Difference between revisions of "How to use EPrints with HTTPS"

From EPrints Documentation
Jump to: navigation, search
(Fixed files wrong way round for SSLCertificateFile and SSLCertificateKeyFile and added SSL config options that will score A on Qualsys SSL checker.)
(7 intermediate revisions by the same user not shown)
Line 5: Line 5:
 
'''This guide is intended for EPrints 3.2 or later.'''
 
'''This guide is intended for EPrints 3.2 or later.'''
  
 +
'''N.B.''' Setting up your Apache Web server is beyond the scope of this document.  Please see your operating system documentation and the Apache documentation for assistance in setting up Apache in your environment.'''
  
'''N.B. Setting up your Apache Web server is beyond the scope of this document.  Please see your operating system documentation and the Apache documentation for assistance in setting up Apache in your environment.'''
 
  
 +
== Configuration ==
 +
''' It is assumed that EPrints is installed in the directory <tt>/opt/eprints3/</tt>.  If EPrints is installed elsewhere on your server please substitute as appropriate.'''
  
== Configuration ==
+
To start setting up your existing archive to work under HTTPS, you must first edit <tt>/opt/eprints3/archives/[repoid]/cfg/cfg.d/10_core.pl</tt>. Initially it will probably look something like the configuration directly below,  which is the basic 10_core.pl configuration file after you have run <tt>/opt/eprints3/bin/epadmin create</tt> to setup your archive.  Alternatively you could run <tt>/opt/eprints3/bin/epadmin config_core [repoid]</tt> that will prompt you for the following information. It is suggested that you make a backup of the 10_core.pl file regardless before proceeding.
To start setting up your existing archive to work under HTTPS, you must first edit <tt>archives/[repoid]/cfg/cfg.d/10_core.pl</tt>. Initially it will probably look something like the following which is the basic 10_core.pl configuration file after you have run <tt>bin/epadmin create</tt> to setup your archive.  Alternatively you could run <tt>bin/epadmin config_core [repoid]</tt> that will prompt you for the following information. It is suggested that you make a backup of the 10_core.pl file regardless before proceeding.
 
  
 
  $c->{host} = 'your.dnshostname.org';
 
  $c->{host} = 'your.dnshostname.org';
 
  $c->{port} = 80;
 
  $c->{port} = 80;
 
  $c->{aliases} = [];
 
  $c->{aliases} = [];
  $c->{securehost} = '';
+
  $c->{securehost} = &#39;&#39;;
 
  $c->{secureport} = 443;
 
  $c->{secureport} = 443;
 
  $c->{http_root} = undef;
 
  $c->{http_root} = undef;
Line 24: Line 25:
 
  $c->{port} = 80;
 
  $c->{port} = 80;
 
  $c->{aliases} = [];
 
  $c->{aliases} = [];
  $c->{securehost} = 'your.dnshostname.org';
+
  $c->{securehost} = $c->{host};
 
  $c->{secureport} = 443;
 
  $c->{secureport} = 443;
 
  $c->{http_root} = undef;
 
  $c->{http_root} = undef;
  
Now, you need to create the directory <tt>archives/[repoid]/ssl/</tt> and then edit the file <tt>archives/[repoid]/ssl/securevhost.conf</tt>.  This file should look something like:
+
Now, you need to create the directory <tt>/opt/eprints3/archives/[repoid]/ssl/</tt> and then edit the file <tt>/opt/eprints3/archives/[repoid]/ssl/securevhost.conf</tt>.  This file should look something like:
  
 
  <VirtualHost *:443>
 
  <VirtualHost *:443>
 
   
 
   
 
   ServerName your.dnshostname.org:443
 
   ServerName your.dnshostname.org:443
 
  Header always set Strict-Transport-Security "max-age=63072000;"
 
 
   
 
   
 
   ErrorLog logs/ssl_error_log
 
   ErrorLog logs/ssl_error_log
Line 41: Line 40:
 
   
 
   
 
   SSLEngine on
 
   SSLEngine on
   SSLProtocol all -SSLv2
+
   SSLProtocol all -SSLv2 -SSLv3
   SSLCipherSuite ALL:!ADH:!EXPORT:!SSLv2:RC4+RSA:+HIGH:+MEDIUM:+LOW
+
  SSLHonorCipherOrder on
 +
   SSLCipherSuite HIGH:!aNULL:!eNULL:!kECDH:!aDH:!RC4:!3DES:!CAMELLIA:!MD5:!PSK:!SRP:!KRB5:@STRENGTH
 
