This is somewhere to document howto set up
CAcert.org SSL certificates for indymedia sub-domains, get their
root certificate here.
You can email / pester in #tech on irc.indymedia.org the following people about getting a CAcert certificate for any *.indymedia.org sub domain:
Also if you want to ask more general stuff about CAcert then there is #cacert on irc.cacert.org and the
CAcert wiki and the
CAcert lists.
Apache HTTPS SSL certificates
The prefered way to set up Apache is using the multiple domain name method, the old single domain method has been left for reference only.
Firstly there are some security considerations — you should ideally generate and keep the key on an encrypted partition because there has been
http://www.autistici.org/ai/crackdown a case where the authorities sniffed encrypted traffic for a period and then took out the server to get the private key and then decrypted all the past traffic they had logged.
One draw back with having the key on an encrypted partition is that apache can't start if it can't access the keys, so each time the box is booted the partition with the crypted keys needs to be decrypted before apache can be started.
See the
TravenEncryptedPartitions page for an example of how encrypted partitions can be set up and also
UkCrypto#Filesystem for a comparision of the different encryption options and the
riseup documentation.
HTTPS limitations
HTTPS isn't the answer for anonomising publishing to indymedia sites — it doesn't prevent the time and size and remote IP addresses from being tracked by someone sniffing the traffic and then this information can be compared to the publically available time stamps on articles.
Having multiple publishing sites sharing one IP address helps in this case and it would also help if the CMS' don't publish the exact time on posts (they would be rounded to the nearest 5 mins or so) but this still isn't the answer...
Suggesting that people wanting to publish anonymously use HTTPS and Tor is probably the best that can be done, see the
UK IMC site (follow the link to the security page) for an example of this.
HTTP multiple domain names
It is now possible to have multiple VirtualHosts with different domain names all using one IP address and one cert with all the names in it, for more information about how this works see the CAcert
VhostTaskForce and
VhostsApache wiki pages.
Generating a CSR
The first thing you need to do is to generate a certificate signing request and the script attached to this page is the easiest way to do this (please read over the script before running it to get an idea of what it does):
- csr.sh.txt: Bash script for generating CSRs with multiple domain names
(This script is a modified version of the one on the
CAcert VhostTaskForce wiki page which writes the secret key and csr into the current directory rather than ~/)
Be sure to run this script in the encrypted directory where the secret key will be kept — generating it on an unencrypted partition and then moving it is not a good idea because it
could be recovered.
Following is an example of how the script works
(note that the CommonName has been repeated as a SubjectAltName, this is to be necessary to aviod Domain Name Mismatch errors because if there is a SubjectAltName the CommonName is ignored):
$ sh ~/bin/csr.sh
Private Key and Certificate Signing Request Generator
This script was designed to suit the request format needed by
the CAcert Certificate Authority. www.CAcert.org
Short Hostname (ie. imap big_srv www2): myservername
FQDN/CommonName (ie. www.example.com) : www.foo.indymedia.org
Type SubjectAltNames for the certificate, one per line. Enter a blank line to finish
SubjectAltName: DNS:www.foo.indymedia.org
SubjectAltName: DNS:foo.indymedia.org
SubjectAltName: DNS:indymedia.foo
SubjectAltName: DNS:www.indymedia.foo
SubjectAltName: DNS:www.bar.indymedia.org
SubjectAltName: DNS:bar.indymedia.org
SubjectAltName: DNS:
Running OpenSSL...
Generating a 2048 bit RSA private key
.............+++
.......................................+++
writing new private key to 'myservername_privatekey.pem'
-----
Copy the following Certificate Request and paste into CAcert website to obtain a Certificate.
