Let's Encrypt & NginxState of the art secure web deployment

 

Not long ago SSL encryption was still considered just a nice-to-have feature, and major services secured only log-in pages of their applications.

Things have changed, and for the better: encryption is now considered a must-have, and enforced by most players. Search giant Google even takes SSL implementation into account in search results ranking.

Despite the larger reach of SSL, setting up your own secure web service is still considered daunting, time consuming, and error-prone.

A recent player in the field, Let’s Encrypt promises to make SSL certificates more widely available and to radically simplify the workflow of maintaining a website’s security.

Combined with the powerful Nginx web server, and with some additional hardening tips, you can use it to achieve top notch security grades, rating A on the popular Qualys SSL and securityheaders.io analysers.

In this article, we walk through the steps needed to achieve this.

What you will do

Here are the steps you will go through:

  • Spawn a cloud instance which will host our demo website.
  • Do some basic hardening of our server and set up Nginx.
  • Install a brand new Let’s encrypt certificate and set up its automatic renewal
  • Harden the Nginx configuration
  • Harden the Security Headers
  • Get that shiny A+ security rating you are looking for

This tutorial will use Exoscale as cloud provider since they offer integrated firewall and DNS management. On top of that Exoscale has a strong focus on data safety / privacy and security. Of course you can follow along using any other cloud or traditional hosting service.

UPDATE 1: This post has been updated on 2016-06-03 to reflect Let’s encrypt evolution (out of beta, new Certbot client), and now deployed on the new Ubuntu 16.04 LTS instead of 14.04. The changes can be tracked here

Let’s Encrypt overview

Let’s Encrypt is a new open source certificate authority (CA) providing free and automated SSL/TLS certificates. Their root certificate is well trusted by most browsers, and they are actively trying to reduce the painful workflow of creation - validation - signing - installation - renewal of certificates.

A word of warning before moving on, there are still a few caveats to take into account when considering Let’s encrypt and it’s Certbot client:

  • It requires root privileges.
  • The client does not yet “officially” support Nginx (but it works flawlessly).
  • It requires a few dependencies (ex. Python).
  • Throttling is enforced so you cannot request more than 5 certificates per week for a given domain.
  • Certificate is valid for 90 days.

It’s possible to get a certificate using other alternate lightweight and less intrusive clients however this tutorial won’t cover them.

The official documentation can be found here, and of course is worth reading.

Infrastructure setup

Let’s begin by spawning a new cloud instance. First of all you’ll need a public SSH key at hand. If you don’t have your own key, or want a quick setup, Exoscale lets you generate one on the fly before starting your machine. Go under the SSH Keys menu and create your key. They have a guideline if this stuff is new for you. This tutorial will assume you know what an SSH key is and how to use it.

On the Exoscale portal (or the cloud provider of your choice), start a Linux Ubuntu 16.04. For this demo a micro instance (512mb RAM, 1 Vcpu & 10GB disk) will be more than enough. Choose your SSH key on creation and verify that the “default” Security Group is checked (more on that later).

Within a few seconds our instance is available and ready for use. You can now note down its IP address in order to proceed with the DNS setup.

Our instance detailed view

Exoscale is providing DNS zone hosting, so you don’t need to leave the interface. Just go under DNS and create a new zone (“letsecure.me” in this example, you’ll need to use your own domain here).

DNS zone creation

Now you may add a “A” record with the value of the IP address of our freshly spawned instance, as well as a “catch all” (wildcard) CNAME record:

DNS record creation

You’re done with DNS records. If you are following the tutorial on Exoscale don’t forget to update the nameservers of your domain with the ones here below. You should be able to do so within your domain registrar administration console.

  • ns1.exoscale.com
  • ns1.exoscale.ch
  • ns1.exoscale.net
  • ns1.exoscale.io

Basic security hardening of your server

You are now ready to work on our cloud instance, but before beginning to play with certificates and web services, we’re going to apply a few elementary security best practices:

On the firewall side you need to allow only the required traffic and deny any other transit. Specifically we’ll need to add the rules below:

  • 22 (SSH)
  • 80 (HTTP)
  • 443 (HTTPS)
  • ICMP ping (not mandatory but convenient)

On Exoscale firewalls are managed through the interface with what is called Security Groups. By default all incoming traffic is denied and all outgoing traffic is allowed. In the detail of your machine you should see it has been registered in the “default” Security Group. You need to modify the “default” group with the mentioned rules. On other cloud providers you may have a similar system or you may have to install your own firewall software. A good and simple choice on Ubuntu would be UFW.

