Unterschiede

Hier werden die Unterschiede zwischen zwei Versionen gezeigt.

Link zu dieser Vergleichsansicht

tux:install_owncloud [2014/06/04 10:08]
wikisysop [SSL für die Webseite bereitstellen]
tux:install_owncloud [2014/08/05 13:43] (aktuell)
wikisysop [SSL für die Webseite bereitstellen]
Zeile 25: Zeile 25:
   * **Entpacken:​** <​xterm>/​home/​cloud.pronto.de#​ <fc #​008000>​tar -xvjf owncloud-6.0.3.tar.bz2</​fc></​xterm>​   * **Entpacken:​** <​xterm>/​home/​cloud.pronto.de#​ <fc #​008000>​tar -xvjf owncloud-6.0.3.tar.bz2</​fc></​xterm>​
   * **Rechte anpassen:** <​xterm>/​home/​cloud.pronto.de#​ <fc #​008000>​chown -R www-data:​www-data owncloud/</​fc></​xterm>​   * **Rechte anpassen:** <​xterm>/​home/​cloud.pronto.de#​ <fc #​008000>​chown -R www-data:​www-data owncloud/</​fc></​xterm>​
-Passen Sie danach ggf das >><​fc #​008000>​DocumentRoot</​fc><<​ Verzeichnis in der vhost-Konfigurationsdatei entsprechend an. Im og Fall wäre das >><​fc #​008000>/​home/​cloud.pronto.de/​owncloud</​fc><<​+Passen Sie danach ggf das >><​fc #​008000>​DocumentRoot</​fc><<​ Verzeichnis in der [[:​tux:​apache_vhost|vhost-Konfigurationsdatei]] entsprechend an. Im og Fall wäre das >><​fc #​008000>/​home/​cloud.pronto.de/​owncloud</​fc><<​
  
 ==== Installation abschließen ==== ==== Installation abschließen ====
Zeile 103: Zeile 103:
 <​xterm>#​ <fc #​008000>​cat /​etc/​apache2/​sites-available/​default-ssl <​nowiki>>></​nowiki>​ /​etc/​apache2/​sites-available/​cloud.pronto.de</​fc></​xterm>​ <​xterm>#​ <fc #​008000>​cat /​etc/​apache2/​sites-available/​default-ssl <​nowiki>>></​nowiki>​ /​etc/​apache2/​sites-available/​cloud.pronto.de</​fc></​xterm>​
  
-Entfernen Sie  +Im Wesentlichen ​kann der einleitende und abschließende >><​fc #​008000><​IfModule mod_ssl.c></​fc><<​ entfernt ​werden (damit prüft Apache nicht ob das Modul >><​fc #​008000>​ssl</​fc><<​ geladen ist) und die folgenden Parameter Ihren Anforderungen entsprechend angepasst werden:
- +
-Im Wesentlichen ​muss der einleitende und abschließende >><​fc #​008000><​IfModule mod_ssl.c></​fc><<​ entfernt und die folgenden ​vier Parameter Ihren Anforderungen entsprechend angepasst werden:+
  
 <code xorg_conf|/​etc/​apache2/​sites-available/​cloud.pronto.de><​VirtualHost 192.168.167.241:​443>​ <code xorg_conf|/​etc/​apache2/​sites-available/​cloud.pronto.de><​VirtualHost 192.168.167.241:​443>​
 ServerName cloud.kastner.de ServerName cloud.kastner.de
 +DocumentRoot /​home/​cloud.pronto.de/​owncloud/​
 SSLCertificateFile ​   /​etc/​ssl/​cloud.cer SSLCertificateFile ​   /​etc/​ssl/​cloud.cer
-SSLCertificateKeyFile /​etc/​ssl/​cloud.key</​code>​+SSLCertificateKeyFile /​etc/​ssl/​cloud.key 
 +ErrorLog ${APACHE_LOG_DIR}/​ssl_cloud.pronto.de-error.log 
 +CustomLog ${APACHE_LOG_DIR}/​ssl_cloud.pronto.de-error.log combined</​code>​
  
-Die gesamte Konfigurationsdatei ​schaut dann entsprechen wie folgt aus:+Die gesamte Konfigurationsdatei ​finden Sie als PDF verlinkt(({{:tux:​vhost_conf_cloud_example.pdf|/​etc/​apache2/​sites-available/​cloud.pronto.de}}))
  
-<code xorg_conf|/​etc/​apache2/​sites-available/​cloud.pronto.de><​VirtualHost 192.168.167.241:80> +Starten Sie abschließend Ihren Webserver neu:
- ​ServerName cloud.pronto.de +
- ​ServerAlias +
- ​DocumentRoot /​home/​cloud.pronto.de/​owncloud/​ +
- ​ServerAdmin prontos@email.de +
- ​CustomLog /​var/​log/​apache2/​cloud.pronto.de-access.log combined +
- ​ErrorLog /​var/​log/​apache2/​cloud.pronto.de-error.log +
- ​LogLevel warn +
-</​VirtualHost>​+
  
