forked from diafygi/gethttpsforfree
-
Notifications
You must be signed in to change notification settings - Fork 0
/
index.html
547 lines (509 loc) · 25.1 KB
/
index.html
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
<!DOCTYPE html>
<html>
<!--
Welcome to the source code for gethttpsforfree.com!
This is an open source website that is meant to be auditable. Please read
through the code to see what's going on!
Original files:
/index.html - This page
/js/index.js - The interaction behavior for this page
Third-party libraries (all from asn1.js package):
/js/asn1js/int10.js - Needed for asn1.js
/js/asn1js/hex.js - Convert hex to binary array
/js/asn1js/base64.js - Convert base64 to binary array
/js/asn1js/asn1.js - Parse ASN.1 format used in x.509 certificates
/js/asn1js/LICENSE - The license for the above asn1.js files
Released under MIT License. Enjoy!
-->
<head>
<title>Get HTTPS for free!</title>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8"/>
<style>
*{box-sizing:border-box;}
div{margin:15px 0px;}
.error{color:#ff1111;}
.field{width:100%;max-width:600px;}
body{background-color:#fafafa;}
li{margin-bottom:10px;}
h1{border-bottom:solid black 1px;padding-bottom:15px;}
input[type="text"]{width:100%;}
textarea{width:100%;height:120px;white-space:pre;}
.help{float:right;font-size:12px;text-decoration:underline;cursor:pointer;}
.help-checkbox{display:none;}
.help-checkbox:checked + .help-content{display:inline-block;}
.help-content{display:none;width:100%;max-width:600px;margin:5px 0px 10px 0px;padding:10px;background-color:#eeeeee;border:2px solid #bbbbbb;}
code{display:inline-block;margin:5px 0px;padding:5px;background-color:#ffffff;}
pre{margin:5px 0px;padding:5px;overflow:auto;background-color:#ffffff;}
.tabs > label{display:inline-block;margin:0px;padding:6px 12px;font-size:13px;text-decoration:underline;cursor:pointer;}
.tabs input[type=radio]{display:none;}
.tabs input[type=radio]:checked + label{background-color:#eeeeee;}
.tab{display:none;background-color:#eeeeee;padding:15px 15px 1px 15px;margin:0px 0px 15px 0px;}
.tab .help-content{background-color:#ffffff;}
.tab .help-content a{display:inline-block;width:100%;white-space:nowrap;overflow:hidden;text-overflow:ellipsis;}
.tab code{background-color:#eeeeee;}
.tab pre{background-color:#eeeeee;}
.tab textarea{height:105px;}
.footer{font-size:12px;}
</style>
<script src="js/asn1js/int10.js"></script>
<script src="js/asn1js/base64.js"></script>
<script src="js/asn1js/hex.js"></script>
<script src="js/asn1js/asn1.js"></script>
</head>
<body>
<!--#############-->
<!--## Intro ##-->
<!--#############-->
<h1>Get HTTPS for free!</h1>
<h2 id="digest_error" class="error" style="display:none;">
ERROR: Your browser is not compatible with this website (this website
needs WebCryptoAPI's crypto.subtle.digest()). Please upgrade to a modern
browser (Firefox, Chrome, Safari, IE 11+).
</h2>
<div>
You can now get free https certificates from the non-profit certificate
authority <a href="https://letsencrypt.org/" target="_blank">Let's Encrypt</a>!
This is a website that will take you through the manual steps to get your free
https certificate so you can make your own website use https! This website is
<a href="https://github.com/diafygi/howtogetfreehttps" target="_blank">open source</a>
and <strong>NEVER</strong> asks for your private keys. Never trust a website
that asks for your private keys!
<!--TODO-->
<!--<a href="renew.html">Click here</a> to renew certs.-->
<!--<a href="revoke.html">Click here</a> to revoke certs.-->
</div>
<div>
<b>NOTE: This website is for people who know how to generate certificate signing
requests (CSRs)!</b> If you're not familiar with how to do this, please use the
official Let's Encrypt <a href="https://github.com/letsencrypt/letsencrypt" target="_blank">client</a>
that can automatically issue and install https certificates for you. This
website is designed for people who know what they are doing and just want to get
their free https certificate.