Firewall rules

Another recommended step to harden your machine is to administer it via SSH and keypairs authentication only. Most cloud providers give you this option nowadays. You should already have your key deployed on Exoscale if you’ve followed along, but if you didn’t or if your cloud provider doesn’t offer you a similar workflow, it’s time to upload your key. This tutorial won’t go into details about that, and assumes you are familiar with this.

You can now login via SSH using the ubuntu user.

ssh ubuntu@yourdomain.here

Now, if you’re using SSH key authentication, and only if so, you may disable SSH password authentication:

sudo sed -i 's|PasswordAuthentication yes|PasswordAuthentication no|g' /etc/ssh/sshd_config
sudo service ssh restart

If you’re using UFW, add the rules below:

sudo ufw allow out 22/tcp
sudo ufw allow out 80/tcp
sudo ufw allow out 443/tcp

The next thing to do is to apply all the software updates and patches and reboot the instance:

sudo apt-get update && sudo apt-get dist-upgrade -y && sudo reboot

This will ensure all software is up to date, including recent bug fixes and security patches. On top of that wouldn’t it be nice if the system could keep-up with the latest patches? You can do so by enabling the automatic security updates:

sudo dpkg-reconfigure --priority=low unattended-upgrades

In this way, whenever an important security update is released the system will update itself keeping everything secure.

It’s good practice to install fail2ban in order to prevent brute force SSH attacks (specifically if you’re using password authentication):

sudo apt-get install -y fail2ban

Basic Nginx Setup

Now that everything is secured you may take care of Nginx. We’re going to install the package from the Ubuntu repository:

sudo apt-get install -y nginx

Create the target folder from where our website will be served:

sudo mkdir /var/www/
# download our demo website
wget https://github.com/llambiel/letsecureme/releases/download/1.0.0/demo.tar.gz
sudo tar zxf demo.tar.gz -C /var/www
sudo chown -R root:www-data /var/www/

Remove the default Nginx configuration and start with a fresh blank file:

sudo rm /etc/nginx/sites-enabled/default
sudo touch /etc/nginx/sites-enabled/default.conf

Certbot client will need to create some temporary files required to authenticate the domain for which we’re requesting the certificate. To allow this you need to adjust the Nginx configuration block in /etc/nginx/sites-enabled/default.conf with the following:

server {
    listen 80;
    server_name default_server;
    root /var/www/demo;
}

Reload Nginx to apply our configuration change and we’re done with Nginx for the time being.

sudo nginx -t && sudo nginx -s reload

Let’s Encrypt setup, SSL certificates and Nginx HTTPS config

Go for Let’s Encrypt. As per the official documentation, Certbot (Let’s Encrypt client) can be installed using APT:

sudo apt-get -y install letsencrypt

Note that as said in the beginning, the client requires a few dependencies.

You can now request a certificate for your domain. You’ll get prompted to provide your email address for the expiring notifications and accept the Terms:

export DOMAINS="yourdomain.here,www.yourdomain.here"
export DIR=/var/www/demo
sudo letsencrypt certonly -a webroot --webroot-path=$DIR -d $DOMAINS

You need of course to use your own domain name in the DOMAINS list.

Our cert should now be issued and installed!

IMPORTANT NOTES:
- If you lose your account credentials, you can recover through
  e-mails sent to xxx@xxx.xx.
- Congratulations! Your certificate and chain have been saved at
  /etc/letsencrypt/live/letsecure.me/fullchain.pem. Your cert will
  expire on 201X-XX-XX. To obtain a new version of the certificate in
  the future, simply run Let's Encrypt again.
- Your account credentials have been saved in your Let's Encrypt
  configuration directory at /etc/letsencrypt. You should make a
  secure backup of this folder now. This configuration directory will
  also contain certificates and private keys obtained by Let's
  Encrypt so making regular backups of this folder is ideal.
- If you like Let's Encrypt, please consider supporting our work by:

Donating to ISRG / Let's Encrypt:   https://letsencrypt.org/donate
Donating to EFF:                    https://eff.org/donate-le 

Certbot keeps configuration and certificates organized under /etc/letsencrypt. The Certbot documentation will give you detailed information about the structure and the content of the directory.

