-
-
Save shripadk/552554 to your computer and use it in GitHub Desktop.
How to setup Heroku Hostname SSL with GoDaddy SSL Certificate and Zerigo DNS | |
Heroku recently added an exciting new 'Hostname SSL' option. This option offers the broad compatibility of IP-based SSL, but at 1/5 the price ($20 / month at the time of this writing). | |
The following tutorial explains how to use Heroku's new 'Hostname SSL' option on your Heroku project. Before we begin, let's list what we're using here: | |
* Heroku Hostname SSL | |
* GoDaddy Standard SSL Certificate | |
* Zerigo DNS | |
Note: I am not using the Heroku Zerigo DNS add-on, instead I have a separate Zerigo account for my DNS needs. I do this because Zerigo offers 30 hosts on free direct accounts, versus only 10 hosts on the free Heroku add-on. | |
I. Getting a GoDaddy SSL Certificate (Part I) | |
1. Purchase a GoDaddy Standard SSL Certificate | |
GoDaddy sells Standard SSL Certificates for anywhere from $12.99/year to $49.99/year. I highly recommend you do a search for 'cheap ssl' on Google and see if there are any advertisements for discounted GoDaddy Standard SSL Certificates. I was able to buy my certificate for $12.99/year this way. | |
2. After you complete your purchase, GoDaddy will give you a credit that you can trade for a certificate. Make the trade and click on 'Manage Certificate' next to your new certificate. This will bring you to a Credits control panel where we will click 'Request Certificate' next to your new certificate later on when we are ready to setup your certificate. | |
II. Creating a Certificate Signing Request (CSR) | |
Note: To create an SSL certificate, you must first generate and submit a Certificate Signing Request (CSR) to the Certification Authority (CA) (i.e. GoDaddy). The CSR contains your certificate-application information, including your public key. The CSR will also create your public/private key pair used for encrypting and decrypting secure transactions. | |
These instructions are based on my experience using a Mac OS X laptop. The following probably won't work if you are not working from a unix-based system (i.e. Mac OS X / Ubuntu Linux / etc.). | |
Steps to create a CSR: | |
1. Make a new directory to hold your project's SSL-related stuff. It doesn't really matter where you put this, but I recommend not putting it in your rails project (i.e. alongside app, config, db, etc.), as it will get included in your git repository if you do. Rather, I put it in a folder that is one level above my rails project. | |
mkdir ssl-cert | |
2. Move to your newly created folder | |
cd ssl-cert | |
3. Use OpenSSL to generate an RSA host key ('host.key') using the triple DES encryption, with a 2,048-bit key length (as required by GoDaddy). Triple DES is just DES times three, but is more secure against brute force attacks because of its longer length. | |
openssl genrsa -des3 -out host.key 2048 | |
It will ask you for a pass phrase. This should be a secret password. Don't forget the pass phrase you set, as we will need it later. | |
4. Use OpenSSL to generate a new self-signed certificate ('host.csr') using the host key we just created. This is what you'll be sending to GoDaddy to model your new SSL after. | |
openssl req -new -key host.key -out host.csr | |
You will be prompted with a bunch of questions. Answer all of them, except the last two 'extra' attributes are optional. Here are example responses: | |
Country Name (2 letter code) [AU]:US | |
State or Province Name (full name) [Some-State]:California | |
Locality Name (eg, city) []:San Francisco | |
Organization Name (eg, company) [Internet Widgits Pty Ltd]:Your Company Name | |
Organizational Unit Name (eg, section) []:secure.yourdomain.com | |
Common Name (eg, YOUR name) []:secure.yourdomain.com | |
Email Address []:[email protected] | |
Please enter the following ‘extra’ attributes | |
to be sent with your certificate request | |
A challenge password []: | |
An optional company name []: | |
It is very important you don't mistype anything here, as you can't change this information without buying a new SSL certificate. 'Organizational Unit Name' and 'Common Name' must be the hostname you are using on Heroku. I highly recommend using the 'secure.yourdomain.com' host, as you will need to set a separate CNAME DNS record to route your secure traffic. | |
III. Getting a GoDaddy's SSL Certificate (Part II) | |
1. Return to where we left off with GoDaddy. You should have clicked 'Request Certificate' and see a form where you need to answer the following questions: | |
Where is your certificate going to be hosted? Third Party | |
Enter your Certificate Signing Request (CSR) below: [copy contents of 'host.csr' here] | |
Select your certificate issuing organization: GoDaddy | |
Is this certificate for Intel vPro? No | |
2. Verify everything and then click through to finish. You should now be able to view and download your GoDaddy SSL certificate from GoDaddy from the 'Manage Certificates' section. | |