 +<​xterm>#​ <fc #​008000>​service apache2 restart</​fc></​xterm>​
  
-<​VirtualHost 192.168.167.241:​443>​ +Anschließend sollte Ihre Cloud auch über HTTPS erreichbar seinlediglich noch mit der oben bereits erwähnten Zertifikatswarnung:
- ServerAdmin webmaster@localhost +
-        ServerName cloud.kastner.de +
- +
- DocumentRoot /​home/​cloud.pronto.de/​owncloud/​ +
- <​Directory /> +
- Options FollowSymLinks +
- AllowOverride None +
- </​Directory>​ +
- <​Directory /​var/​www/>​ +
- Options Indexes FollowSymLinks MultiViews +
- AllowOverride None +
- Order allow,deny +
- allow from all +
- </​Directory>​ +
- +
- ScriptAlias /cgi-bin/ /​usr/​lib/​cgi-bin/​ +
- <​Directory "/​usr/​lib/​cgi-bin">​ +
- AllowOverride None +
- Options +ExecCGI -MultiViews +SymLinksIfOwnerMatch +
- Order allow,​deny +
- Allow from all +
- </​Directory>​ +
- +
- ErrorLog ${APACHE_LOG_DIR}/​ssl_cloud.pronto.de-error.log +
- +
- # Possible values includedebug, info, notice, warn, error, crit, +
- # alert, emerg. +
- LogLevel warn +
- +
- CustomLog ${APACHE_LOG_DIR}/​ssl_cloud.pronto.de-error.log combined +
- +
- #   SSL Engine Switch: +
- #   ​Enable/​Disable SSL for this virtual host. +
- SSLEngine on +
- +
- #   A self-signed (snakeoil) certificate can be created by installing +
- #   the ssl-cert package. See +
- #   /​usr/​share/​doc/​apache2.2-common/​README.Debian.gz for more info. +
- #   If both key and certificate are stored in the same file, only the +
- #   ​SSLCertificateFile directive is needed. +
- SSLCertificateFile ​   /​etc/​ssl/​cloud.pronto.de.cer +
- SSLCertificateKeyFile /​etc/​ssl/​cloud.key +
- +
- #   ​Server Certificate Chain: +
- #   Point SSLCertificateChainFile at a file containing the +
- #   ​concatenation of PEM encoded CA certificates which form the +
- #   ​certificate chain for the server certificate. Alternatively +
- #   the referenced file can be the same as SSLCertificateFile +
- #   when the CA certificates are directly appended to the server +
- #   ​certificate for convinience. +
- #​SSLCertificateChainFile /​etc/​apache2/​ssl.crt/​server-ca.crt +
- +
- #   ​Certificate Authority (CA): +
- #   Set the CA certificate verification path where to find CA +
- #   ​certificates for client authentication or alternatively one +
- #   huge file containing all of them (file must be PEM encoded) +
- #   Note: Inside SSLCACertificatePath you need hash symlinks +
- #         to point to the certificate files. Use the provided +
- #         ​Makefile to update the hash symlinks after changes. +
- #​SSLCACertificatePath /​etc/​ssl/​certs/​ +
- #​SSLCACertificateFile /​etc/​apache2/​ssl.crt/​ca-bundle.crt +
- +
- #   ​Certificate Revocation Lists (CRL): +
- #   Set the CA revocation path where to find CA CRLs for client +
- #   ​authentication or alternatively one huge file containing all +
- #   of them (file must be PEM encoded) +
- #   Note: Inside SSLCARevocationPath you need hash symlinks +
- #         to point to the certificate files. Use the provided +
- #         ​Makefile to update the hash symlinks after changes. +
- #​SSLCARevocationPath /​etc/​apache2/​ssl.crl/​ +
- #​SSLCARevocationFile /​etc/​apache2/​ssl.crl/​ca-bundle.crl +
- +
- #   ​Client Authentication (Type): +
- #   ​Client certificate verification type and depth. ​ Types are +
- #   none, optional, require and optional_no_ca. ​ Depth is a +
- #   ​number which specifies how deeply to verify the certificate +
- #   ​issuer chain before deciding the certificate is not valid. +
- #​SSLVerifyClient require +
- #​SSLVerifyDepth ​ 10 +
- +
- #   ​Access Control: +
- #   With SSLRequire you can do per-directory access control based +
- #   on arbitrary complex boolean expressions containing server +
- #   ​variable checks and other lookup directives. ​ The syntax is a +
- #   ​mixture between C and Perl.  See the mod_ssl documentation +
- #   for more details. +
- #<​Location /> +
- #​SSLRequire (    %{SSL_CIPHER} !~ m/​^(EXP|NULL)/​ \ +
- #            and %{SSL_CLIENT_S_DN_O} eq "Snake Oil, Ltd." \ +
- #            and %{SSL_CLIENT_S_DN_OU} in {"​Staff",​ "​CA",​ "​Dev"​} \ +
- #            and %{TIME_WDAY} >= 1 and %{TIME_WDAY} <= 5 \ +
- #            and %{TIME_HOUR} >= 8 and %{TIME_HOUR} <= 20       ) \ +
- #           or %{REMOTE_ADDR} =~ m/​^192\.76\.162\.[0-9]+$/​ +