To use your new certificate you need to instruct Nginx to serve it and bind the port 443 on ssl. You may use the following minimal configuration block in /etc/nginx/sites-enabled/default.conf.

server {
    listen 443 ssl;
    server_name yourdomain.here www.yourdomain.here;
    root /var/www/demo;
    ssl_certificate /etc/letsencrypt/live/yourdomain.here/fullchain.pem;
    ssl_certificate_key /etc/letsencrypt/live/yourdomain.here/privkey.pem;
}

Let’s reload Nginx one more time:

sudo nginx -t &&  sudo nginx -s reload

Now point your web browser to https://yourdomain.here
Your website homepage should now be served over HTTPS. \o/

As previously mentioned, Let’s encrypt delivers certificates that are valid 90 days only. To ensure that our certificate gets renewed automatically we’re going to use a small script and a crontab.

Save the following in a file called renewCerts.sh.

#!/bin/sh
# This script renews all the Let's Encrypt certificates with a validity < 30 days

if ! letsencrypt renew > /var/log/letsencrypt/renew.log 2>&1 ; then
    echo Automated renewal failed:
    cat /var/log/letsencrypt/renew.log
    exit 1
fi
/usr/sbin/nginx -t && /usr/sbin/nginx -s reload

A daily cron will trigger our script. To set up the crontab open it…

sudo crontab -e

…and add a line with the @daily macro:

@daily /path/to/renewCerts.sh

Save and quit your editor. Don’t forget to set the script executable using:

chmod +x /path/to/renewCerts.sh

Congratulations! You can now serve your content through HTTPS with a valid certificate which renews itself automatically.

Still, if you check your grade using the default SSL/TLS configuration on SSL analyser, the result is not really good. Let’s pimp our Nginx config a bit to improve our rating!

Nginx SSL/TLS hardening

Remove the actual config in /etc/nginx/sites-enabled/default.conf and replace it by the block below. Remember to modify the block with your own domain name:

server {
    listen 80;
    listen 443 ssl http2;
    server_name yourdomain.here www.yourdomain.here;
    ssl_protocols TLSv1.2;
    ssl_ciphers EECDH+AES128:RSA+AES128:EECDH+AES256:RSA+AES256:EECDH+3DES:RSA+3DES:!MD5;
    ssl_prefer_server_ciphers On;
    ssl_certificate /etc/letsencrypt/live/yourdomain.here/fullchain.pem;
    ssl_certificate_key /etc/letsencrypt/live/yourdomain.here/privkey.pem;
    ssl_trusted_certificate /etc/letsencrypt/live/yourdomain.here/chain.pem;
    ssl_session_cache shared:SSL:128m;
    add_header Strict-Transport-Security "max-age=31557600; includeSubDomains";
    ssl_stapling on;
    ssl_stapling_verify on;
    # Your favorite resolver may be used instead of the Google one below
    resolver 8.8.8.8;
    root /var/www/demo;
    index index.html;

    location '/.well-known/acme-challenge' {
        root        /var/www/demo;
    }

    location / {
        if ($scheme = http) {
            return 301 https://$server_name$request_uri;
        }
    }
}

When done, reload Nginx:

sudo nginx -t && sudo nginx -s reload

Detail of the SSL/TLS configuration

Let’s review some important config items that we’ve just added:

listen 443 ssl http2;

With this directive, you tell Nginx to listen over SSL and also support the connection over the new HTTP/2 standard, if the client browser support / request it. Please note that HTTP/2 is SSL/TLS only!

ssl_protocols TLSv1.2;

Disable old and weak SSLv2/SSLv3 & early TLS protocols, and allow only the TLSv1.2. Such configuration will prevent older clients to connect to your website (ex. IE10 and older, Android 4.3 and older, Java6 & 7). So depending on your website target audience, you may choose to keep older TLS protocols using the configuration below.

ssl_protocols TLSv1 TLSv1.1 TLSv1.2;

You may take into account that the old and weak TLSv1.0 will be end of life on 30 June 2018 for PCI. You can found the browser support list here

ssl_ciphers EECDH+AES128:RSA+AES128:EECDH+AES256:RSA+AES256:EECDH+3DES:RSA+3DES:!MD5;
ssl_prefer_server_ciphers On;

This is the cipher list you tell Nginx to support. This list is in my opinion one of the most well balanced between security and support by older web browsers. Nginx will prefer those ciphers over the ones requested by the client.

ssl_trusted_certificate /etc/letsencrypt/live/yourdomain.here/chain.pem;
ssl_stapling on;
ssl_stapling_verify on;

Enable OCSP stapling, which is well described in details here.

add_header Strict-Transport-Security "max-age=31557600; includeSubDomains";

This adds an HTTP header instructing the client browser to force a HTTPS connection to your domain and to all of its subdomains for 1 year.
Warning! Be careful here before applying it in production, you must ensure first that all your subdomains (if any) are being secured as well. Your subdomains will be forced over https as well, and if not properly configured, will become unreachable.