When you receive your certificate, you 'should' name it something like myservername_server.pem
-----BEGIN CERTIFICATE REQUEST-----
MIIC4DCCAcgCAQAwIDEeMBwGA1UEAxMVd3d3LmZvby5pbmR5bWVkaWEub3JnMIIB
IjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA0jBlssXmPlDBkurcVZuhruBT
EWTOelPH9BESaxDXgPmBCcK4ZA2+UHDmHnkzYetBsxM1PWvQP/RA6JCK1FiSqT4L
mMvHMPVv3nc5SJp9yvNB/VSZVdaU21GoMHeuuGEHds4GNv3/SmkeM2ek+SrN4ld9
hTyvnsYqHCnv2gorWyrlgeyZv1wTsXrBThtPZYujaS7Sp/c3S7usdE/NoL4D18lB
M0UWXc/h9wcnXrphPnOOW0YnvEHP9tftkrahuj+/bEFn2D/RzM6wmSCCwzcDiuth
LTt8qcNXCy4XLLqlEjtoIYembqs/BwDWplly1iLw5a4UhQuRRitdd8tFG/O8VQID
AQABoHsweQYJKoZIhvcNAQkOMWwwajBoBgNVHREEYTBfghFmb28uaW5keW1lZGlh
Lm9yZ4INaW5keW1lZGlhLmZvb4IRd3d3LmluZHltZWRpYS5mb2+CFXd3dy5iYXIu
aW5keW1lZGlhLm9yZ4IRYmFyLmluZHltZWRpYS5vcmcwDQYJKoZIhvcNAQEEBQAD
ggEBAAk4p4gyLqcCGGN4dKnIeZxK4H1mg4nV5pZVjchSido2Md70LYqFM8jTQoTO
+TfH38SZ9xDCIp3x+kwEiFGxWW8U8MXgnySzfrDU1lCtflcXBAH+KLApsYT8VQ7C
Jn/0rSP1hDuOKbDxvQyS3mncyhB9IBv+qUo1F+jDJlruC4ksShRg7K+xNl58O8pE
bCPIeMeYQ39CsAOFK4sU9xjtALk1aYSskZa+w25IbLr+fwoNTmYCTzsQcTEz5WIL
63eT5F47ITmX/D69QO+plRonSeoj6QJ6F5N/5csEYmOen657aNmt5nJOmkySQhFJ
1hf6wb3b4pdPB1R+88SGVDXYw+E=
-----END CERTIFICATE REQUEST-----
The Certificate request is also available in myservername_csr.pem
The Private Key is stored in myservername_privatekey.pem
Then you need to pass the certificate request to the
CaCertSsl#Contact and they will then send you back a certificate.
You don't need to worry about keeping the csr or the certificate so secret (though you can submit the csr gpg encrypting it to the
CaCertSsl#Contact if you wish) — the vital thing to keep safe is the secret key.
Doing all the above manually is annoying when there are multiple sites on a server all using the same cert and the sites keep changing so that new certs are needed all the time, the answer is to use the
cacert-cert.sh.txt script — this will find all the ServerNames and ServerAliases in use on a machine and then generate a CSR based on what it finds. Before you set up this script you can use
cacert-names.sh.txt to simply find all the names.
- cacert-names.sh.txt: This script can be used to find ServerNames and ServerAliases
- cacert-cert.sh.txt: This script can be used to find ServerNames and ServerAliases and generate a CSR — this is very handy for a server with lots of Indymedia sites using one IP address!
Apache configuration
There seems to be various ways to get a
Domain Name Mismatch error when setting up Apache to do multiple HTTPS VirtualHosts (see a
screenshot of this error).
UseCanonicalName
Once you have the certificate you have two options about how to set up Apache, depending on how
UseCanonicalName is set.
Apache has UseCanonicalName On by default and when it is on you can use one VirtualHost with multiple ServerAlias' with all these ServerAlias' and the ServerName in the cert.
If however you have UseCanonicalName Off then you can't use any ServerAlias' and you have to have one VirtualHost per ServerName and then set all the VirtualHost's to use the same cert.
Repeating the CommonName as a SubjectAltName
If you don't repeat the CommonName as a SubjectAltName then you get the
Domain Name Mismatch error message. For some more info on this and screen shots see the
Aktivix CAcert wiki page.
