Apache: Difference between revisions
From Lolly's Wiki
Jump to navigationJump to search
No edit summary |
|||
Line 1: | Line 1: | ||
[[Kategorie: | [[Kategorie:Apache]] | ||
== Zertifikat generieren == | == Zertifikat generieren == | ||
Line 147: | Line 147: | ||
RewriteRule .* - [F] | RewriteRule .* - [F] | ||
</IfModule> | </IfModule> | ||
</VirtualHost> | |||
</source> | |||
===SSLLabs A+ with all 100%=== | |||
'''If you consider to take this snippet be warned. Old clients have no chance to reach the server.''' | |||
<source lang=apache> | |||
<VirtualHost ssl.server.de:443> | |||
... | |||
# SSL parameters | |||
SSLEngine On | |||
SSLProtocol all -SSLv2 -SSLv3 -TLSv1 -TLSv1.1 | |||
SSLCipherSuite DHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES256-SHA:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-SHA | |||
SSLHonorCipherOrder on | |||
SSLUseStapling on | |||
SSLCompression off | |||
SSLOptions +FakeBasicAuth +ExportCertData +StrictRequire | |||
SSLCertificateFile /etc/letsencrypt/live/ssl.server.de/fullchain.pem | |||
SSLCertificateKeyFile /etc/letsencrypt/live/ssl.server.de/privkey.pem | |||
SSLOpenSSLConfCmd DHParameters "/etc/ssl/certs/dhparam.pem" | |||
SSLOpenSSLConfCmd ECDHParameters Automatic | |||
SSLOpenSSLConfCmd Curves secp521r1:secp384r1:prime256v1 | |||
<IfModule mod_headers.c> | |||
# Add security and privacy related headers | |||
Header edit Set-Cookie ^(.*)$ $1;HttpOnly;Secure | |||
Header always set Strict-Transport-Security "max-age=31556926; includeSubDomains; preload" | |||
Header always set X-Frame-Options SAMEORIGIN | |||
Header always set X-Content-Type-Options nosniff | |||
Header set X-XSS-Protection "1; mode=block" | |||
Header set X-Robots-Tag "none" | |||
SetEnv modHeadersAvailable true | |||
</IfModule> | |||
... | |||
</VirtualHost> | </VirtualHost> | ||
</source> | </source> |
Revision as of 08:44, 6 March 2018
Zertifikat generieren
Defaultwerte vernünftig anpassen
Country & Co auf für einen selbst passende Werte anpassen:
# vi /etc/ssl/openssl.cnf
Schlüssel generieren
# openssl ecparam -genkey -name secp256r1 | openssl ec -aes256 -out server.de.ec-key
read EC key
using curve name prime256v1 instead of secp256r1
writing EC key
Enter PEM pass phrase:
Verifying - Enter PEM pass phrase:
Sollte es gewünscht sein den Schlüssel ohne Passwort abzulegen, kann man den Schlüssel nachträglich so entfernen:
# openssl ec -in server.de.ec-key -out server.de.ec-key
read EC key
Enter PEM pass phrase:
writing EC key
Zertifikat ausstellen
# openssl req -new -x509 -sha256 -key server.de.ec-key -out server.de-wildcard.pem -days 1825 -nodes
You are about to be asked to enter information that will be incorporated
into your certificate request.
What you are about to enter is what is called a Distinguished Name or a DN.
There are quite a few fields but you can leave some blank
For some fields there will be a default value,
If you enter '.', the field will be left blank.
-----
Country Name (2 letter code) [DE]:
State or Province Name (full name) [Hamburg]:
Locality Name (eg, city) [Hamburg]:
Organization Name (eg, company) [My Site]:
Organizational Unit Name (eg, section) [Sub]:
Common Name (e.g. server FQDN or YOUR name) []:*.server.de
Email Address [ssl@server.de]:
Zertifikat ansehen
# openssl x509 -text -noout -in server.de-wildcard.pem
Certificate:
Data:
Version: 3 (0x2)
Serial Number: ... (0x...)
Signature Algorithm: ecdsa-with-SHA256
Issuer: C=DE, ST=Hamburg, L=Hamburg, O=My Site, OU=Sub, CN=*.server.de/emailAddress=ssl@server.de
Validity
Not Before: Apr 16 09:35:02 2015 GMT
Not After : Apr 14 09:35:02 2020 GMT
Subject: C=DE, ST=Hamburg, L=Hamburg, O=My Site, OU=Sub, CN=*.server.de/emailAddress=ssl@server.de
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (256 bit)
pub:
...
ASN1 OID: prime256v1
X509v3 extensions:
X509v3 Subject Key Identifier:
...
X509v3 Authority Key Identifier:
keyid:...
X509v3 Basic Constraints:
CA:TRUE
Signature Algorithm: ecdsa-with-SHA256
...
Apache konfigurieren
/etc/apache2/mods-available/ssl.conf
<IfModule mod_ssl.c>
...
SSLUseStapling On
SSLStaplingCache "shmcb:${APACHE_RUN_DIR}/stapling_cache(128000)"
...
