Introduction
In this tutorial, you will learn the procedure of TLS/SSL certificate installation on Nginx web server running Debian 8 Jessie. Once you are finished, all traffic between server and client will be encrypted and safe. This is a standard practice of securing e-commerce websites and other financial services online.
Prerequisites
Before you begin working with this guide you’ll need these:
- SSH with root access or sudo user access.
- The Nginx web server with properly a domain and vhost configured.
Step 1 — Installing Let’sEncrypt certbot
The first step to using Let’s Encrypt to obtain an SSL certificate is to install the certbot Let’s Encrypt client on your server. To install run this:
sudo apt-get install certbot
Step 2 — Create and install the SSL certificates
Certbot will handle the SSL certificate management quite easily, it will generate a new certificate for a provided domain as a parameter.
In this case, example.com will be used as the domain for which the certificate will be issued:
sudo certbot certonly --webroot -w /var/www/example -d example.com -d www.example.com
IMPORTANT! The first domain should be your base domain, in this sample it’s example.com
While installing the certificate you will be presented with a step-by-step guide which will let you customize certificate details. You will be able to choose between forcing HTTPS or leaving HTTP as the default protocol, providing an email address will be required as well for security purposes.
You may also do this with the auto-installation of the certbot by running:
sudo certbot --authenticator webroot --installer nginx
Step 3 — Check the SSL certificate(s) configuration
At the above stage, your certificate created and configured. Now check if your domain virtual host configuration file is in accordance with the SSL below. If not, then put this manually on virtual hosts SSL configuration:
... listen 443 ssl http2; listen [::]:443 ssl http2; server_name example.com www.example.com ssl_certificate /etc/letsencrypt/live/<your-domain>/cert.pem ssl_certificate_key /etc/letsencrypt/live/<your-domain>/privkey.pem ...
Now we need to test our configuration.
sudo nginx -t
Finally, restart Nginx and You can taste that your SSL is working.
sudo systemctl reload nginx
Step 4 — Setting up for the auto-renewal
The Certbot packages on your system come with a cron job that will renew your certificates automatically before they expire. Since Let’s Encrypt certificates last for 90 days, it’s highly advisable to take advantage of this feature. You can test automatic renewal for your certificates by running this command:
sudo certbot renew --dry-run
Conclusion
Congratulations! You have just secured your Nginx web server by implementing the most anticipated security feature – free SSL certificates. From now on all traffic between your domain web server and client is secure, you can be assured that no one could intercept the communication and alter or steal crucial information.
Leave a Reply