IV. Prepare SSL Certificate for Heroku | |
1. Download your new SSL certificate from GoDaddy's website into your 'ssl-cert' directory that we created in step I. You will get two files from GoDaddy: 'secure.yourdomain.com.crt' and 'gd_bundle.crt'. 'secure.yourdomain.com.crt' is your new SSL certificate. 'gd_bundle.crt' contains the SSL issuing certificate chain back to the root SSL certificate. | |
2. Combine 'secure.yourdomain.com.crt' and 'host.key': | |
cat secure.yourdomain.com.crt host.key > host.pem | |
3. Remove pass phrase from the public key certificate (required by Heroku) | |
openssl rsa -in host.pem -out nopassphrase.pem | |
openssl x509 -in host.pem >>nopassphrase.pem | |
You will be asked for the pass phrase you set in step I. I told you to remember it! | |
4. Open 'nopassphrase.pem' in a text editor and delete the 'private key' section: | |
-----BEGIN RSA PRIVATE KEY----- | |
... | |
-----END RSA PRIVATE KEY----- | |
5. Combine 'gd_bundle.crt' and 'nopassphrase.pem': | |
cat nopassphrase.pem gd_bundle.crt > public.pem | |
'gd_bundle.crt' is a chain file that links your certificate to a original trusted host certificate that GoDaddy owns. | |
6. Remove pass phrase from the private key certificate (required by Heroku) | |
openssl rsa -in host.key -out private.key | |
You will be asked for the pass phrase you set in step I. I told you to remember it! | |
You might be asking yourself: What do all of these file extensions mean? Well, here you go: | |
*.csr -- Certificate Signing Request used for submission to signing authorities that issue SSL certificates | |
*.crt -- Public key of a certificate (same as a *.pem file, but with different extension). May include a chain of certificates back to the host certificate. This is what you'll get from GoDaddy when you download a purchased certificate. | |
*.pem -- Public key of a certificate (same as a *.crt file, but with different extension). May include a chain of certificates back to the host certificate. This is what you'll get from GoDaddy when you download a purchased certificate. | |
*.key -- Private key of a certificate | |
V. Add SSL Certificate to Heroku | |
1. Go to the root of your Heroku project folder and add the nopassphrase pem and key to Heroku: | |
heroku ssl:add ../ssl-cert/public.pem ../ssl-cert/private.key | |
You may need to adjust the paths to point to your 'nopassphrase.pem' and 'nopassphrase.key' files. | |
2. If you haven't done so already, you must enable the Heroku custom domains add-on and add 'secure.yourdomain.com' to Heroku's list of domains: | |
heroku addons:add custom_domains:basic | |
heroku domains:add secure.yourdomain.com | |
3. Next, you need to add Heroku's 'Hostname SSL' solution: | |
heroku addons:add ssl:hostname | |
This will add a $20/month (as of the time of this writing) fee to your Heroku bill for SSL. | |
VI: Setting up your DNS to work with Heroku Hostname SSL | |
1. You should recieve an email from heroku within a few minutes of adding the ssl:hostname addon. You need to add a CNAME record to your DNS that points to the AWS host in the email you receive. This should be pretty self explanatory, but if you have any questions, search for 'adding a CNAME record' in Google and you'll see lots of good guides. | |
2. Test that 'host secure.yourdomain.com' outputs 'something.amazonaws.com'. If it does, you're all set. | |
You should now be able to go to 'https://secure.yourdomain.com' and not see any errors or security warnings. | |
What is going on behind the scenes | |
When a user visits your site using 'https://secure.yourdomain.com', they're hitting your GoDaddy CNAME record, which points to an 'something.amazonaws.com' address which effectively routes the request to Heroku's grid, and a secure connection gets established from there following the standard SSL handshake process. |
although heroku has changed their certs process this was still really helpful on navigating the CSR step. thanks
Super helpful! Thank you
Thank you for this detailed guide. I've gone through it carefully several times, and I keep getting the following error:
Resolving trust chain... failed
! No certificate given is a domain name certificate.
The domain I'm attempting to use is a Full Qualified Domain Name: www.pointsonpaper.com. (note the period at the end). I entered this domain name because I am under the impression it is necessary. Could my use of a FQDN somehow affect Heroku's acceptance of the SSL certificate? I can't think of any other reason why I'd be getting this error. I've googled around to no avail. Big thanks to anyone who has an idea of how I can get past this!
Thanks a ton for this
This command is not working.
heroku addons:add ssl:hostname
gd_bundle-g2-g1.crt == gd_bundle.crt
1234d4a56ed789c0.crt == secure.yourdomain.com.crt
Thanks for posting this! I always DREAD the ssl process, but this made it way easier.
Note: Step V1 is deprecated and gives an error. Thanks @MrJaeger for the updated command.