![]() Table of Contents
|
HTTPS HTTPS is an encrypted version of HTTP implemented through the SSL, Secure Socket Layer, standard. The encrypted secure connection is created by running an ordinary HTTP connection on top of an encrypted SSL connection. Except for this, HTTPS is like HTTP. You will need either the version of Challenger with strong 128/168-bit or the version with weak 40-bit encryption to run HTTPS.
Creating a HTTPS Port
| ||
![]() |
It is not possible to run HTTPS IP-less. This is because the
certificate contains the name of the web site and the certificate is
used before the server gets a chance to see the host header of the
HTTP protocol.
Certificates
This is done through certificates. A certificate is digitally signed by a Certificate Authority, and contains information about the web server. The browser can check that the information and the digital signature are correct, as long as it knows about the Certificate Authority that has issued the certificate. In order to get a real certificate, you must first create a certificate signing request and then send that request to a Certificate Authority, who will then check that you are whom you claim to be, and then give you a certificate that they have digitally signed. It is also possible to create your own self-signed certificates. This goes against the whole idea of certificates, since they donät really provide any added security. Therefore browsers will show a warning dialog when they encounter a web site with a self-signed certificate. But the self-signed certificate might do until you get a real certificate.
Generating an RSA Key Pair
| ||
![]() |
You should consider running your secure web server on a machine with
few users and high security, to make it hard for others to get hold of
the private key. If you want many users to be able to modify the web
site, it is advisable to consider running an extra, separate server
for doing the HTTPS part. That server could then use the HTTP
Relay module to relay requests to the normal web server.
You can generate an RSA key pair with the Security/Generate a new RSA key pair... action. You should keep on to the key pair since you will need it later, after you get your signed certificate. | ||
![]() Requesting and generating certificates. | |||
Creating a Certificate Signing Request
Creating a Self-Signed Certificate
Demo Certificate
|