Difference between revisions of "Using namecheap wildcard SSL certificates for HTTPS"

From Notes_Wiki
m
m
Line 18: Line 18:
# Click on link in email and enter verification code
# Click on link in email and enter verification code
# After verification you should receive zip file with ca.crt and signed certificate in email used for registration.
# After verification you should receive zip file with ca.crt and signed certificate in email used for registration.
If free SSL certificates are desired consider using [[Installing lets-encrypt SSL certificate]]





Revision as of 17:10, 17 August 2018

<yambe:breadcrumb>Apache_web_server_configuration|Apache web server configuration</yambe:breadcrumb>

Using namecheap wildcard SSL certificates for HTTPS

namecheap allows purchase of wildcard SSL certificates from comodo, etc. at very good price. Process for purchasing wildcard SSL certificate from namecheap is:

  1. Register on namecheap.com
  2. Make payment for desired certificate
  3. Click on "Hi! Username" on top-left corner and click on "SSL certificates"
  4. Click on "Activate Now" option
  5. Select server type as "apache + openssl"
  6. Generate CSR using:
    openssl req -new -newkey rsa:2048 -nodes -keyout <domain>.key -out <domain>.csr
    Enter various details. Avoid setting password, optional company name extra attriutes.
  7. Copy and paste contents of csr file on namecheap.com website
  8. Choose administrator email ID for verification
  9. Click on link in email and enter verification code
  10. After verification you should receive zip file with ca.crt and signed certificate in email used for registration.

If free SSL certificates are desired consider using Installing lets-encrypt SSL certificate


Configure apache to use wildcard certificate

To configure apache virtualhost for using wildcard certificate use:

<VirtualHost *:443>
    ServerAdmin saurabh@rekallsoftware.com
    DocumentRoot /home/example/public_html/
    ServerName www.sbarjatiya.com
    ErrorLog logs/www.sbarjatiya.com-error_log
    CustomLog logs/www.sbarjatiya.com-access_log combined
    SSLEngine on
    SSLProtocol all -SSLv2 -SSLv3
    SSLHonorCipherOrder on
    SSLCipherSuite "EECDH+ECDSA+AESGCM EECDH+aRSA+AESGCM EECDH+ECDSA+SHA384 EECDH+ECDSA+SHA256 EECDH+aRSA+SHA384 EECDH+aRSA+SHA256 EECDH+aRSA+RC4 EECDH EDH+aRSA !RC4 !aNULL !eNULL !LOW !3DES !MD5 !EXP !PSK !SRP !DSS"
    SSLCertificateFile /etc/httpd/conf/sbarjatiya_wild_cert/sbarjatiya.com.crt
    SSLCertificateKeyFile /etc/httpd/conf/sbarjatiya_wild_cert/sbarjatiya.com.key
    SSLCertificateChainFile /etc/httpd/conf/sbarjatiya_wild_cert/ca-chain.crt
</VirtualHost>

Here ca-chain.crt can be generated using certificates from zip file received in email as follows:

cat COMODORSADomainValidationSecureServerCA.crt COMODORSAAddTrustCA.crt >> ca-chain.crt