Version of up.time affected | \nAffected Platforms | \n
All | \nAll | \n
Configuring SSL
\nTo configure SSL browsing in the up.time web interface, you must generate a server certificate, which identifies that server is using SSL for security, and perform some platform-specific configuration. The following steps will cover this process.
\n \n-
\n
- Generate or obtain a server certificate. \n
- Create a passphrase file. \n
- Move the files to the up.time directory. \n
- uptime_ssl_server.key \n
- uptime_ssl_server.crt \n
- passphrase.cmd \n
- Update httpd.conf. \n
- Update uptime.conf. \n
- Restart the services. \n
You can purchase a recognized certificate from a vendor such as Verisign or Thawte.
\n \nAlternately, you can generate your own non-recognized certificate. A non-recognized certificate is one that does not come from a certificate-issuing authority. To generate a non-recognized certificate, download and install the OpenSSL software. OpenSSL binaries for Windows can be obtained from Shining Light Productions.
\n \nOnce OpenSSL is installed, enter the following commands (changing <openssl_dir> to the proper path for the OpenSSL installation directory) at the command line to generate the certificate key. The example uses 1024 bit encryption; if required, you can increase to your preferred value:
\n \ncd <openssl_dir>/bin \nopenssl genrsa -des3 -out uptime_ssl_server.key 1024 \nopenssl req -new -key uptime_ssl_server.key -out uptime_ssl_server.csr \nopenssl x509 -req -days 365 -in uptime_ssl_server.csr -signkey \n uptime_ssl_server.key -out uptime_ssl_server.crt\n \n \n
Create a passphrase file containing your SSL server password specified in the previous step. The up.time Web Server will require the password each time it restarts but a passphrase file will automate the request, so user intervention is not necessary.
\n \nWindows:
\nOpen notepad and enter the following line where <your_SSL_server_password> is the password for your generated certificate keys.
@echo <your_SSL_server_password>
\nSave the file as passphrase.cmd.
\n \nLinux:
\nOpen vim and enter the following lines; <your_SSL_server_password> is the password for your generated certificate keys.
#!/bin/bash
\n
\n
echo "<your_SSL_server_password>"
Save the file as passphrase.cmd.
\nMake the file executable.
\nchmod +x passphrase.cmd\n \n \n \n
Copy the following files to the <uptime_dir>/apache/conf directory where <uptime_dir> is the installation directory of up.time (the default installation directory is C:\Program Files\uptime software\uptime on Windows and /usr/local/uptime on Linux).
\n \n-
\n
The following changes to the web server configuration file (httpd.conf) will allow it to use SSL.
\nOpen <uptime_dir>/apache/conf/httpd.conf for editing. Where <uptime_dir> appears below, change it to reflect the directory where you have up.time installed (ex. c:/Program Files/uptime software/uptime). All path slashes in httpd.conf need to be forward slashes (rather than the usual backslash that is used in Windows).
\n \nTo make browsing to the up.time UI easy for users, have it listen on the default up.time UI port, 9999, as well as the typical HTTP and HTTPS ports, 80 and 443.
\n
Above the line "Listen 9999", add the following two lines:
Listen 80
\n
Listen 443
To handle requests on each of these ports, 80, 443, and 9999, and redirect (actually rewrite) them properly, we will leverage the mod_rewrite.so module, so we need to enable it.
\nOn Windows installations, uncomment the following two lines in httpd.conf.
\nLoadModule rewrite_module modules/mod_rewrite.so
\nLoadModule ssl_module/mod_ssl.so
\n \nOn Linux installations, the mod_rewrite.so module is not bundled with up.time, so it is necessary to download and copy the mod_rewrite.so file from the bottom of this article to the <uptime_dir>/apache/modules directory. Then, in httpd.conf, add the following line after "# LoadModule foo_module modules/mod_foo.so". If issues are experienced with the version of mod_rewrite.so attached, try creating a symlink to the mod_rewrite.so file provided by the Linux distribution instead.
\nLoadModule rewrite_module modules/mod_rewrite.so
\n \nFinally, the last part is to add entries in httpd.conf that will rewrite the requests as HTTPS. At the bottom of the httpd.conf file, add these lines, changing <uptime_dir> to the directory of your up.time installation:
\nSSLMutex default
\n
SSLPassPhraseDialog "exec:<uptime_dir>/apache/conf/passphrase.cmd"
\n
SSLSessionCache none
\n
\n
<VirtualHost *:80>
\n
RewriteEngine on
\n
RewriteCond %{SERVER_PORT} !^443$
\n
RewriteRule ^/(.*) https://%{SERVER_NAME}/$1 [NC,R,L]
\n
</VirtualHost>
\n
\n
<VirtualHost *:443>
\n
SSLEngine on
\n
DocumentRoot "<uptime_dir>/GUI"
\n
SSLCertificateFile "<uptime_dir>/apache/conf/uptime_ssl_server.crt"
\n
SSLCertificateKeyFile "<uptime_dir>/apache/conf/uptime_ssl_server.key"\t
\n
</VirtualHost>
\n
\n
<VirtualHost *:9999>
\n
RewriteEngine on
\n
RewriteCond %{SERVER_PORT} !^443$
\n
RewriteRule ^/(.*) https://%{SERVER_NAME}/$1 [NC,R,L]
\n
</VirtualHost>
Open the <uptime_dir>/uptime.conf file for editing and change the httpContext parameter (which begins with "httpContext=http://") to relfect the use of SSL:
\nhttpContext=https://<Server_Hostname>:9999
\n \n \nFor the changes to take effect, restart the up.time Data Collector and up.time Web Server on Windows or uptime_core and uptime_httpd on Linux.
\n \nWindows:
\n
Restart the up.time Data Collector" service.
\n
Restart the "up.time Web Server" service.
Linux:
\nservice uptime_core restart \nservice uptime_httpd restart\n