   
 
   
   SSLCertificateFile cert.pem
+
   SSLCertificateFile /opt/eprints3/archives/[repoid]/ssl/your.dnshostname.org.crt
   SSLCertificateKeyFile privkey.pem
+
   SSLCertificateKeyFile /opt/eprints3/archives/[repoid]/ssl/your.dnshostname.org.key
   SSLCertificateChainFile chain.pem
+
   SSLCertificateChainFile /opt/eprints3/archives/[repoid]/ssl/your.dnshostname.org.ca-bundle
 
   
 
   
 
   SetEnvIf User-Agent ".*MSIE.*" \
 
   SetEnvIf User-Agent ".*MSIE.*" \
Line 60: Line 60:
 
   
 
   
 
  </VirtualHost>
 
  </VirtualHost>
 +
 +
It is advised that you keep the SSL key, certificate and chain files in the same directory as securevhost.conf, as this will make it easy if you need to migrate you EPrints repository to a new server in the future.
  
 
== Generate the Apache Configuration File for HTTPS ==
 
== Generate the Apache Configuration File for HTTPS ==
Run <tt>bin/generate_apacheconf</tt> to generate the secure Apache configuration files and depending upon the version of EPrints you are using, it may copy the default template <tt>archives/[repoid]/cfg/lang/en/templates/default.xml</tt> to the template used for HTTPS <tt>archives/[repoid]/cfg/lang/en/templates/secure.xml</tt>.  This will also setup the repository configuration file located in the <tt>/opt/eprints3/cfg/apache_ssl/</tt> directory named [repoid].conf.
+
Run <tt>/opt/eprints3/bin/generate_apacheconf --system --replace</tt> to generate the secure Apache configuration files.  Depending upon the version of EPrints you are using, it may copy the default template <tt>/opt/eprints3/archives/[repoid]/cfg/lang/en/templates/default.xml</tt> to the template used for HTTPS <tt>/opt/eprints3/archives/[repoid]/cfg/lang/en/templates/secure.xml</tt>.  This will also setup the repository configuration file located in the <tt>/opt/eprints3/cfg/apache_ssl/</tt> directory named [repoid].conf. (N.B. EPrints 3.3 and later now uses default.xml template for both HTTP and HTTPS).
  
  
 
== Add the Main Apache Config File to SSL Config ==
 
== Add the Main Apache Config File to SSL Config ==
Depending upon the version of EPrints you are running there are a couple files that may be involved.  It is recommended to run <tt>bin/generate_apacheconf --man</tt> or view the source of <tt>bin/generate_apacheconf</tt> file to understand what file(s) need to be setup.  In general you will need to place a line like either of the following inside your Apache SSL Virtual Host declaration (most likely found in <tt>/etc/httpd/conf.d/mod_ssl.conf</tt> or <tt>/etc/httpd/conf.d/ssl.conf</tt>).  Make sure that these lines are placed inside the <VirtualHost> Apache directive.
+
Depending upon the version of EPrints you are running there are a couple files that may be involved.  It is recommended to run <tt>/opt/eprints3/bin/generate_apacheconf --man</tt> or view the source of <tt>/opt/eprints3/bin/generate_apacheconf</tt> file to understand what file(s) need to be setup.  In general you will need to place a line like either of the following inside your Apache SSL Virtual Host declaration (most likely found in <tt>/etc/httpd/conf.d/mod_ssl.conf</tt> or <tt>/etc/httpd/conf.d/ssl.conf</tt>).  Make sure that these lines are placed inside the <VirtualHost> Apache directive.
  
 
  Include /opt/eprints3/archives/[repoid]/var/auto-secure.conf
 
  Include /opt/eprints3/archives/[repoid]/var/auto-secure.conf
Line 75: Line 77:
  
 
=== For Red Hat/Fedora/CentOS Linux ===
 
=== For Red Hat/Fedora/CentOS Linux ===
 +
Add then add the appropriate Include line above, to the end of <tt>/etc/httpd/conf.d/ssl.conf</tt>
  
 
=== For Debian/Ubuntu Linux ===
 
=== For Debian/Ubuntu Linux ===
 +
Make sure the SSL Apache module is enabled, by running the following (as root):
 +
/usr/sbin/a2enmod ssl
 +
Add then add the appropriate <tt>Include</tt> line above, just before the <tt>&lt;/IfModule&gt;</tt> line in <tt>/etc/apache2/mods-enabled/ssl.conf</tt>
  
