如何配置Play应用程序以使用Let的加密证书?

Jan*_*Jan 8 https playframework lets-encrypt

获得证书后,如何从中生成JKS密钥库?

如何配置Play应用程序以使用此密钥库?

还有什么我需要做的吗?

Jan*_*Jan 13

以下是获取(更新)letsencrypt证书的脚本:

#!/bin/bash

/path/to/your/app/stop # stop the play application; especially if it is running on port 80 otherwise the certificate generation will fail

rm -rf /etc/letsencrypt.bak

mv /etc/letsencrypt /etc/letsencrypt.bak

./letsencrypt-auto certonly --standalone -n -m email@example.com --agree-tos -d example.com -d www.example.com

cd /etc/letsencrypt/live/example.com

openssl pkcs12 -export -in fullchain.pem -inkey privkey.pem -out cert_and_key.p12 -CAfile chain.pem -caname root -passout pass:your_password

keytool -importkeystore -srcstorepass your_password -destkeystore keyStore.jks -srckeystore cert_and_key.p12 -srcstoretype PKCS12 -storepass your_password

/path/to/your/app/start # start the application
Run Code Online (Sandbox Code Playgroud)

您可以安排cron作业定期运行此脚本,因为letsencrypt证书目前在90天后过期.

获得证书后,您需要修改应用程序启动脚本,如下所示:

/path/to/your/app/app_name_script -Dhttps.port=443 -Dplay.server.https.keyStore.path=/etc/letsencrypt/live/example.com/keyStore.jks -Dplay.server.https.keyStore.password=your_password -Djdk.tls.ephemeralDHKeySize=2048 -Djdk.tls.rejectClientInitiatedRenegotiation=true # ... more parameters if required
Run Code Online (Sandbox Code Playgroud)

就快到了.运行应用程序时,您将获得SSL实验室的A-评级.评级下调与Forward Secrecy有关.为了理清Forward Secrecy问题(并获得完整的A评级),您需要通过实现自定义SSLEngineProvider来指定密码套件的顺序:

package controllers

import java.nio.file._
import java.security.KeyStore
import javax.net.ssl._

import play.core.ApplicationProvider
import play.server.api._

class CustomSslEngineProvider(appProvider: ApplicationProvider) extends SSLEngineProvider {

  val priorityCipherSuites = List(
    "TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA",
    "TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA",
    "TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA")


  def readPassword(): Array[Char] = System.getProperty("play.server.https.keyStore.password").toCharArray

  def readKeyInputStream(): java.io.InputStream = {
    val keyPath = FileSystems.getDefault.getPath(System.getProperty("play.server.https.keyStore.path"))
    Files.newInputStream(keyPath)
  }

  def readKeyManagers(): Array[KeyManager] = {
    val password = readPassword()
    val keyInputStream = readKeyInputStream()
    try {
      val keyStore = KeyStore.getInstance(KeyStore.getDefaultType)
      keyStore.load(keyInputStream, password)
      val kmf = KeyManagerFactory.getInstance(KeyManagerFactory.getDefaultAlgorithm)
      kmf.init(keyStore, password)

      kmf.getKeyManagers
    } finally {
      keyInputStream.close()
    }
  }

  def createSSLContext(): SSLContext = {
    val keyManagers = readKeyManagers()
    val sslContext = SSLContext.getInstance("TLS")
    sslContext.init(keyManagers, Array.empty, null)
    sslContext
  }

  override def createSSLEngine(): SSLEngine = {
    val ctx = createSSLContext()
    val sslEngine = ctx.createSSLEngine
    val cipherSuites = sslEngine.getEnabledCipherSuites.toList
    val orderedCipherSuites =
      priorityCipherSuites.filter(cipherSuites.contains) ::: cipherSuites.filterNot(priorityCipherSuites.contains)
    sslEngine.setEnabledCipherSuites(orderedCipherSuites.toArray)
    val params = sslEngine.getSSLParameters
    params.setUseCipherSuitesOrder(true)
    sslEngine.setSSLParameters(params)
    sslEngine
  }
}
Run Code Online (Sandbox Code Playgroud)

别忘了设置

play.server.https.engineProvider = controllers.CustomSslEngineProvider

在您的application.conf中.

使用Play 2.5.x测试


Low*_*ory 5

我在各种论坛中搜索,最后我想出了一个非常快速(并且几乎是自动化的)解决方案:首先,就像在他们建议的 letencrypt 网站上一样,运行这些:

sudo apt-get update
sudo apt-get install software-properties-common
sudo add-apt-repository ppa:certbot/certbot
sudo apt-get update
sudo apt-get install certbot 
Run Code Online (Sandbox Code Playgroud)

然后运行

sudo certbot certonly --standalone -d domain.name.com
Run Code Online (Sandbox Code Playgroud)

(对于通配符,它​​有点复杂,但此过程的其余部分应该是相同的)

此时它应该告诉你密钥在哪里,在像 /etc/letsencrypt/live/domain.name.com/*.pem 这样的目录中(三个密钥:fullchain、privkey 和一个链)

然后运行openssl(编辑域名和密码)

sudo openssl pkcs12 
        -export -in /etc/letsencrypt/live/domain.name.com/fullchain.pem 
        -inkey /etc/letsencrypt/live/domain.name.com/privkey.pem 
        -out cert_and_key.p12 
        -CAfile /etc/letsencrypt/live/domain.name.com/chain.pem 
        -caname root 
        -passout pass:<insert some password here>
Run Code Online (Sandbox Code Playgroud)

然后是 keytool(编辑密钥库路径和密码)

sudo keytool 
  -importkeystore 
  -srcstorepass <the password you inserted above>
  -destkeystore <path/key>.jks 
  -srckeystore cert_and_key.p12 
  -srcstoretype PKCS12 
  -storepass <the password you inserted above>
Run Code Online (Sandbox Code Playgroud)

最后你应该在你上面写的路径上找到 jks 键。

在 application.conf 中:

play.server.https.keyStore.path = "<path/key>.jks"
play.server.https.keyStore.type = "JKS"
play.server.https.keyStore.password = "<the password you inserted above>"
Run Code Online (Sandbox Code Playgroud)

在 Ubuntu 16 和 18 上使用 Play 2.6.15 进行测试