doc/certmanager.md

186 lines
8.3 KiB
Markdown
Raw Normal View History

Certificate management
======================
Managing certificates with Yunohost
-----------------------------------
The main feature of the certificate manager is to allow you to install Let's
2017-01-14 19:54:39 +01:00
Encrypt certificate on your domains without pain. You can use it from the web
administration (*SSL certificate* on a given domain info page), or from the
command line with `yunohost domain cert-status`, `cert-install` and
`cert-renew`.
#### What is required to be able to have a Let's Encrypt certificate ?
Your server needs to be reachable from the rest of Internet on port 80 (and
443), and make your `domain.tld` points to your server's public IP in your DNS
configuration. See [this documentation](diagnostic_en) if you need help.
#### Will my certificate be automatically be renewed ?
Yes. Right now, Let's Encrypt certificates are valid 90 days. A cron job will
run every day and attempt to renew any certificate that will expire in less than
15 days. An email will be sent to the root user if a renewal fails.
#### I want/need to use a certificate from a different CA than Let's Encrypt.
2017-01-14 19:54:39 +01:00
This cannot be done automatically for now. You will need to manually create a
Certificate Signing Request (CSR) to be given to your CA, and manually import
the certificate you get from it. Check out [this page](certificate) for more
info. This process might be made easier by Yunohost in the future.
Migration procedure
--------------------
> Because of the current [rate limits](https://letsencrypt.org/docs/rate-limits/)
on new Let's Encrypt certificate emissions, we recommend that you **do not
migrate** to the new built-in management feature **as long as you don't need to**.
This is especially true for nohost.me / noho.st users (and other domains services
sharing a common subdomain). If too many people migrate during the same period
of time, you might get stuck with a self-signed certificate for a few days !
2017-01-14 19:54:39 +01:00
#### I used the *letsencrypt_ynh* app
You will be asked to uninstall the app before being able to use the new
2017-01-14 19:54:39 +01:00
management feature. You can do it from the web administration interface, or from
the command line with :
```bash
yunohost app remove letsencrypt
yunohost domain cert-install
```
Be aware that the first command will revert your domains to self-signed
certificate. The second command will attempt to reinstall a Let's Encrypt
2017-01-14 19:54:39 +01:00
certificate on all your domains which have a self-signed certificate.
2017-01-14 19:54:39 +01:00
#### I manually installed my Let's Encrypt certificates
You should go in your nginx configuration, and remove the `letsencrypt.conf` (or
whatever you called the file containing the `location
'/.well-known/acme-challenge'` block) for each of your domains. Also remove the symlink
to your current certificates :
```bash
rm /etc/yunohost/certs/your.domain.tld/key.pem
rm /etc/yunohost/certs/your.domain.tld/crt.pem
```
Then run :
```bash
yunohost domain cert-install your.domain.tld --force --self-signed
yunohost domain cert-install your.domain.tld
```
for each of your domains you want a Let's Encrypt certificate.
Finally, remove your certificate renewer cron job in `/etc/cron.weekly/`, then backup and remove you `/etc/letsencrypt/` folder.
Troubleshooting
---------------
#### Admin interfaces says the letsencrypt app is installed, but it's not, and I can't access the certificate management interface !
Make sure you refresh the cache of your browser (Ctrl + Shift + R on Firefox),
and report the issue on the forum or on the bugtracker. You can work around the
issue by using `yunohost domain cert-install your.domain.tld` from the command
line.
#### I tried to uninstall the letsencrypt app, but it broke my nginx conf !
Sorry about that. Some user reported that this happens when the uninstallation
script fails to find a backup of your self-signed certificate. Running `yunohost
domain cert-install` should work anyway...
#### I get "Too many certificates already issued", what's happening ?
Currently, Let's Encrypt has a rate limit of issuing no more than 20 new
certificates by period of 7 days for a given subdomains. For example, `nohost.me`
and `noho.st` are already considered as subdomains themselves, meaning all users
of the nohost.me / noho.st service share the same common limit. According to
Let's Encrypt, this applies for *new* certificates, but not for renewals or
duplicates. If you encounter this limit, there isn't much to do except retrying
a few days later.
