Home PC Games Linux Windows Database Network Programming Server Mobile  
           
  Home \ Server \ Let's Encrypt with semiautomatic into Nginx configuration https     - ORA-00911 invalid character error Solution (Database)

- PHP loop reference caused strange problems (Programming)

- OpenJDK7 source compiler installation on CentOS 6.5 (Linux)

- CentOS install Memcached (Server)

- Configuring a Linux operating system security management services Explain (Linux)

- Linux Desktop allows exceptionally different launch applications (Linux)

- Linux kernel TCP / IP parameters analysis and tuning (Linux)

- Analysis of native Java keywords (Programming)

- Vagrant build LNMP environment (Server)

- Debian 8 Jessie install LAMP server tutorial (Server)

- Oracle bug Ora-04043 (Database)

- Delete specific files using bash directory under Linux (Linux)

- MySQL use the integer type (Database)

- Linux kernel IPv6 protocol closed manner (Linux)

- MySQL and MariaDB traditional master-slave cluster configuration (Database)

- Ora-14450: attempt to access ah transactional temptable already in use (Database)

- MongoDB slice simple example (Database)

- Ubuntu install Geary (Linux)

- rsync server set up (Server)

- Use Hexo quickly build and deploy a blog to Github (Server)

 
         
  Let's Encrypt with semiautomatic into Nginx configuration https
     
  Add Date : 2018-11-21      
         
         
         
  With Let's Encrypt, configure SSL certificate is no longer difficult, but Let's Encrypt is still in its very early stages, for nginx automated configuration support is not good. But we can write their own point of feet have been semi-automated configuration of our own nginx server.

One line of command is all pointing nginx domain on this server for SSL Certificates
With the Crontab task to automatically renew certificates
Simple nginx configuration examples. You can redirect all www at the beginning of the domain name to the domain name without the www, you can also get a A + rating of SSL Labs.
installation

I Let's Encrypt as a submodule integrated into this project it. So only you need to clone a project that is enough.

git clone https://github.com/songchenwen/nginx-ssl-config-with-letsencrypt.git
cd nginx-ssl-config-with-letsencrypt
git submodule init
git submodule update --remote
use

Request a certificate

Edit ssl / config

Fill in your domain name. Can fill more than one domain name, the domain name will be used as the first Common Name. Certificates will be stored in / etc / letsencrypt / live / down, next to Common Name directory named.

Let's Encrypt select a server. acme-v01 server is the official beginning of the server, there are strict limits the number of requests, we do not recommend it to do the experiment. acme-staging at the beginning of the server is a test server, there is no limit the number of requests, but does not check out a valid certificate, it is recommended to use this server to test the configuration.

Configuring nginx

Let's Encrypt in the application and renewal of certificates need to use a http server to put a file so that it can verify your ownership of this domain.

I use a simple configuration file letsencrypt_challenge nginx to redirect all domain names point to this server http request to the corresponding https requests, leaving only the required verification Let's Encrypt URL remain on http.

sudo cp nginx-config / letsencrypt_challenge / etc / nginx / sites-available / letsencrypt_challenge
sudo ln -s / etc / nginx / sites-available / letsencrypt_challenge / etc / nginx / sites-enabled / letsencrypt_challenge
sudo nginx -s reload

Execute scripts

Executive ssl / apply_all_certs.sh, follow the prompts to fill in your email, then you can apply for a certificate of good.

bash ssl / apply_all_certs.sh
sudo nginx -s reload
nginx configuration file example

In nginx-config directory, there are three more useful nginx configuration files. Remember to modify them before using, at least remember to replace my domain name to you.

letsencrypt_challenge redirect all point to this server domain http https request to the corresponding request, leaving only the required verification Let's Encrypt URL remain on http.
www_to_none_www redirect all www domain names beginning with https request to the corresponding domain name does not begin with www.
sample_config is a simple server configuration file. This profile can help you easily get SSL Labs on A's score. To the line before the last} configuration uncommented will open HSTS, so your score will become A +.
Crontab mandate automatic renewal certificate

Let's Encrypt certificate issued is valid only for 90 days, so we need a method to automatically renew certificates. A renewal of Crontab task once a month is sufficient. This task should be executed as root, because then we also need to be renewed after about nginx reload configuration to take effect.

sudo crontab -e
Here is the content Crontab task

0 2 1 1-12 * /path/to/ssl/renew_all_certs.sh
     
         
         
         
  More:      
 
- How to compare PDF files on Ubuntu (Linux)
- HTTPS Encryption Algorithm (Linux)
- B-tree - ideas and implementation of C language code (Programming)
- MySQL separation Amoeba achieve literacy (Database)
- Fast Sort Algorithms (Programming)
- Linux Monitoring Command (Linux)
- Oracle delete table space prompted ORA-00604 and ORA-38301 (Database)
- JDK installation notes under CentOS (Linux)
- Linux operating system buffer overflow attacks Countermeasures (Linux)
- Vi syntax highlighting settings (Linux)
- Linux network monitoring tools ntopng installation (Linux)
- Usage sed some of the parameters (Linux)
- Protect against network attacks using Linux system firewall (Linux)
- CentOS7 install JDK (Linux)
- Install NetBeans IDE 8.0 on Ubuntu, Linux Mint, Elementary OS, and Debian (Linux)
- Import and export myloader accelerate mydumper (Database)
- MySQL loose index scan (Database)
- Learn to read the source code of vmstat (Linux)
- Android Custom View password box example (Programming)
- MySQL Online DDL tools of pt-online-schema-change (Database)
     
           
     
  CopyRight 2002-2022 newfreesoft.com, All Rights Reserved.