-
Notifications
You must be signed in to change notification settings - Fork 58
/
0115.html
123 lines (114 loc) · 5.54 KB
/
0115.html
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
<!DOCTYPE html>
<html lang="en" xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Enabling SSL for Pi-Hole Admin Interface (lighttpd)</title>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8">
<meta charset="UTF-8">
<meta name="keywords" content="Raspberry Pi OS,Raspbian,Pi-Hole,PiHole,DNS,Ad Blocker,Browser Based,Home Lab,Home Lab Ideas,Web Based Tools,Ad Blocking,FOSS,DNS Ad Blocking,Free Software,HTTPS,Web Administration,System Administration,Web Server Administration,SSL,Certificate,PKI,LigHTTPd,Network Wide Ad Blocking,Open Source,How To,Tutorial,i12bretro">
<meta name="author" content="i12bretro">
<meta name="description" content="Enabling SSL for Pi-Hole Admin Interface (lighttpd)">
<meta name="viewport" content="width=device-width, initial-scale=1.0">
<meta name="revised" content="10/24/2022 10:06:19 AM" />
<link rel="icon" type="image/x-icon" href="includes/favicon.ico">
<script type="text/javascript" src="https://code.jquery.com/jquery-3.5.1.min.js"></script>
<script type="text/javascript" src="includes/js/steps.js"></script>
<link href="css/steps.css" rel="stylesheet" type="text/css" />
</head>
<body>
<div id="gridContainer">
<div class="topMargin"></div>
<div id="listName" class="topMargin">
<h1>Enabling SSL for Pi-Hole Admin Interface (lighttpd)</h1>
</div>
<div></div>
<div id="content">
<p>This video is outdated after I found updating Pi-hole will overwrite the SSL config. The new video showing updated steps can be found at: <a href="https://youtu.be/yUdmBGe9wYA" target="_blank">https://youtu.be/yUdmBGe9wYA</a></p>
<h2>Prerequisites</h2>
<ul>
<li class="noCheckbox">A XCA PKI database <a href="https://youtu.be/ezzj3x207lQ" target="_blank">https://youtu.be/ezzj3x207lQ</a></li>
</ul>
<h2>Create Your SSL Certificate</h2>
<ol>
<li>Launch XCA</li>
<li>Open the PKI database if it is not already (File > Open DataBase), enter password</li>
<li>Click on the Certificates tab, right click on your Intermediate CA certificate</li>
<li>Select New</li>
<li>On the Source tab, make sure Use this Certificate for signing is selected</li>
<li>Verify your Intermediate CA certificate is selected from the drop down</li>
<li>Click the Subject tab</li>
<li>Complete the Distinguished Name section
<p>internalName: Pi-Hole SSL<br />
countryName: US<br />
stateOrProvinceName: Virginia<br />
localityName: Northern<br />
organizationName: i12bretro<br />
organizationUnitName: i12bretro Certificate Authority<br />
commonName: pihole.i12bretro.local</p>
</li>
<li>Click the Generate a New Key button</li>
<li>Enter a name and set the key size to at least 2048</li>
<li>Click Create</li>
<li>Click on the Extensions tab</li>
<li>Select End Entity from the type list</li>
<li>Click Edit next to Subject Alternative Name</li>
<li>Add any DNS or IP addresses that the certificate will identify</li>
<li>Update the validity dates to fit your needs</li>
<li>Click the Key Usage tab</li>
<li>Under Key Usage select Digital Signature, Key Encipherment</li>
<li>Under Extended Key Usage select Web Server and Web Client Authentication</li>
<li>Click the Netscape tab</li>
<li>Select SSL Server</li>
<li>Click OK to create the certificate</li>
</ol>
<h2>Exporting Required Files</h2>
<ol>
<li>In XCA, click on the Certificates tab</li>
<li>Right click the Intermediate CA certificate > Export > File</li>
<li>Set the file name with a .pem extension and verify the export format is PEM chain (*.pem)</li>
<li>Click OK</li>
<li>Right click the SSL certificate > Export > File</li>
<li>Set the file name with a .pem extension and verify the export format is PEM + Key (*.pem)</li>
<li>Click OK</li>
</ol>
<h2>Applying the Certificates</h2>
<ol>
<li>Download PuTTY <a href="https://www.chiark.greenend.org.uk/~sgtatham/putty/latest.html" target="_blank">Download</a></li>
<li>Connect to the Raspberry Pi via PuTTY
<ol>
<li>If SSH is not enabled on the Raspberry Pi, enable it using Raspberry Pi Config</li>
<li>Launch PuTTY</li>
<li>Input the Raspberry Pi hostname or IP address</li>
<li>Click Connect</li>
</ol>
</li>
<li>Install xrdp to simplify administration by running the following command
<div class="codeBlock">sudo apt-get install xrdp</div>
</li>
<li>Connect to the Raspberry Pi via Remote Desktop Client</li>
<li>Copy the certificates exported above to the Pi</li>
<li>Copy the certificates exported above to /etc/lighttpd
<div class="codeBlock">cp /home/pi/Downloads/PiHole.pem /etc/lighttpd<br />
cp /home/pi/Downloads/ca-chain.pem /etc/lighttpd</div>
</li>
<li>Edit lighttpd.conf
<div class="codeBlock">mousepad</div>
</li>
<li>File > Open /etc/lighttpd/lighttpd.conf</li>
<li>Add "mod_openssl" to server.modules</li>
<li>Add the following lines
<p>server.name = "pihole.i12bretro.local"<br />
server.port = 443<br />
ssl.engine = "enable"<br />
ssl.pemfile = "PiHole.pem"<br />
ssl.ca-file = "ca-chain.pem"</p>
</li>
<li>File > Save > /home/pi/Downloads/lighttpd.conf</li>
<li>In terminal, paste the following commands
<div class="codeBlock">cp /home/pi/Downloads/lighttpd.conf /etc/lighttpd<br />
service lighttpd restart</div>
</li>
<li>Open a web browser and navigate to PiHole via https://</li>
</ol> </div>
</div>
</body>
</html>