Non IP based VirtualHosts
Also you might get the same Domain Name Mismatch error message if you use wild card or name based https VirtualHosts - you seem to need to specify the IP address for each VirtualHost.
httpd.conf example
This is an example configuration for foo.indymedia.org and bar.indymedia.org
with alternative domain names redirecting to the main ones, this can be done using a set IP address or wild cards.
There has been some discussion about the
SSLCipherSuite line and CACert suggest the following SSLCipherSuite and SSLProtocol lines to disable weak ciphers and sslv2 and fix a problem with konq - latest versions don't handshake properly:
NameVirtualHost 192.168.0.1:443
# or
# NameVirtualHost *:443
# foo.indymedia.org:443
<VirtualHost 192.168.0.1:443>
# or
# <VirtualHost *:443>
ServerName foo.indymedia.org:443
UseCanonicalName On
CustomLog logs/foo_ssl_access_log noip
ErrorLog /dev/null
SSLEngine on
SSLCipherSuite HIGH
SSLProtocol all -SSLv2
SSLCertificateFile /etc/crypt/foo-bar_server.pem
SSLCertificateKeyFile /etc/crypt/foo-bar_privatekey.pem
# the next line you need to get the file from the cacert site:
# wget http://www.cacert.org/certs/class3.crt
# but this is probably not really necessary
SSLCertificateChainFile /etc/apache2/ssl/cacert/class3.crt
DocumentRoot "/var/www/foo.indymedia.org"
<Directory "/var/www/foo.indymedia.org">
Options Indexes
AllowOverride None
Order allow,deny
Allow from all
</Directory>
</VirtualHost>
# www.foo.indymedia.org:443
<VirtualHost 192.168.0.1:443>
ServerName www.foo.indymedia.org:443
UseCanonicalName On
CustomLog logs/foo_ssl_access_log noip
ErrorLog /dev/null
SSLEngine on
SSLCipherSuite HIGH
SSLProtocol all -SSLv2
SSLCertificateFile /etc/crypt/foo-bar_server.pem
SSLCertificateKeyFile /etc/crypt/foo-bar_privatekey.pem
Redirect / https://foo.indymedia.org/
</VirtualHost>
# indymedia.foo:443
<VirtualHost 192.168.0.1:443>
ServerName indymedia.foo:443
UseCanonicalName On
CustomLog logs/foo_ssl_access_log noip
ErrorLog /dev/null
SSLEngine on
SSLCipherSuite HIGH
SSLProtocol all -SSLv2
SSLCertificateFile /etc/crypt/foo-bar_server.pem
SSLCertificateKeyFile /etc/crypt/foo-bar_privatekey.pem
Redirect / https://foo.indymedia.org/
</VirtualHost>
# www.indymedia.foo:443
<VirtualHost 192.168.0.1:443>
ServerName www.indymedia.foo:443
UseCanonicalName On
CustomLog logs/foo_ssl_access_log noip
ErrorLog /dev/null
SSLEngine on
SSLCipherSuite HIGH
SSLProtocol all -SSLv2
SSLCertificateFile /etc/crypt/foo-bar_server.pem
SSLCertificateKeyFile /etc/crypt/foo-bar_privatekey.pem
Redirect / https://foo.indymedia.org/
</VirtualHost>
# bar.indymedia.org:443
<VirtualHost 192.168.0.1:443>
ServerName bar.indymedia.org:443
UseCanonicalName On
CustomLog logs/bar_ssl_access_log noip
ErrorLog /dev/null
SSLEngine on
SSLCipherSuite HIGH
SSLProtocol all -SSLv2
SSLCertificateFile /etc/crypt/foo-bar_server.pem
SSLCertificateKeyFile /etc/crypt/foo-bar_privatekey.pem
DocumentRoot "/var/www/bar.indymedia.org"
<Directory "/var/www/bar.indymedia.org">
Options Indexes
AllowOverride None
Order allow,deny
Allow from all
</Directory>
</VirtualHost>
# www.bar.indymedia.org:443
<VirtualHost 192.168.0.1:443>
ServerName www.bar.indymedia.org:443
UseCanonicalName On
CustomLog logs/bar_ssl_access_log noip
ErrorLog /dev/null
SSLEngine on
SSLCipherSuite HIGH
SSLProtocol all -SSLv2
SSLCertificateFile /etc/crypt/foo-bar_server.pem
SSLCertificateKeyFile /etc/crypt/foo-bar_privatekey.pem
Redirect / https://bar.indymedia.org/
</VirtualHost>