#### Certificate installation fails, says "Wrote file to 'some path', but couldn't download 'some url'" !
This should be fixed in the future, but for now you might need to manually add the
following line in your `/etc/hosts` :
```bash
127.0.0.1 your.domain.tld
```
About certificates and Let's Encrypt
------------------------------------
#### What is HTTPS ? What's the point of SSL certificates ?
HTTPS is the secure version of the HTTP protocol, which describes how a client
(e.g. a web browser) and a server (e.g. nginx running on your Yunohost
instance) can talk to each other. HTTPS heavily relies on [asymmetric
cryptography](https://en.wikipedia.org/wiki/Public-key_cryptography) to achieve
two things :
- confidentiality, meaning that an attacker will not be able to decrypt the content of the communication if it is intercepted ;
- server's identification, meaning that a server can prove he is who it says it is, thus protecting against [man-in-the-middle attacks](https://en.wikipedia.org/wiki/Man-in-the-middle_attack).
SSL certificates is the technology used for server to prove their identity. The
whole process relies on trust in third parties called Certification Authorities
(CA), whose role is to verify the server identity (e.g. that a given machine
effectively controls the domain `ilikecoffee.com`) before delivering
[cryptographic certificates](https://en.wikipedia.org/wiki/Public_key_certificate).
2017-01-14 19:54:39 +01:00
#### Why do browsers complain about self-signed certificates ?
Self-signed certificates are, as their name says, self-signed, meaning that you
were your own certification authority in the process. Such a certificate does
not allow to verify your server's identity, since it could have easily been
generated by an attacker on its own, attempting to perform man-in-the-middle
attacks.
#### What's up with Let's Encrypt ?
Historically, the process of verifying the identity of a server often required
human intervention, time and money.
In 2015, Let's Encrypt, developped a protocol called
[ACME](https://en.wikipedia.org/wiki/Automated_Certificate_Management_Environment),
2017-01-14 19:54:39 +01:00
which allows to automatically verify that a machine controls a domain, and deliver
certificates for free, drastically reducing the cost of setting up a SSL
certificate.
#### How does Let's Encrypt works ?
To verify your server's identity and deliver the certificate, Let's Encrypt uses
the [ACME
protocol](https://en.wikipedia.org/wiki/Automated_Certificate_Management_Environment). It
2017-01-14 19:54:39 +01:00
basically works as follow (it's simplified, but you'll get the idea) :
- A program running on your server contacts the Let's Encrypt CA server, ask for
a certificate for domain `ilikecoffee.com`.
- The Let's Encrypt CA server generates a random string such as `A84F2D0B`, and
tells the program on your server to prove it operates the domain
`ilikecoffee.com` by making the URI `http://ilikecoffee.com/.well-known/acme-challenge/A84F2D0B`
accessible.
- The program on your server edit/creates files accordingly.
- The Let's Encrypt CA server attempt to access the URI. If it works, then it
concludes the program indeed operates the domain `ilikecoffee.com`. It
delivers a certificate.
- The program on your server obtains the certificate and setups it.
#### Do we really need Certification Authorities ?
The reliance on Certification Authorities can be criticized, as they represent
points of failure in the security scheme. Some trusted CAs have been found to
issue rogue certificates in the past, sometimes with critical implications
[[1](http://www.darkreading.com/endpoint/authentication/fake-google-digital-certificates-found-and-confiscated/d/d-id/1297165),
[2](https://reflets.info/microsoft-et-ben-ali-wikileaks-confirme-les-soupcons-d-une-aide-pour-la-surveillance-des-citoyens-tunisiens/)].
Alternatives have been proposed, such as
[DANE/DNSSEC](https://en.wikipedia.org/wiki/DNS-based_Authentication_of_Named_Entities),
which is based on the DNS system does not require certification authorities.