Google has made SSL certificates a necessity for websites. Discover the different types and how to choose the best one for you with these SSL certificate tips.Continue reading
It’s time for our second monthly edition of the Plesk quiz. Here to challenge your knowledge and see how you stack up against your peers. But mostly, to check if we’re doing alright in making sure you get the most of what we can offer. So today, we’ll be testing how much you know about Plesk Onyx Security.
Plesk Onyx Security Features and Tools
How well can you manage security of your Plesk server and protect it from common types of attacks? Maybe you know that we have an entire Security section inside our extension catalog for you to use. Including Let’s Encrypt to issue free SSL certificates and protect connections to your sites, Plesk interface, and mail server.
Plus, we’ve got robust in-built tools in order to enhance Plesk panel security. Like Web Application Firewall (ModSecurity), which protects sites and web applications from attacks. And Fail2Ban for brute-force protection via IP address banning. Are you on top of it all? Then get ready to test your Plesk Onyx Security basics and more.
Plesk Onyx Security Quiz
Boom – 14 questions below, just for you. Select your answers to get your score (and no cheating!).
How did you do?
Finally, how was it? Got the score you thought you would? Did you get close but aren’t quite there yet? Let us know in the comments below or on Twitter or Facebook. You’ll see how your peers found the challenge.
Think you can do better yet? Fortunately, there’s a free Plesk University course, dedicated to learning more about Plesk Onyx Security. There may be something you’re missing.
First, hit the button below to get the course. Then complete it for a certificate. Are you new to Plesk University? Then sign up first in a couple of clicks and hit “Get this Course”.
The web is an endless battleground. The good guys are always trying to keep the bad guys from hacking, ransoming, and conning their way into our online lives. Our best weapon? Encryption. The web works on trust, and thanks to encryption, HTTPS provides exactly that. But if a website is going to use it, it first needs to get free ssl certificate from a Certificate Authority (CA). Such as Let’s Encrypt.
Let’s Encrypt – What is it?
Let’s Encrypt will only issue the file if you can exhibit control over your domain. And you can do that by using a software client that uses ACME (Automatic Certificate Management Environment) protocol. Having the free SSL certificate means your communications get end-to-end encryption.
So, when files pass between your web server and its users, they become unreadable to anyone who intercepts them. And moreover, nobody can tamper with them.
The Electronic Frontier Foundation developed Certbot, which has now become the best known and most widely used ACME client on the block. Certbot verifies the domain’s ownership, fetches certificates, and takes care of TLS/SSL configuration on web servers using Nginx and Apache.
What does a Certificate Authority do?
Certificate Authorities (CAs) vouch for the authenticity of a TLS/SSL certificate when they validate them using cryptography. Operating systems and browsers use a directory of trusted CAs to make sure that site certificates are bona fide.
This kind of authentication was something we had to pay for in the past. But now, Let’s Encrypt has broken tradition to offer automated creation of each free SSL certificate for the end user. The whole thing runs with funding from sponsors and donors.
How Let’s Encrypt does its thing
The ACME protocol that Let’s Encrypt uses talks about how clients interact with its servers when asking for certificates and confirming domain ownership. Some point soon, it’ll be recognized as an official IETF standard.
Let’s Encrypt for HTTPS
Let’s Encrypt provides domain-validated free SSL certificates. This means that after a request for a free https certificate, Let’s Encrypt makes sure that it’s from someone who is truly in charge of that domain. It sends the client a one-of-a-kind token that it uses to create a key. The domain owner then needs to provide this via Web or DNS.
Let’s Encrypt for HTTP
In the case of HTTP, the process is a bit different. The client manufactures the key using the unique token and also an account token. Then the result goes in a file that the web server makes available. And the Let’s Encrypt servers get the file from this address. If the key matches, the client has established domain control, and they get a free SSL certificate.
The ACME protocol can outline a number of tests that a client can use to verify ownership of a domain. For HTTPS that approach resembles that for HTTP, but the client creates a certificate that is self-signed that includes the key. The DNS challenge searches a DNS TXT record for the key.