</IfModule>
<VirtualHost ssl.server.de:443>
# ...
SSLEngine On
# Do this only if you are sure you have no old clients
SSLProtocol all -SSLv2 -SSLv3 -TLSv1 -TLSv1.1
# If you need to support old clients use this instead
# SSLProtocol all -SSLv2 -SSLv3 -TLSv1
SSLCompression off
SSLHonorCipherOrder On
# Do this only if you are sure you have no old clients
SSLCipherSuite DHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES256-SHA:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-SHA
# If you need to support old clients use this instead
# SSLCipherSuite ECDHE-RSA-AES256-GCM-SHA384:ECDHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA256:ECDHE-RSA-AES256-SHA:ECDHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES128-SHA256:DHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA:EDH-RSA-DES-CBC3-SHA:AES256-GCM-SHA384:AES128-GCM-SHA256:AES256-SHA256:AES128-SHA256:AES256-SHA:AES128-SHA:HIGH:!DES-CBC3-SHA:!aNULL:!eNULL:!EXPORT:!CAMELLIA:!DES:!MD5:!PSK:!RC4:!SSLv2:!SSLv3
SSLCertificateFile /etc/letsencrypt/live/ssl.server.de/fullchain.pem
SSLCertificateKeyFile /etc/letsencrypt/live/ssl.server.de/privkey.pem
SSLOptions +FakeBasicAuth +ExportCertData +StrictRequire
# Generate DH parameters with
# # openssl dhparam -out /etc/ssl/certs/dhparam_4096.pem 4096
SSLOpenSSLConfCmd DHParameters "/etc/ssl/certs/dhparam_4096.pem"
SetEnvIfNoCase Referer ^https://ssl\.server\.de keep_cookies
RequestHeader unset Cookie env=!keep_cookies
<IfModule mod_headers.c>
# https://kb.sucuri.net/warnings/hardening/headers-x-content-type
Header set X-Content-Type-Options nosniff
# https://kb.sucuri.net/warnings/hardening/headers-x-frame-clickjacking
Header append X-FRAME-OPTIONS "SAMEORIGIN"
# https://kb.sucuri.net/warnings/hardening/headers-x-xss-protection
Header set X-XSS-Protection "1; mode=block"
# Strict Transport Security
Header always set Strict-Transport-Security "max-age=31556926;"
# Public Key Pins
Header always set Public-Key-Pins "max-age=5184000; pin-sha256=\"...\"; pin-sha256=\"...\"; includeSubDomains"
</IfModule>
<IfModule mod_rewrite.c>
RewriteEngine On
# https://kb.sucuri.net/warnings/hardening/http-trace HTTP Trace Method
RewriteCond %{REQUEST_METHOD} ^TRACE
RewriteRule .* - [F]
</IfModule>
</VirtualHost>
SSLLabs A+ with all 100%
If you consider to take this snippet be warned. Old clients have no chance to reach the server.
<VirtualHost ssl.server.de:443>
...
# SSL parameters
SSLEngine On
SSLProtocol all -SSLv2 -SSLv3 -TLSv1 -TLSv1.1
SSLCipherSuite DHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES256-SHA:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-SHA
SSLHonorCipherOrder on
SSLUseStapling on
SSLCompression off
SSLOptions +FakeBasicAuth +ExportCertData +StrictRequire
SSLCertificateFile /etc/letsencrypt/live/ssl.server.de/fullchain.pem
SSLCertificateKeyFile /etc/letsencrypt/live/ssl.server.de/privkey.pem
SSLOpenSSLConfCmd DHParameters "/etc/ssl/certs/dhparam.pem"
SSLOpenSSLConfCmd ECDHParameters Automatic
SSLOpenSSLConfCmd Curves secp521r1:secp384r1:prime256v1
<IfModule mod_headers.c>
# Add security and privacy related headers
Header edit Set-Cookie ^(.*)$ $1;HttpOnly;Secure
Header always set Strict-Transport-Security "max-age=31556926; includeSubDomains; preload"
Header always set X-Frame-Options SAMEORIGIN
Header always set X-Content-Type-Options nosniff
Header set X-XSS-Protection "1; mode=block"
Header set X-Robots-Tag "none"
SetEnv modHeadersAvailable true
</IfModule>
...
</VirtualHost>
Client certificates
#
## <ClientCertificate>
#
SSLVerifyClient none
SSLCACertificateFile "/var/log/apache2/conf/ca.crt"
SSLCARevocationFile "/var/log/apache2/conf/crl.pem"
SSLCARevocationCheck chain
CustomLog "/var/log/apache2/logs/ssl_user.log" \
"%t %h Serial=%{SSL_CLIENT_M_SERIAL}x User=%{SSL_CLIENT_S_DN_CN}x \"%r\" %b"
<Location />
SSLVerifyClient require
SSLVerifyDepth 10
SSLOptions +FakeBasicAuth
SSLRequireSSL
SSLRequire %{SSL_CLIENT_S_DN_O} eq "Your Organization" \
and %{SSL_CLIENT_S_DN_OU} in {"AllowedOU1","AllowedOU2"}
</Location>
#
## </ClientCertificate>
#
ApacheTop
Top of all sites on your host:
# ls /var/log/apache2/*.log | xargs -n 1 echo -f | xargs apachetop