Skip to content

Commit 2f70b6b

Browse files
authored
#minor changes generating_ssl_keys_lets_encrypt.md (#1440)
1 parent 9eb8cb5 commit 2f70b6b

File tree

1 file changed

+16
-16
lines changed

1 file changed

+16
-16
lines changed

docs/guides/security/generating_ssl_keys_lets_encrypt.md

Lines changed: 16 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -9,20 +9,20 @@ tags:
99
- certbot
1010
---
1111

12-
# Generating SSL Keys - Let's Encrypt
12+
# Generating SSL keys - Let's Encrypt
1313

14-
## Prerequisites & Assumptions
14+
## Prerequisites & assumptions
1515

1616
* Comfort with the command line
1717
* Familiarity with securing web sites with SSL certificates is a plus
1818
* Knowledge of command line text editors (this example uses _vi_)
19-
* An already running web server open to the world on port 80 (http)
19+
* A web server open to the world and running on port 80 (http)
2020
* Familiarity with _ssh_ (secure shell) and the ability to access your server with _ssh_
2121
* All commands assume that you are either the root user or that you have used _sudo_ to gain root access.
2222

2323
## Introduction
2424

25-
One of the most popular ways to secure a web site, currently, is using Let's Encrypt SSL certificates, which are also free.
25+
One of the most popular ways to secure a web site currently is using Let's Encrypt SSL certificates, which are also free.
2626

2727
These are actual certificates, not self-signed or snake oil, etc., so they are great for a low-budget security solution. This document will walk you through the process of installing and using Let's Encrypt certificates on a Rocky Linux web server.
2828

@@ -54,23 +54,23 @@ Let's Encrypt uses a package called _certbot_ which needs to be installed via th
5454
dnf install epel-release
5555
```
5656

57-
Then, just install the appropriate packages, depending on whether you're using Apache or Nginx as your web server. For Apache that's:
57+
Then install the appropriate packages, depending on whether you use Apache or Nginx as your web server. For Apache that is:
5858

5959
```bash
6060
dnf install certbot python3-certbot-apache
6161
```
6262

63-
For Nginx, just change out one... partial word?
63+
For Nginx, just change out one package:
6464

6565
```bash
6666
dnf install certbot python3-certbot-nginx
6767
```
6868

69-
You can always install both server modules if necessary, of course.
69+
You can always install both server modules if necessary.
7070

7171
!!! Note
7272

73-
An earlier version of this guide required the snap package version of _certbot_, as it was found to be necessary at the time. The RPM versions have been re-tested recently, and are working now. That said, Certbot strongly recommends the use of the [snap install procedure](https://certbot.eff.org/instructions?ws=apache&os=centosrhel8). Both Rocky Linux 8 and 9 have _certbot_ available in the EPEL, so we are showing that procedure here. If you would like to use the procedure recommended by Certbot, just follow that procedure instead.
73+
An earlier version of this guide required the snap package version of _certbot_, which was necessary at the time. The RPM versions have been re-tested recently, and are working now. That said, Certbot strongly recommends the use of the [snap install procedure](https://certbot.eff.org/instructions?ws=apache&os=centosrhel8). Rocky Linux 8 and 9 have _certbot_ available in the EPEL, so we show that procedure here. If you would like to use the procedure recommended by Certbot, just follow that procedure instead.
7474

7575

7676
## Getting The Let's Encrypt Certificate for the Apache Server
@@ -83,13 +83,13 @@ We are assuming that you **are** using this procedure so we will only retrieve t
8383
certbot --apache
8484
```
8585

86-
That's really the easiest way to get things done. However, sometimes you want to take a more manual approach, and just want to grab the certificate. To retrieve the certificate only, use this command:
86+
That's really the easiest way to get things done. However, sometimes you want to take a more manual approach and grab the certificate. To retrieve the certificate only, use this command:
8787

