Yesterday I received a letter from Google , since I use Google Search Console to monitor the indexing of site in Google search engine. The essence of the letter is that Google Chrome will report unsafe site that uses the http protocol on pages that require a password. And when you consider that on my site authorization form located on every page, it means that a warning will be on all pages of the site. Not the most pleasant situation, so I had to quickly get an SSL certificate and configure https.
At the moment there CA Let`s Encrypt, which gives out free certificates for a period of 90 days. This CA is supported by organizations such as the Electronic Frontier Foundation (EFF), Mozilla Foundation, Akamai, Cisco Systems.
The process of obtaining and installing the certificate is automated, but in the case of a site that is running on Django and Nginx , will need further work on Nginx server settings.
Obtaining a certificate
To obtain a certificate and updates automatically using software Certbot software. The site Let`s encrypt refers to the software, where you can choose the type of your operating system and the server, which is used for the return of content on your site. In my case it Nginx and Ubuntu 16.04 .
There will be instruction on the installation and the process of obtaining the certificate.
To install the software certification use the following command:
sudo apt-get install letsencrypt
Next, you must obtain a certificate by using the plugin webroot with the following command:
sudo letsencrypt certonly --webroot -w /var/www/example -d example.com -d www.example.com
Where specified directory for the certification of your site, in this case /var/www/example , it will be necessary to create, and the corresponding domains for which you receive a certificate.
In this case, there a nuance. Already at this point you must configure Nginx , as in the directory /var/www/example will create a hidden directory .well-known , which is necessary to obtain a certificate. More information about the initial setup Nginx can read the corresponding article .
Therefore, pre-configure Nginx , as shown below and restart it.
server { listen 80; listen [::]:80; server_name example.com; location /.well-known { alias /var/www/example/.well-known; } location / { proxy_pass http://127.0.0.1:8000; proxy_set_header Host $server_name; proxy_set_header X-Real-IP $remote_addr; proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for; } }
Then you successfully get your SSL certificate.
Configuring https protocol
Once we have received the certificate, you must configure the https protocol, and for this you need to open port 443 on the server.
sudo ufw allow 443/tcp
And configure Nginx .
server { listen 80; listen [::]:80; listen 443 ssl; listen [::]:443 ssl; server_name example.com; ssl_certificate /etc/letsencrypt/live/example.com/fullchain.pem; ssl_certificate_key /etc/letsencrypt/live/example.com/privkey.pem; location /.well-known { alias /var/www/example/.well-known; } location / { proxy_pass http://127.0.0.1:8000; proxy_set_header Host $server_name; proxy_set_header X-Real-IP $remote_addr; proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for; } }
In this case, specify the path to your certificates and the ports on which the server listens for connections.
Set up a connection via http
Leave it possible to connect via http protocol for users - it's up to you already, but what is the point to leave the opportunity to work on this protocol, if you already have https . Therefore, the user will do a redirect to the pages with http on the same page with https .
server { listen 80; listen [::]:80; server_name example.com; return 301 https://$server_name$request_uri; } server { listen 443 ssl; listen [::]:443 ssl; server_name example.com; ssl_certificate /etc/letsencrypt/live/example.com/fullchain.pem; ssl_certificate_key /etc/letsencrypt/live/example.com/privkey.pem; location /.well-known { alias /var/www/example/.well-known; } location / { proxy_pass http://127.0.0.1:8000; proxy_set_header Host $server_name; proxy_set_header X-Real-IP $remote_addr; proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for; } }
Restart Nginx and make sure that when you try to connect via http we automatically redirected to the connecting of https .
Automatic certificate renewal
Use the following command to update the certificate:
letsencrypt renew
But the process can be automated using the cron (daemon designed to run jobs at a specific time or at regular intervals).
To edit cron as root execute the following command:
sudo crontab -e
It will provide the choice between the possible editors, choose your editor to taste. And I use nano. After that, insert the following line in the cron configuration.
30 2 * * 1 /usr/bin/letsencrypt renew >> /var/log/letsencrypt-renew.log
In this case, on Mondays at 2:30 am will be an attempt to renew the certificate.
Correction of content
The last thing left is the correction of all links on the site. That is, you need to change http to https, that the internal linking site does not create additional referrals.
For Django I recommend VDS-server of Timeweb hoster .
Добрый день хочу обновить сертификат, но получаю следующее
. Как правильно обновить сертифика, подскажите? Может что в конфиге поправить?Добрый день. Либо webroot не отработал как следует, либо вы где-то в настройке http накосячили. Смотрите строчки, где указывается путь к ssl сертификату в конфиге nginx.