- #</​Location>​ +
- +
- #   SSL Engine Options: +
- #   Set various options for the SSL engine. +
- #   o FakeBasicAuth:​ +
- #     ​Translate the client X.509 into a Basic Authorisation. ​ This means that +
- #     the standard Auth/​DBMAuth methods can be used for access control. ​ The +
- #     user name is the `one line' version of the client'​s X.509 certificate. +
- #     Note that no password is obtained from the user. Every entry in the user +
- #     file needs this password: `xxj31ZMTZzkVA'​. +
- #   o ExportCertData:​ +
- #     This exports two additional environment variables: SSL_CLIENT_CERT and +
- #     ​SSL_SERVER_CERT. These contain the PEM-encoded certificates of the +
- #     ​server (always existing) and the client (only existing when client +
- #     ​authentication is used). This can be used to import the certificates +
- #     into CGI scripts. +
- #   o StdEnvVars:​ +
- #     This exports the standard SSL/TLS related `SSL_*'​ environment variables. +
- #     Per default this exportation is switched off for performance reasons, +
- #     ​because the extraction step is an expensive operation and is usually +
- #     ​useless for serving static content. So one usually enables the +
- #     ​exportation for CGI and SSI requests only. +
- #   o StrictRequire:​ +
- #     This denies access when "​SSLRequireSSL"​ or "​SSLRequire"​ applied even +
- #     under a "​Satisfy any" situation, i.e. when it applies access is denied +
- #     and no other module can change it. +
- #   o OptRenegotiate:​ +
- #     This enables optimized SSL connection renegotiation handling when SSL +
- #     ​directives are used in per-directory context. +
- #​SSLOptions +FakeBasicAuth +ExportCertData +StrictRequire +
- <​FilesMatch "​\.(cgi|shtml|phtml|php)$">​ +
- SSLOptions +StdEnvVars +
- </​FilesMatch>​ +
- <​Directory /​usr/​lib/​cgi-bin>​ +
- SSLOptions +StdEnvVars +
- </​Directory>​ +
- +
- #   SSL Protocol Adjustments:​ +
- #   The safe and default but still SSL/TLS standard compliant shutdown +
- #   ​approach is that mod_ssl sends the close notify alert but doesn'​t wait for +
- #   the close notify alert from client. When you need a different shutdown +
- #   ​approach you can use one of the following variables:​ +
- #   o ssl-unclean-shutdown:​ +
- #     This forces an unclean shutdown when the connection is closed, i.e. no +
- #     SSL close notify alert is send or allowed to received. ​ This violates +
- #     the SSL/TLS standard but is needed for some brain-dead browsers. Use +
- #     this when you receive I/O errors because of the standard approach where +
- #     ​mod_ssl sends the close notify alert. +
- #   o ssl-accurate-shutdown:​ +
- #     This forces an accurate shutdown when the connection is closed, i.e. a +
- #     SSL close notify alert is send and mod_ssl waits for the close notify +
- #     alert of the client. This is 100% SSL/TLS standard compliant, but in +
- #     ​practice often causes hanging connections with brain-dead browsers. Use +
- #     this only for browsers where you know that their SSL implementation +
- #     works correctly. +
- #   ​Notice:​ Most problems of broken clients are also related to the HTTP +
- #   ​keep-alive facility, so you usually additionally want to disable +
- #   ​keep-alive for those clients, too. Use variable "​nokeepalive"​ for this. +
- #   ​Similarly,​ one has to force some clients to use HTTP/1.0 to workaround +
- #   their broken HTTP/1.1 implementation. Use variables "​downgrade-1.0"​ and +
- #   "​force-response-1.0"​ for this. +
- BrowserMatch "MSIE [2-6]" \ +
- nokeepalive ssl-unclean-shutdown \ +
- downgrade-1.0 force-response-1.0 +
- # MSIE 7 and newer should be able to use keepalive +
- BrowserMatch "MSIE [17-9]"​ ssl-unclean-shutdown+
  
-</​VirtualHost></​code>​+{{ :​tux:​oc_4.png?​500 |}}
  
  --- //​[[pronto@kastner.de|WikiSysop]] 2014/06/02 13:52//  --- //​[[pronto@kastner.de|WikiSysop]] 2014/06/02 13:52//
 +{{keywords>​ownCloud SSL Linux install config}}
tux/install_owncloud.1401869295.txt.gz (8830 views) · Zuletzt geändert: 2014/06/04 10:08 von wikisysop
CC Attribution-Share Alike 3.0 Unported
www.chimeric.de Valid CSS Driven by DokuWiki do yourself a favour and use a real browser - get firefox!! Recent changes RSS feed Valid XHTML 1.0