</div>
<hr/>
<!--############################-->
<!--## Step 1: Account Info ##-->
<!--############################-->
<h2>Step 1: Account Info</h2>
<div>
Let's Encrypt requires that you register an account email and public key before
issuing a certificate. The email is so that they can contact you if needed, and
the public key is so you can securely sign your requests to issue/revoke/renew
your certificates. <i><b>Keep your account private key secret!</b> Anyone who has it
can impersonate you when making requests to Let's Encrypt!</i>
</div>
<div class="field">
<label for="email">Account Email:</label><br/>
<input id="email" type="text" placeholder="(e.g. [email protected])"/>
</div>
<div class="field">
<label for="howto_pubkey" class="help">(how do I generate this?)</label>
<input id="howto_pubkey" type="checkbox" class="help-checkbox"/>
<div class="help-content">
How to generate a new account keypair using openssl:<br/>
<ol>
<li>
Generate an account private key if you don't have one:<br/>
(KEEP ACCOUNT.KEY SECRET!)<br/>
<code>openssl genrsa 4096 > account.key</code>
</li>
<li>
Print your public key:<br/>
<code>openssl rsa -in account.key -pubout</code>
</li>
<li>
Copy and paste the public key into the box below.<br/>
</li>
</ol>
</div>
<label for="pubkey">Account Public Key:</label><br/>
<textarea id="pubkey" placeholder="-----BEGIN PUBLIC KEY----- ..."></textarea>
</div>
<div class="field">
<input id="validate_account" type="submit" value="Validate Account Info"/>
<span id="validate_account_status" style="display:none;"></span>
</div>
<hr/>
<!--###########################################-->
<!--## Step 2: Certificate Signing Request ##-->
<!--###########################################-->
<h2>Step 2: Certificate Signing Request</h2>
<div>
This is the certificate signing request (CSR) that you send to Let's Encrypt
in order to issue you a signed certificate. It contains the website domains you
want to issue certs for and the public key of your TLS private key. <i><b>Keep your
TLS private key secret!</b> Anyone who has it can man-in-the-middle your website!</i>
</div>
<div class="field">
<label for="howto_csr" class="help">(how do I generate this?)</label>
<input id="howto_csr" type="checkbox" class="help-checkbox"/>
<div class="help-content">
How to generate a new Certificate Signing Request (CSR):<br/>
<ol>
<li>
Generate a TLS private key if you don't have one:<br/>
(KEEP DOMAIN.KEY SECRET!)<br/>
<code>openssl genrsa 4096 > domain.key</code>
</li>
<li>
Generate a CSR for your the domains you want certs for:</br>
(replace "foo.com" with your domain)</br>
Linux:
<pre>
#change "/etc/ssl/openssl.cnf" as needed:
# Debian: /etc/ssl/openssl.cnf
# RHEL and CentOS: /etc/pki/tls/openssl.cnf
# Mac OSX: /System/Library/OpenSSL/openssl.cnf
openssl req -new -sha256 -key domain.key -subj "/" \
-reqexts SAN -config <(cat /etc/ssl/openssl.cnf \
<(printf "[SAN]\nsubjectAltName=DNS:foo.com,DNS:www.foo.com"))
</pre>
</li>
<li>
Copy and paste the CSR into the box below.<br/>
</li>
</ol>
</div>
<label for="csr">Certificate Signing Request:</label><br/>
<textarea id="csr" placeholder="-----BEGIN CERTIFICATE REQUEST----- ..."></textarea>
</div>
<div class="field">
<input id="validate_csr" type="submit" value="Validate CSR"/>
<span id="validate_csr_status" style="display:none;"></span>
</div>
<hr/>
<!--#############################-->
<!--## Step 3: Sign Requests ##-->
<!--#############################-->
<h2>Step 3: Sign API Requests<span id="step3_pending"> (waiting...)</span></h2>
<div id="step3" style="display:none;">
<div>
Let's Encrypt requires that you sign all of your requests to them with your
account private key. Below are the requests that you will need to sign. The
commands to do this are generated below so you can copy-and-paste them into your
terminal. <i>Be sure to change the account private key location so it points to
your real private key.</i>
</div>
<div class="field">
<label for="howto_sign1" class="help">(how do I do this?)</label>
<input id="howto_sign1" type="checkbox" class="help-checkbox"/>
<div class="help-content">
How to generate the needed signatures:<br/>
<ol>
<li>
Copy and paste each command below into your terminal (if your
account private key isn't at "./account.key", change "./account.key"
in the command to wherever it exists).
</li>
<li>
Copy and paste the hex encoded signature output from the command
into the text field below that command.
