSL. It’s constantly updated, and it’s freely available. I use it because it also compiles well on Linux and Solaris operating systems. The source code is portable and has been tested in many flavors of Unix. Windows install is available also. Compiling the source code is as straight forward as running the “configure” script and run “make”. The default install for OpenSSL is usually in /usr/local/ssl directory.
Once installed, the first step is to create a Key Pair:
/usr/local/ssl/bin/openssl genrsa -des3 -rand <anyfile1>:<anyfile2>:<anyfile3> -out www.website.com.key 1024
- The anyfile1, anyfile2, or anyfile3 can be any file in the system. There has to be at least one file specified.
- Specifying a pass phrase is required in this case. But for convenience, I might opt to do it without specifying a password. To disable the password prompt, remove the “-des3” option.
Next create a Certificate Signing Request:
/usr/local/ssl/bin/openssl req -new -sha256 -key www.website.com.key -out www.website.com.csr
Fill in the requested information. At the end of the questionnaire, a “challenge password” is usually not required.
Updated September 10, 2014: Due to SHA-1 weakness, it’s imperative to let the intermediate cert provider generate a cert without SHA-1 encryption. Hence the -sha256 option when generating the CSR.
Submit the CSR to a CA such as Thawte or Verisign. After payment is processed, they will send an email with directions how to get the certificate file. It might require cut and paste of the cert code into a file, usually with a .crt or .cert suffix (such as www.website.com.crt).
For development or QA environments, where a valid signed certificate is not required, I can create a self-signing one. To create a “fake” (aka Snake Oil) certificate, use the following:
/usr/local/ssl/bin/openssl x509 -req -days 999 -in www.website.com.csr -signkey www.website.com.key -out www.website.com.cert
Both the cert and key files are required for the web server. I’ll cover Apache web server installation in the next post.