  
 
== Restart Apache to pick up the changes to the Apache configuration ==
 
== Restart Apache to pick up the changes to the Apache configuration ==
 
Consult your operating system documentation on how to restart service processes but in general you need to run one of the following commands either as <tt>root</tt> or using <tt>sudo</tt>:
 
Consult your operating system documentation on how to restart service processes but in general you need to run one of the following commands either as <tt>root</tt> or using <tt>sudo</tt>:
# /sbin/service httpd restart
 
  
  # /etc/init.d/apache2 restart
+
=== For Red Hat/Fedora/CentOS Linux ===
 +
  /sbin/service httpd restart
  
 +
=== For Debian/Ubuntu Linux ===
 +
/etc/init.d/apache2 restart
  
 
== Confirmation ==
 
== Confirmation ==
Open your web browser and access your repository via its URL, this should be done over HTTP.  When you click to login you should notice that you will be redirected to an HTTPS connection.  Note that in general most tasks that require you to login are now redirected to an HTTPS connection otherwise an HTTP request will be used.   
+
Open your web browser and access your repository via its URL, this should be done over HTTP.  When you click to login you should notice that you will be redirected to an HTTPS connection.  N.B. Any tasks that require you to be logged in will be redirected to an HTTPS connection otherwise an HTTP request will be used by default.   
 +
 
 +
EPrints default HTTPS configuration is usually sufficient for most institutions needs, as there is no real need to encrypt the requesting and sending of Open Access research.  However, if you wish to only ever use HTTPS, then follow the instructions for [[HTTPS-only and HSTS]].  HSTS (HTTP Strict Transport Security) ensures that even if the link you click on is for HTTP, your web browser will convert this to HTTPS before making the request.  Meaning you will never send any un-encrypted traffic to EPrints.  It also helps reduce the load on your repository's server, as it save it having to do the HTTP to HTTPS redirection. 
 +
 
 +
It is generally a good idea to enable HSTS even on repositories with default HTTPS configuration, in case there are any errant bespoke links that could send private information using HTTP.  This can be done by adding the following line to <tt>/opt/eprints3/archives/[repoid]/ssl/securevhost.conf</tt> after the <tt>ServerName<//tt> line and then restarting Apache again:
  
It is also possible to configure EPrints so that it uses [[HTTPS-only and HSTS]].
+
Header set Strict-Transport-Security "max-age=15780000"

Revision as of 15:30, 20 November 2017

Manual Sections

This guide is intended for EPrints 3.2 or later.

N.B. Setting up your Apache Web server is beyond the scope of this document. Please see your operating system documentation and the Apache documentation for assistance in setting up Apache in your environment.


Configuration

It is assumed that EPrints is installed in the directory /opt/eprints3/. If EPrints is installed elsewhere on your server please substitute as appropriate.

To start setting up your existing archive to work under HTTPS, you must first edit /opt/eprints3/archives/[repoid]/cfg/cfg.d/10_core.pl. Initially it will probably look something like the configuration directly below, which is the basic 10_core.pl configuration file after you have run /opt/eprints3/bin/epadmin create to setup your archive. Alternatively you could run /opt/eprints3/bin/epadmin config_core [repoid] that will prompt you for the following information. It is suggested that you make a backup of the 10_core.pl file regardless before proceeding.

$c->{host} = 'your.dnshostname.org';
$c->{port} = 80;
$c->{aliases} = [];
$c->{securehost} = '';
$c->{secureport} = 443;
$c->{http_root} = undef;

Update the file to define the secure host and modify ports as needed. If your Apache web server is not using the standard ports (80,443) you can adjust the 'port' and 'secureport' parameters in the config file accordingly.

$c->{host} = 'your.dnshostname.org';
$c->{port} = 80;
$c->{aliases} = [];
$c->{securehost} = $c->{host};
$c->{secureport} = 443;
$c->{http_root} = undef;

Now, you need to create the directory /opt/eprints3/archives/[repoid]/ssl/ and then edit the file /opt/eprints3/archives/[repoid]/ssl/securevhost.conf. This file should look something like:

<VirtualHost *:443>

  ServerName your.dnshostname.org:443

  ErrorLog logs/ssl_error_log
  TransferLog logs/ssl_access_log
  LogLevel warn

  SSLEngine on
  SSLProtocol all -SSLv2 -SSLv3
  SSLHonorCipherOrder on
  SSLCipherSuite HIGH:!aNULL:!eNULL:!kECDH:!aDH:!RC4:!3DES:!CAMELLIA:!MD5:!PSK:!SRP:!KRB5:@STRENGTH