</li>
</ol>
</div>
<label>Run these signature commands in your terminal:</label><br/>
<span id="step3_commands">
</span>
<span id="signing_template" style="display:none;">
<input type="text" value="echo ..." readonly/><br/>
<input id="challenge_sig_foobar_com" type="text" placeholder='Paste the hex output here (e.g. "(stdin)= f2cf67e4...")'/><br/>
</span>
</div>
<div class="field">
<input id="validate_initial_sigs" type="submit" value="Validate Signatures"/>
<span id="validate_initial_sigs_status" style="display:none;"></span>
</div>
</div>
<hr/>
<!--##########################-->
<!--## Step 4: Challenges ##-->
<!--##########################-->
<h2>Step 4: Verify Ownership<span id="step4_pending"> (waiting...)</span></h2>
<div id="step4" style="display:none;">
<div>
Let's Encrypt requires you prove you own the domains you have in your CSR. You
can do this by serving a specific file at a specific url under your domains.
Below are the files you need to serve along with some copy-and-paste commands
you can run on your website to start serving the file. Once you are serving
the file on your website, click "I'm now running this on...". After that, you
need to tell Let's Encrypt to check the above files to verify ownership of your
domains. This request needs to be signed with your account private key. Below
are the verification requests that you will need to sign. The commands to do
this are generated below so you can copy-and-paste them into your terminal.
<i>Be sure to change the account private key location so it points to your real
private key.</i>
</div>
<div id="challenge_domains">
</div>
<div id="challenge_template" style="display:none;">
<h3>Domain: <span class="domain">foobar.com</span></h3>
<div class="field">
<label class="howto_sign_label help">(how do I do this?)</label>
<input class="howto_sign help-checkbox" type="checkbox"/>
<div class="help-content">
How to generate the needed signatures:<br/>
<ol>
<li>
Navigate in the terminal to the directory with account private
key ("account.key" or whatever you named it).
</li>
<li>
Copy and paste each command below into your terminal (if your
account private key isn't named "account.key", change "account.key"
in the command to whatever you named it).
</li>
<li>
Copy and paste the hex encoded signature output from the command
into the text field below that command.
</li>
</ol>
</div>
<label>Run this signature command in your terminal:</label><br/>
<span class="step4_commands">
</span>
</div>
<div class="field tabs">
<input type="radio" checked/>
<label>Option 1 - python server</label>
<input type="radio">
<label>Option 2 - file-based</label>
<br/>
<div class="tab">
<label class="howto_serve_label help">(how do I do this?)</label>
<input class="howto_serve help-checkbox" type="checkbox"/>
<div class="help-content">
How to serve the challenge response on your domain:<br/>
<ol>
<li>
SSH into your domain as someone with sudo permissions:<br/>
<code class="ssh">ssh [email protected]</code>
</li>
<li>
Stop any webserver running on port 80, if any. If you had previously
been running another python command, you can kill it with Ctrl+C):<br/>
<code>sudo service nginx stop</code> <-- example for nginx<br/>
<code>sudo apachectl -k graceful-stop</code> <-- example for apache
</li>
<li>
Copy and paste the python command below into your terminal. This
command starts a temporary webserver that serves nothing but the
challenge response. You only need to keep this running briefly.
</li>
<li>
Open the link in a new window to make sure it's working:<br/>
<a target="_blank"></a>
</li>
<li>
Click "I'm now running this command..." button when the file is being
served on your domain.
</li>
</ol>
</div>
<label>Run this command on <span class="domain">foobar.com</span>'s server:</label><br/>
<textarea readonly></textarea>
<div>
<input type="submit" value="I'm now running this command on foobar.com"/>
<span style="display:none;"></span>
</div>
</div>
<div class="tab">
<label class="howto_file_label help">(how do I do this?)</label>
<input class="howto_file help-checkbox" type="checkbox"/>
<div class="help-content">
How to host this file on your server:<br/>
<ol>
<li>
SSH into your domain as someone with write access to
your static web directory:<br/>
<pre class="ssh">ssh [email protected]</pre>
</li>
<li>
Create the ".well-known/acme-challenge/" directory
in your webserver's static file path:<br/>
<pre class="wwwdir">mkdir -p /path/to/www/.well-known/acme-challenge/</pre>
</li>
<li>
Add the static folder to your webserver's config
(if you haven't already):<br/>
<pre class="nginx_location">server {...</pre>
</li>
<li>
Create the file with the necessary contents:<br/>
<pre class="file_cmd">echo ...</pre>
</li>
<li>
Open the link in a new window to make sure it's working:<br/>
<a target="_blank"></a>
</li>
<li>
Click "I'm now serving this file..." button when the file is being
served on your domain.
</li>
</ol>
</div>
<label>Under this url:</label><br/>
<input type="text" class="file_url" value="" readonly/>
<div>
<label>Serve this content:</label>
<input type="text" class="file_data" value="" readonly/>
</div>
<div>
<input type="submit" class="file_submit" value="I'm now serving this file on foobar.com"/>
<span style="display:none;"></span>
</div>
</div>
</div>
</div>
</div>
<hr/>
<!--#################################-->
<!--## Step 5: Issue Certificate ##-->
<!--#################################-->
<h2>Step 5: Install Certificate (<span id="step5_pending">waiting...</span>)</h2>
<div id="step5" style="display:none;">
<div>
Congratulations! Let's Encrypt has issued you a certificate for your domains!