Let’s re-test again our setup with Qualys SSL:

Qualys SSL final check

Hey, this looks much better now ! Our setup is now secured using an optimal SSL/TLS configuration, our first objective is achieved.

Security headers hardening

Now, what about the content / behavior of our website? Scott Helme created a great HTTP response headers analyser to assess the security grade of our content based on headers.

If you test your current setup (ensure to test using HTTPS!) the result is, well… not so good:

securityheaders.io first check

Again, let’s tune our Nginx configuration a bit by adding a few HTTP headers:

add_header X-Content-Type-Options "nosniff" always;

The X-Content-Type-Options header stops a browser from trying to MIME-sniff the content type and forces it to stick with the declared content-type.

add_header X-Frame-Options "SAMEORIGIN" always;

The X-Frame-Options header tells the browser whether you want to allow your site to be framed or not. By preventing a browser from framing your site you can defend against attacks like clickjacking.

add_header X-Xss-Protection "1";

The X-Xss-Protection header sets the configuration for the cross-site scripting filter built into most browsers.

add_header Content-Security-Policy "default-src 'self'";

The Content-Security-Policy header defines approved sources of content that the browser may load. It can be an effective countermeasure to Cross Site Scripting (XSS) attacks. WARNING! This header must be carefully planned before deploying it on production website as it could easily break stuff and prevent a website to load it’s content! Fortunately there is a “report mode” available. In the mode, the browser will only report any issue in the debug console but not actually block the content. This is really helpful to ensure a smooth deployment of this header:

report mode

The configuration of this policy is well described here

The report mode can be enabled using:

Content-Security-Policy-Report-Only instead of Content-Security-Policy

Final secured Nginx configuration

Your final Nginx configuration should look like this:

server {
     listen 80;
     listen 443 ssl http2;
     server_name yourdomain.here www.yourdomain.here;
     ssl_protocols TLSv1.2;
     ssl_ciphers EECDH+AES128:RSA+AES128:EECDH+AES256:RSA+AES256:EECDH+3DES:RSA+3DES:!MD5;
     ssl_prefer_server_ciphers On;
     ssl_certificate /etc/letsencrypt/live/yourdomain.here/fullchain.pem;
     ssl_certificate_key /etc/letsencrypt/live/yourdomain.here/privkey.pem;
     ssl_trusted_certificate /etc/letsencrypt/live/yourdomain.here/chain.pem;
     ssl_session_cache shared:SSL:128m;
     add_header Strict-Transport-Security "max-age=31557600; includeSubDomains";
     add_header X-Frame-Options "SAMEORIGIN" always;
     add_header X-Content-Type-Options "nosniff" always;
     add_header X-Xss-Protection "1";
     add_header Content-Security-Policy "default-src 'self'; script-src 'self' *.google-analytics.com";
     ssl_stapling on;
     ssl_stapling_verify on;
     # Your favorite resolver may be used instead of the Google one below
     resolver 8.8.8.8;
     root /var/www/demo;
     index index.html;

     location '/.well-known/acme-challenge' {
        root        /var/www/demo;
      }

     location / {
              if ($scheme = http) {
                return 301 https://$server_name$request_uri;
              }
     }
}

Let’s reload Nginx one more time to apply our new headers:

sudo nginx -t && sudo nginx -s reload

And scan again our site using securityheaders.io(again, remember to scan it with the https:// prefix):

securityheaders.io final check

You should have got an “A” grade, which sounds much better!

Some of you may have noticed that we didn’t enable HPKP (HTTP Public Key Pinning), which would have allowed us to get the A+ grade. In fact that header could really screw your website if the feature is not well understood and carefully planned. This subject may be developed in this page in the future, stay tuned.

Conclusion

There are many reasons for deploying SSL/TLS on your website. Security is, naturally, the most important and obvious one. However, it’s also a trust building marker for parts of your audience. There are no drawbacks to having an active certificate on your website. With a free certificate from Let’s Encrypt and following the steps described in this tutorial, there is absolutely no reason to hesitate.

Let’s Encrypt can be easily deployed and maintained on top of Nginx, and with Specific SSL/TLS and browser headers hardening you can achieve a modern and secure web deployment.

Source files of this project can be downloaded directly from GitHub.

This project will be expanded and kept updated to follow the future releases and improvements of Let’s Encrypt and Nginx, not to mention the future best practices of a state of the art secure web deployment.