  SSLCertificateFile /opt/eprints3/archives/[repoid]/ssl/your.dnshostname.org.crt
  SSLCertificateKeyFile /opt/eprints3/archives/[repoid]/ssl/your.dnshostname.org.key
  SSLCertificateChainFile /opt/eprints3/archives/[repoid]/ssl/your.dnshostname.org.ca-bundle

  SetEnvIf User-Agent ".*MSIE.*" \
    nokeepalive ssl-unclean-shutdown \
    downgrade-1.0 force-response-1.0

  CustomLog logs/ssl_request_log \
    "%t %h %{SSL_PROTOCOL}x %{SSL_CIPHER}x \"%r\" %b"

  Include /opt/eprints3/cfg/apache_ssl/[repoid].conf

  PerlTransHandler +EPrints::Apache::Rewrite

</VirtualHost>

It is advised that you keep the SSL key, certificate and chain files in the same directory as securevhost.conf, as this will make it easy if you need to migrate you EPrints repository to a new server in the future.

Generate the Apache Configuration File for HTTPS

Run /opt/eprints3/bin/generate_apacheconf --system --replace to generate the secure Apache configuration files. Depending upon the version of EPrints you are using, it may copy the default template /opt/eprints3/archives/[repoid]/cfg/lang/en/templates/default.xml to the template used for HTTPS /opt/eprints3/archives/[repoid]/cfg/lang/en/templates/secure.xml. This will also setup the repository configuration file located in the /opt/eprints3/cfg/apache_ssl/ directory named [repoid].conf. (N.B. EPrints 3.3 and later now uses default.xml template for both HTTP and HTTPS).


Add the Main Apache Config File to SSL Config

Depending upon the version of EPrints you are running there are a couple files that may be involved. It is recommended to run /opt/eprints3/bin/generate_apacheconf --man or view the source of /opt/eprints3/bin/generate_apacheconf file to understand what file(s) need to be setup. In general you will need to place a line like either of the following inside your Apache SSL Virtual Host declaration (most likely found in /etc/httpd/conf.d/mod_ssl.conf or /etc/httpd/conf.d/ssl.conf). Make sure that these lines are placed inside the <VirtualHost> Apache directive.

Include /opt/eprints3/archives/[repoid]/var/auto-secure.conf

Or

Include /opt/eprints3/cfg/apache_ssl.conf

For Red Hat/Fedora/CentOS Linux

Add then add the appropriate Include line above, to the end of /etc/httpd/conf.d/ssl.conf

For Debian/Ubuntu Linux

Make sure the SSL Apache module is enabled, by running the following (as root):

/usr/sbin/a2enmod ssl

Add then add the appropriate Include line above, just before the </IfModule> line in /etc/apache2/mods-enabled/ssl.conf


Restart Apache to pick up the changes to the Apache configuration

Consult your operating system documentation on how to restart service processes but in general you need to run one of the following commands either as root or using sudo:

For Red Hat/Fedora/CentOS Linux

/sbin/service httpd restart

For Debian/Ubuntu Linux

/etc/init.d/apache2 restart

Confirmation

Open your web browser and access your repository via its URL, this should be done over HTTP. When you click to login you should notice that you will be redirected to an HTTPS connection. N.B. Any tasks that require you to be logged in will be redirected to an HTTPS connection otherwise an HTTP request will be used by default.

EPrints default HTTPS configuration is usually sufficient for most institutions needs, as there is no real need to encrypt the requesting and sending of Open Access research. However, if you wish to only ever use HTTPS, then follow the instructions for HTTPS-only and HSTS. HSTS (HTTP Strict Transport Security) ensures that even if the link you click on is for HTTP, your web browser will convert this to HTTPS before making the request. Meaning you will never send any un-encrypted traffic to EPrints. It also helps reduce the load on your repository's server, as it save it having to do the HTTP to HTTPS redirection.

It is generally a good idea to enable HSTS even on repositories with default HTTPS configuration, in case there are any errant bespoke links that could send private information using HTTP. This can be done by adding the following line to /opt/eprints3/archives/[repoid]/ssl/securevhost.conf after the ServerName<//tt> line and then restarting Apache again:

Header set Strict-Transport-Security "max-age=15780000"