Below is the signed certificate you can use for your website.
</div>
<div class="field">
<label for="howto_install" class="help">(how do I install this?)</label>
<input id="howto_install" type="checkbox" class="help-checkbox"/>
<div class="help-content">
Nginx installation instructions:<br/>
<ol>
<li>
Copy and paste both the below domain certificate and the below
intermediate certificate into the same text file called "chained.pem".
</li>
<li>
If not done already, generate non-default dhparams.<br/>
<code>openssl dhparam -out dhparam.pem 4096</code>
</li>
<li>
Copy "chained.pem" and "dhparam.pem" to /etc/ssl/certs/.<br/>
<pre>
scp chained.pem [email protected]:/etc/ssl/certs/chained.pem
scp dhparam.pem [email protected]:/etc/ssl/certs/dhparam.pem
</pre>
</li>
<li>
Copy "domain.key" /etc/ssl/private/.<br/>
<code>scp domain.key [email protected]:/etc/ssl/private/domain.key</code><br/>
</li>
<li>
Update your webserver config to use https (examples below).<br/>
<pre>
server {
listen 443;
server_name foo.com;
ssl on;
ssl_certificate /etc/ssl/certs/chained.pem;
ssl_certificate_key /etc/ssl/private/domain.key;
ssl_session_timeout 5m;
ssl_protocols TLSv1 TLSv1.1 TLSv1.2;
ssl_ciphers ECDHE-RSA-AES256-GCM-SHA384:ECDHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA256:ECDHE-RSA-AES256-SHA:ECDHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA;
ssl_session_cache shared:SSL:50m;
ssl_dhparam /etc/ssl/certs/dhparam.pem;
ssl_prefer_server_ciphers on;
location / {
return 200 'Hello world!';
add_header Content-Type text/plain;
}
}
</pre>
</li>
</ol>
Apache installation instructions:<br/>
<ol>
<li>
Copy and paste the below domain certificate into file "domain.crt".
</li>
<li>
Copy and paste the below intermediate certificate into file "intermediate.pem".
</li>
<li>
Copy "domain.crt" and "intermediate.pem" to /etc/ssl/certs/.<br/>
<pre>
scp domain.crt [email protected]:/etc/ssl/certs/domain.crt
scp intermediate.pem [email protected]:/etc/ssl/certs/intermediate.pem
</pre>
</li>
<li>
Copy "domain.key" /etc/ssl/private/.<br/>
<code>scp domain.key [email protected]:/etc/ssl/private/domain.key</code><br/>
</li>
<li>
Update your webserver config to use https (examples below).<br/>
<pre>
<VirtualHost _default_:443>
ServerName foo.com:443
ServerAlias www.foo.com
DocumentRoot /var/www/foo.com/html
SSLEngine on
SSLCertificateFile /etc/ssl/certs/domain.crt
SSLCertificateKeyFile /etc/ssl/private/domain.key
SSLCertificateChainFile /etc/ssl/certs/intermediate.pem
SSLProtocol all -SSLv2 -SSLv3
SSLCipherSuite ECDHE-RSA-AES256-GCM-SHA384:ECDHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA256:ECDHE-RSA-AES256-SHA:ECDHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA;
SSLHonorCipherOrder on
<Directory /var/www/foo.com/html>
Options Indexes FollowSymLinks MultiViews
AllowOverride All
Order allow,deny
allow from all
</Directory>
</VirtualHost>
</pre>
</li>
</ol>
</div>
<label for="csr">Signed Certificate:</label><br/>
<textarea id="crt" readonly></textarea>
</div>
<div class="field">
<label for="csr">Intermediate Certificate:</label><br/>
<textarea readonly>
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
</textarea>
</div>
<div class="field">
<form action="https://www.ssllabs.com/ssltest/analyze.html" target="_blank">
<input id="ssltest_domain" type="hidden" name="d" value="foobar.com">
<input type="submit" value="Test my install"/>
</form>
</div>
</div>
<hr/>
<div class="footer">
This website is static, so it can be saved and loaded locally. Just right-click and "Save Page As.."!<br/>
Released under MIT license | Source code: <a href="https://github.com/diafygi/gethttpsforfree" target="_blank">https://github.com/diafygi/gethttpsforfree</a>
</div>
<script src="js/index.js"></script>
</body>
</html>