8888
```bash
8989
certbot certonly --apache
9090
```
9191

92-
Both commands will generate a set of prompts that you will need to answer. The first is to give an email address for important information:
92+
Both commands will generate a set of prompts you need to answer. The first is to give an email address for important information:
9393

9494
```
9595
Saving debug log to /var/log/letsencrypt/letsencrypt.log
@@ -122,7 +122,7 @@ EFF news, campaigns, and ways to support digital freedom.
122122
(Y)es/(N)o:
123123
```
124124

125-
The next prompt asks you which domain you want the certificate for. It should display a domain in the listing based on your running web server. If so, enter the number next to the domain that you are getting the certificate for. In this case there is only one option ('1'):
125+
The next prompt asks you which domain you want the certificate for. It should display a domain in the listing based on your running web server. If so, enter the number next to the domain for which you are getting the certificate. In this case there is only one option ('1'):
126126

127127
```
128128
Which names would you like to activate HTTPS for?
@@ -162,7 +162,7 @@ IMPORTANT NOTES:
162162

163163
Applying the configuration file to our site is slightly different than if we were using a purchased SSL certificate from another provider (and if we didn't let _certbot_ do it automatically).
164164

165-
The certificate and chain file are included in a single PEM (Privacy Enhanced Mail) file. This is a common format for all certificate files now, so even though it has "Mail" in the reference, it is just a type of certificate file. To illustrate the configuration file, we will show it in it's entirety and then describe what is happening:
165+
A single PEM (Privacy Enhanced Mail) file includes the certificate and chain file. This is a common format for all certificate files now, so even though it has "Mail" in the reference, it is just a type of certificate file. To illustrate the configuration file, we will show it in it's entirety and then describe what is happening:
166166

167167
```
168168
<VirtualHost *:80>
@@ -208,7 +208,7 @@ Here's what's happening above. You may want to review the [Apache Web Server Mul
208208

209209
* Even though port 80 (standard http) is listening, we are redirecting all traffic to port 443 (https)
210210
* SSLEngine on - simply says to use SSL
211-
* SSLProtocol all -SSLv2 -SSLv3 -TLSv1 - says to use all available protocols, except those that have been found to have vulnerabilities. You should research periodically which protocols are currently acceptable for use.
211+
* SSLProtocol all -SSLv2 -SSLv3 -TLSv1 - says to use available protocols, except those found to have vulnerabilities. You should research periodically which protocols are currently acceptable for use.
212212
* SSLHonorCipherOrder on - this deals with the next line regarding the cipher suites, and says to deal with them in the order that they are given. This is another area where you should review the cipher suites that you want to include periodically
213213
* SSLCertificateFile - this is the PEM file, that contains the site certificate **AND** the intermediate certificate. We still need the 'SSLCertificateChainFile' line in our configuration, but it will simply specify the same PEM file again.
214214
* SSLCertificateKeyFile - the PEM file for the private key, generated with the _certbot_ request.
@@ -226,16 +226,16 @@ Run this command to get started:
226226
certbot --nginx
227227
```
228228

229-
You'll be asked a couple of questions as shown above, including your email address, and which site you want to get a certificate for. Assuming you have at least one site configured (with a domain name pointing at the server), you'll see a list like this:
229+
You will need to enter your email address and the site you want a certificate for. Assuming you have at least one site configured (with a domain name pointing at the server), you'll see a list like this:
230230

231231
```
232232
1. yourwebsite.com
233233
2. subdomain.yourwebsite.com
234234
```
235235

236-
If you have more than one site, just press the number that corresponds to the site you want a certificate for.
236+
If you have multiple sites, press the number that corresponds to the site you want a certificate for.
237237

238-
The rest of the text you'll see is awful similar to what's above. The results will be a bit different, of course. If you have a dead-simple Nginx configuration file that looks like this:
238+
The rest of the text is similar to what is above. The results will be a bit different. If you have an Nginx configuration file that looks like this:
239239

240240
```
241241
server {

0 commit comments

Comments
 (0)