# indymedia.bar:443
<VirtualHost 192.168.0.1:443>
ServerName indymedia.bar:443
UseCanonicalName On
CustomLog logs/foo_ssl_access_log noip
ErrorLog /dev/null
SSLEngine on
SSLCipherSuite HIGH
SSLProtocol all -SSLv2
SSLCertificateFile /etc/crypt/foo-bar_server.pem
SSLCertificateKeyFile /etc/crypt/foo-bar_privatekey.pem
Redirect / https://bar.indymedia.org/
</VirtualHost>
# www.indymedia.bar:443
<VirtualHost 192.168.0.1:443>
ServerName www.indymedia.bar:443
UseCanonicalName On
CustomLog logs/foo_ssl_access_log noip
ErrorLog /dev/null
SSLEngine on
SSLCipherSuite HIGH
SSLProtocol all -SSLv2
SSLCertificateFile /etc/crypt/foo-bar_server.pem
SSLCertificateKeyFile /etc/crypt/foo-bar_privatekey.pem
Redirect / https://bar.indymedia.org/
</VirtualHost>
HTTP single domain name
This is
documented on the CAcert.org site.
First you need to generate a key in a private, secure directory, the -nodes option disables the need for a passphrase:
$ openssl req -nodes -new -keyout private.key -out server.csr
When you run the above command you will be prompted to provide various information, the only field that isn't disgarded at the server side is the Common Name, which for this example is
example.indymedia.org for all the other fields enter a
. (a full stop), the last two optional fields can be left blank:
Generating a 1024 bit RSA private key
.............++++++
..........++++++
writing new private key to 'private.key'
-----
You are about to be asked to enter information that will be incorporated
into your certificate request.
What you are about to enter is what is called a Distinguished Name or a DN.
There are quite a few fields but you can leave some blank
For some fields there will be a default value,
If you enter '.', the field will be left blank.
-----
Country Name (2 letter code) [GB]:.
State or Province Name (full name) [Berkshire]:.
Locality Name (eg, city) [Newbury]:.
Organization Name (eg, company) [My Company Ltd]:.
Organizational Unit Name (eg, section) []:.
Common Name (eg, your name or your server's hostname) []:example.indymedia.org
Email Address []:.
Please enter the following 'extra' attributes
to be sent with your certificate request
A challenge password []:
An optional company name []:
Then you should have two files in your current directory, private.key and server.csr, the certificate signing request (server.csr) should look like this:
-----BEGIN CERTIFICATE REQUEST-----
MIIBWzCBxQIBADAcMRowGAYDVQQDExFpcmMuaW5keW1lZGlhLm9yZzCBnzANBgkq
hkiG9w0BAQEFAAOBjQAwgYkCgYEAtfES7rRB84NCfpw3mIVaums+7zy4x7sCqWj1
PdTJ+2wlkxY8Y7GnUlYL2CBZnDv6TmciYXlr+u91m0ZgB29sZYFfRjH38BAaMVtH
UPKXq0xttuP8aQDW2AIedP44BZdG6E2CpTF8Z/5OWTHMLtuLfgnXSn0g05JZNWi/
6MNVVwsCAwEAAaAAMA0GCSqGSIb3DQEBBAUAA4GBAIYqXjCFZz+uEyMUrQeXPiBD
TCPQheUtHWfD6AShxfkURtOAdQFBgZMKJrT0d82lkNFdNpxD4zzhFZUEXfSQq0Mu
YmDCV4MkeOFxllQvtu6arYCDMvDjDaJGYIHKtyaF19LkLuMiGRaEQNHUKaI18NmW
EBpU1PlLqn65thHfmIOa
-----END CERTIFICATE REQUEST-----
Email the server.csr file to your contact and then they will upload your certificate sigining request to CAcert they will be emailed a certificate back from CAcert and they will forward the certificate to you. You should save the certificate server.crt and reference it from your httpd.conf file like this:
SSLCertificateFile /etc/httpd/conf/ssl.crt/server.crt
And the private.key file that was generated when you generated the request certificate needs referencing like this:
SSLCertificateKeyFile /etc/httpd/conf/ssl.key/server.key
Use the following for the Cipher Suite:
# SSL Cipher Suite:
# List the ciphers that the client is permitted to negotiate.
# See the mod_ssl documentation for a complete list.
SSLCipherSuite HIGH
SSLProtocol all -SSLv2
Then users just need to install the
cacert.org root cert it probably makes sense to add a link to this page.
TLS Postfix certificates
What you need to do for postfix is more-or-less the same as for Apache, there are
Postfix configuration instructions on the CAcert wiki, see also the Sarai configuration example below.
See also the
CAcert wiki for various MTA instructions.
SMTP multiple domain names
TLS also works with multiple names on certs using the SubjectAltName field so it makes sense to generate a cert with all the names that are set up at a DNS level — in otherwords all the different MX records that point to your server. So use the attached script,
csr.sh.txt, like this
(note that the CommonName has been repeated as a SubjectAltName, this is to be necessary to aviod Domain Name Mismatch errors because if there is a SubjectAltName the CommonName is ignored):
# csr.sh
Private Key and Certificate Signing Request Generator
This script was designed to suit the request format needed by
the CAcert Certificate Authority. www.CAcert.org
Short Hostname (ie. imap big_srv www2): smtp_cert
FQDN/CommonName (ie. www.example.com) : mail.indymedia.org
Type SubjectAltNames for the certificate, one per line. Enter a blank line to finish
SubjectAltName: DNS:mail.indymedia.org
SubjectAltName: DNS:mail.lists.indymedia.org
SubjectAltName: DNS:mail.indymedia.us
SubjectAltName: DNS:mail.indymedia.org.uk
SubjectAltName: DNS:
Running OpenSSL...
Generating a 2048 bit RSA private key
...+++
............+++
writing new private key to 'smtp_cert_privatekey.pem'
-----
Copy the following Certificate Request and paste into CAcert website to obtain a Certificate.
When you receive your certificate, you 'should' name it something like smtp_cert_server.pem
-----BEGIN CERTIFICATE REQUEST-----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-----END CERTIFICATE REQUEST-----
The Certificate request is also available in smtp_cert_csr.pem
The Private Key is stored in smtp_cert_privatekey.pem
SMTP single domain name
Generate a certificate signing request:
$ openssl req -nodes -new -keyout private.key -out server.csr
Email the server.csr file to your contact and then they will upload your certificate signing request to CAcert they will be emailed a certificate back from CAcert and they will forward the certificate to you. You should save the certificate server.crt.
Sarai TLS configuration
SaraiInfo is the main Indymedia mail server and following are some notes on how it was set up for TLS.
We created the directory /etc/postfix/certs and then did:
cp /home/chris/cacart/sarai-tls/sarai.indymedia.org/private.key ./sarai.key
cp /home/chris/cacart/sarai-tls/sarai.indymedia.org/server.crt ./sarai.crt
wget http://www.cacert.org/cacert.crt
This put our private key, our certificate, and CAcert.org's certificate all in one directory, then
we modified /etc/postfix/main.cf to have:
### Transport Layer Security ###
# Server side TLS
smtpd_use_tls = yes
smtpd_tls_key_file = /etc/postfix/certs/sarai.key
smtpd_tls_cert_file = /etc/postfix/certs/sarai.crt
smtpd_tls_CAfile = /etc/postfix/certs/cacert.crt
smtpd_tls_loglevel = 1
smtpd_tls_received_header = yes
smtpd_tls_session_cache_timeout = 3600s
# Client side TLS
smtp_use_tls = yes
smtp_tls_key_file = /etc/postfix/certs/sarai.key
smtp_tls_cert_file = /etc/postfix/certs/sarai.crt
smtp_tls_CAfile = /etc/postfix/certs/cacert.crt
# Misc TLS
tls_random_source = dev:/dev/urandom
Restart postifx, and then watch the logs.
