j'ai finalement réussi tant bien que mal à installer le certificat, bien sûr en corrigeant quelques ommissions au niveau du how que je compte traduire en français pour la mettre à la disposition de tous.
en rouge les modifications faites:
1. Make the CSR
Code:
openssl req -new -nodes -keyout newserver.key -out newserver.csr
Country Name (2 letter code) [AU]: CA
State or Province Name (full name) [Some-State]: British Columbia
Locality Name (eg, city) []: Surrey
Organization Name (eg, company) [Internet Widgits Pty Ltd]: MyCompany Ltd
Organizational Unit Name (eg, section) []:
Common Name (eg, YOUR name) []:
http://www.yourdomain.com/
Email Address []:
email@yourdomain.com
A challenge password []:
An optional company name []:
NOTE: (Updated Sept 8th)The Common Name that you enter can't contain an asterisk eg *.yourdomain.com unless you are buying a 'Wildcard' certificate (much more expensive). I am using osCommerce software that forces people to use 'www.' but if your site doesn't do that, you may want both
https://yourdomain.com/ and
https://www.yourdomain.com/ to work, or if you need
https://something.yourdomain.com/ to work then you need a 'Wildcard' SSL certificate.
2. Submit the CSR to instantssl.com
Code:
pico newserver.csr
(and select and paste the whole thing into the form on their website)
3. After you get an email back with your certificate and another file called ca.txt
*** Backup the files you change if you want to ***
a. Copy the text from the certificate you just got into:
/etc/httpd/conf/ssl.crt/server.crt
and
/home/e-smith/ssl.crt/yourhostname.yourdomainname.crt (double check what your file is named)
b. Copy the newserver.key file to replace the old server.key
Code:
cp newserver.key /etc/httpd/conf/ssl.key/server.key
cp
newserver.key /home/e-smith/ssl.key/yourhostname.yourdomainname.key (double check what your file is named)
4. The chained SSL part:
Copy the ca.txt file you got by email (the chained ssl certificate) to /etc/httpd/conf/
Code:
mkdir -p /etc/e-smith/templates-custom/etc/httpd/conf/httpd.conf
pico /etc/e-smith/templates-custom/etc/httpd/conf/httpd.conf/35SSL10SSLD
Add in a this single line of text to that file:
Quote
SSLCACertificateFile /etc/httpd/conf/ca.txt
5. Security / Restarting
(Updated Sept 8th)Ownership/Security of the crt and key files
Code:
chown root.root /etc/httpd/conf/ssl.key/server.key
chown root.root /etc/httpd/conf/ssl.crt/server.crt
chown root.root /home/e-smith/ssl.key/yourhostname.yourdomainname.key
chown root.root /home/e-smith/ssl.crt/yourhostname.yourdomainname.crt
chown root.root /etc/httpd/conf/ca.txt
chmod 400 /etc/httpd/conf/ssl.key/server.key
chmod 644 /etc/httpd/conf/ssl.crt/server.crt
chmod 400 /home/e-smith/ssl.key/yourhostname.yourdomainname.key
chmod 644 /home/e-smith/ssl.crt/yourhostname.yourdomainname.crt
chmod 644 /etc/httpd/conf/ca.txt
Expand the template & restart the service
Code:
/sbin/e-smith/expand-template /etc/httpd/conf/httpd.conf
service httpd restart
httpd-e-smith restart
6. Should work fine - post your comments please
lorsque j'ai fini le serveur apache a redemmarré, puis le nouveau certificat est apparu avec les mentions suivantes:
certifitat délivré à: mondomaine
délivré par: EssentialSSLCA
Valide du: XX/XX/XX au XX/XX/XX (la période de validité)
et quand je clique sur l'onglet "emmeteur" il est bien écrit EssentialSSLCA, COMMODO CA.
le problème c'est que malgré ce certificat le navigateur me pose toujours l'erreur de certificat, ce qui m'a vraiment attristé, mais en fouillant j'ai découvert deux choses:
1. que le how était bel et bien explicite et complet, mais apparemment l'installation (je pense actuelle) de instantSSL de COMMODO, a une deuxième étape qui est l'installation des 4 autres fichiers:
a: AddTrustExternalCARoot.crt
b:ComodoUTNServerCA.crt
c:EssentialSSLCA.crt
d:UTNAddTrustServerCA.crt
je suis donc partie sur le site de commodo (
https://support.comodo.com/index.php) là attention il faut s'enregistrer et j'ai obtenu ceci:
You will receive an email from Comodo with the certificate in the email. The certificate will be called
'yourDOMAINNAME.crt' and will be within a *.zip file you have received as an email from us. When viewed in a text editor, your certificate will look something like this:
-----BEGIN CERTIFICATE-----
MIAGCSqGSIb3DQEHAqCAMIACAQExADALBgkqhkiG9w0BBwGggDCCAmowggHXAhAF
UbM77e50M63v1Z2A/5O5MA0GCSqGSIb3DQEOBAUAMF8xCzAJBgNVBAYTAlVTMSAw
(.......)
E+cFEpf0WForA+eRP6XraWw8rTN8102zGrcJgg4P6XVS4l39+l5aCEGGbauLP5W6
K99c42ku3QrlX2+KeDi+xBG2cEIsdSiXeQS/16S36ITclu4AADEAAAAAAAAA
-----END CERTIFICATE-----
Copy your Certificate into the same directory as your Private Key. In this example we will use '/etc/ssl/crt/'. The private key used in the example will be labeled 'private.key' and the public key will be 'yourDOMAINNAME.crt'.
Note: It is recommended that you make the directory that contains the private key file only readable by root.
Step two: Install the Intermediate Certificate
lisez bien à partir d'ici :
You will need to install the Intermediate CA certificates in order for browsers to trust your certificate. The Intermediate CA certificates are contained within the 'ca-bundle' file that was attached to your email in the *.zip file we sent you (this should be named 'yourSERVERNAME.ca-bundle'). In the relevant 'Virtual Host' section for your site, you will need to do the following to get this file correctly referenced:
a. First, copy the 'yourSERVERNAME.ca-bundle' file to the same directory as the certificate and key files. As a reminder, in this example we called the directory '/etc/ssl/crt/'.
b. Next, add the following line to the SSL section of the 'httpd.conf' file. Again we assume that '/etc/ssl/crt/' is the directory to where you have copied the intermediate CA file. If the line already exists amend it to read the following:
SSLCertificateChainFile /etc/ssl/crt/yourSERVERNAME.ca-bundle
c. If you are using a different location and different certificate file names, you will need to change the path and filename to reflect the path and filename that you are using. The SSL section of the updated config file should now read:
SSLCertificateFile /etc/ssl/crt/yourDOMAINNAME.crt
SSLCertificateKeyFile /etc/ssl/crt/private.key
SSLCertificateChainFile /etc/ssl/crt/yourSERVERNAME.ca-bundle
d. Save your 'config' file and restart Apache.
apache apache apache apache apache apache apache apache apache
Note: The ssl configuration file will always be referenced in the apache config file if the configuration is not included in it. Look for the lines starting 'include', which is the directive for including other files etc. For example, depending on the distribution, it might be called ssl.conf, httpd-ssl.conf etc
en définitive pour revenir à mon problème je ne sais plus dans quel répertoire faut il les loger et quel est donc la procédure?
/home/e-smith/ssl.crt ?
/etc/httpd/conf/ssl.crt ?
merci de votre contribution.
entre temps je suis en train de traduire tous en français pour mettre la doc à la disposition de tous.