Let’s Encrypt Certbot Client
Certbot is by far the most widely used Let’s Encrypt client. It bundles up most main Linux distributions and is able to automatically configure for both Apache and Nginx. After it finishes installing, you can get free ssl certificate and update your Apache configuration as below.
sudo certbot –apache -d www.example.com
Certbot will ask some questions, run a challenge, download certificates, update your Apache configuration, and reload the server.
After this, when you browse to https://www.example.com you will see a green lock which confirms both a valid certificate and an encrypted connection.
Each Let’s Encrypt free ssl certificate lasts for only 90 days, so you need to make sure that you set it to renew automatically.
This command will take care of renewing all a machine’s certificates: sudo certbot renew
If you type this command into a crontab so it runs every day, your certificates will always be renewed 30 days before expiration is due. And Certbot will reload the server after a successful renewal. So long as the initial creation of the certificate includes the –apache or –NGINX options.
More Let’s Encrypt-ACME Clients you should know of
The ACME protocol is open in nature and its documentation is very comprehensive, which has encouraged many other clients to develop.
Certbot is one of the few clients to offer automatic web server configuration, but the others do provide features that may be of interest.
- If you want to avoid Python and other Certbot dependencies, (perhaps because you want to create certificates in a constrained environment) you can pick one in languages like Go, and Node.js.
- Some clients are able to run without root privileges. Which is good. Because we consider running the smallest amount of privileged code good practice.
- Lots of clients are able to produce the DNS-based challenge automatically. They do this using the API of your DNS provider to create the relevant TXT record. This challenge also allows for harder to handle cases like encryption of web servers that are only accessible privately.
- You will find some clients integrated into web servers, reverse proxies, or load balancers. This makes configuration and deployment a breeze.
Lots of other clients can be used, and lots of other servers and services automate TLS/SSL setup thanks to Let’s Encrypt support.
How to make and update Let’s Encrypt free SSL certificates with Plesk
Plesk has a plugin that lets you handle Let’s Encrypt free SSL certificates.
To work with a Let’s Encrypt SSL certificate the domain name must work in a web browser, regardless of whether or not it has any content. The process only works for a valid domain.
Here is how to get a Let’s Encrypt free SSL certificate for your domain:
- Log in to Plesk.
- On the (left) sidebar, click Websites & Domains
- Click on the Let’s Encrypt symbol to pull up the Let’s Encrypt SSL Certificate page.
- Type a valid e-mail address in the box.
- Select the “Include www.(example.com)” as an alternate domain name check box. So that the SSL certificate protects your domain with and without the www prefix.
5.1. Failure to check the box will mean that the certificate only relates to example.com. If you select the checkbox, it will be valid for www as well.
5.2. Click Install. When installation finishes successfully you will get a confirmation message.
5.3. If it doesn’t work, check that the domain name is valid. Also, check that the domain is:
- spelled right
- has proper DNS records
- accessible in the web
When you create or add a domain to the server, be sure to add the relevant DNS records (with, an A record pointing to the server IP address as a minimum), and allow adequate time for the DNS changes to be disseminated.
6. In the left sidebar, click on Websites and Domains
7. Click Hosting Settings.
8. Under Security, select the SSL support check box, and the Let’s Encrypt SSL certificate in the Certificate list box.
Plesk renews Let’s Encrypt certificates automatically
So you don’t need to do anything. Let’s Encrypt free SSL certificates are valid for 90 days by default. But Plesk renews certificates every month automatically, which is what the Let’s Encrypt developers recommend.
Doing this sooner enhances your site’s security, and it’s clear to you and the visitors to your site. Also, this gives you extra time to find a solution if a renewal doesn’t go through for whatever reason.
Manually renewing an SSL certificate in Plesk
You can also manually renew a certificate if you:
- Log in to Plesk.
- In the left sidebar, click Websites & Domains
- Click the Let’s Encrypt icon and select “Renew”.