http://www.cacert.org/cacert.crt
Then you need to copy the server.crt file to /etc/postfix/newcert.pem and then copy the certificate from CAcert to /etc/postfix/newreq.pem.
Also this line should be added to the above to aviod the (No client certificate requested) line in email headers (
more info):
smtpd_tls_ask_ccert = yes
Postfix see also
Other pages with Postfix TLS information:
Courier and SSL
To have courier configured to do pop3s and imaps, you have to give it a .pem, which is a bit different from the .crt.
You can have that file easily once you have obtained your .crt and .key file. Its just a concatenation of this two files and a Diffie-Hellman code. Run this and your done:
cat bat_privatekey.pem bat_server.pem > bat_courier.pem
openssl gendh >> bat_courier.pem
SSL certs for stunnel
Indymedia IRC used stunnel and I think it needs .pem files so the post fix instructions above should work.
Sites using CAcert certs
HTTPS
Politics
There is a
intro article about CAcert on NewsForge.
Sub root certs
Duane from CACert
has replied to imc-tech to a suggestion for using
Subroot certs, see also the
CAcert wiki SubRoot page.
Alternatives
Should Indymedia be encouraging the hierarchical CAcert? Isn't there an autonomous peer-cert system yet?
11:13 < evilbunny> Isn't there an autonomous peer-cert system yet? -> cacert
11:14 < evilbunny> for the most part, still requires people to support it though
11:17 < evilbunny> I tried to build CAcert as autonomous as possible, but people forget passwords, don't
understand that much about PKI and a whole bunch of other things so there is no such
thing really :)
12:05 < chrisc> what i say to people who say that cacert is not good enough for whatever reason, is, well
show me a working alternative... and well, there are not any...
12:08 < evilbunny> <chrisc> what i say to people who say that cacert is not good enough for whatever
reason, is, well show me a working alternative... and well, there are not any... <-
good point
12:09 < chrisc> yeah, people tend to stop moaning at that point ;-)
12:12 < evilbunny> :)
CACert considered harmful
What about this? (a blog entry about CAcert)
10:59 < evilbunny> we're addressing the this
10:59 < evilbunny> the only thing the guy was on about was the low trust cert
10:59 < evilbunny> not checking names
11:00 < evilbunny> he didn't have an issue with anything else
11:00 * chrisc nods
11:00 < evilbunny> mole hill -> mountain
11:00 < evilbunny> so we're going to be ditching the low trust key and the high trust key will only
require 50 points in future
11:00 < chrisc> ah
11:00 < evilbunny> which he agreed was a suitable solution to his grevence
11:01 < chrisc> well he should update his blog...
11:01 < evilbunny> i couldn't agree more
11:01 < evilbunny> feel free to email him and express that :)
11:09 < evilbunny> the blog is on about how we issue low trust gpg signed keys without any checking of
names
11:10 < evilbunny> as for peer to peer pki system, CAcerts web of trust is close as you get with any
semblence of trustworthyness
11:10 < evilbunny> PKI was only designed to be centralised
11:10 < evilbunny> and since it took off and not GPG it's a system we have to live in unless you convince
all the software makers to do otherwise
See also
The UK site has a
security box which is documented on the
UkCrypto page and there is also a related
UkSecurity page where some help documentation is being developed.
--
ChrisC - 03 Nov 2005 - added the section about hosting multiple https sites with one ip address
--
ChrisC - 21 Jan 2005 - added politics and see also section and moved various things into the politics section from the top of the page
--
PaulWise - 08 Dec 2004 - added a contact section
--
ChrisC - 10 Apr 2004