Tutorial

How To Create a SSL Certificate on Apache for Ubuntu 12.04

Published on June 6, 2012
How To Create a SSL Certificate on Apache for Ubuntu 12.04
Not using Ubuntu 12.04?Choose a different version or distribution.
Ubuntu 12.04

Status: Deprecated

This article covers a version of Ubuntu that is no longer supported. If you currently operate a server running Ubuntu 12.04, we highly recommend upgrading or migrating to a supported version of Ubuntu:

Reason: Ubuntu 12.04 reached end of life (EOL) on April 28, 2017 and no longer receives security patches or updates. This guide is no longer maintained.

See Instead:
This guide might still be useful as a reference, but may not work on other Ubuntu releases. If available, we strongly recommend using a guide written for the version of Ubuntu you are using. You can use the search functionality at the top of the page to find a more recent version.

What the Red Means

The lines that the user needs to enter or customize will be in red in this tutorial! The rest should mostly be copy-and-pastable.

About SSL Certificates

A SSL certificate is a way to encrypt a site's information and create a more secure connection. Additionally, the certificate can show the virtual private server's identification information to site visitors. Certificate Authorities can issue SSL certificates that verify the server's details while a self-signed certificate has no 3rd party corroboration.

Set Up

The steps in this tutorial require the user to have root privileges on the VPS. You can see how to set that up here in steps 3 and 4.

Additionally, you need to have apache already installed and running on your virtual server. If this is not the case, you can download it with this command:

sudo apt-get install apache2

Step One—Activate the SSL Module

The next step is to enable SSL on the droplet.

sudo a2enmod ssl

Follow up by restarting Apache.

sudo service apache2 restart

Step Two—Create a New Directory

We need to create a new directory where we will store the server key and certificate

sudo mkdir /etc/apache2/ssl 

Step Three—Create a Self Signed SSL Certificate

When we request a new certificate, we can specify how long the certificate should remain valid by changing the 365 to the number of days we prefer. As it stands this certificate will expire after one year.

sudo openssl req -x509 -nodes -days 365 -newkey rsa:2048 -keyout /etc/apache2/ssl/apache.key -out /etc/apache2/ssl/apache.crt

With this command, we will be both creating the self-signed SSL certificate and the server key that protects it, and placing both of them into the new directory.

This command will prompt terminal to display a lists of fields that need to be filled in.

The most important line is "Common Name". Enter your official domain name here or, if you don't have one yet, your site's IP address.

You are about to be asked to enter information that will be incorporated
into your certificate request.
What you are about to enter is what is called a Distinguished Name or a DN.
There are quite a few fields but you can leave some blank
For some fields there will be a default value,
If you enter '.', the field will be left blank.
-----
Country Name (2 letter code) [AU]:US
State or Province Name (full name) [Some-State]:New York
Locality Name (eg, city) []:NYC
Organization Name (eg, company) [Internet Widgits Pty Ltd]:Awesome Inc
Organizational Unit Name (eg, section) []:Dept of Merriment
Common Name (e.g. server FQDN or YOUR name) []:example.com                  
Email Address []:webmaster@awesomeinc.com

Step Four—Set Up the Certificate

Now we have all of the required components of the finished certificate.The next thing to do is to set up the virtual hosts to display the new certificate. Open up the SSL config file:

 nano /etc/apache2/sites-available/default-ssl

Within the section that begins with <VirtualHost _default_:443>, quickly make the following changes. Add a line with your server name right below the Server Admin email:

 ServerName example.com:443

Replace example.com with your DNS approved domain name or server IP address (it should be the same as the common name on the certificate). Find the following three lines, and make sure that they match the extensions below:

SSLEngine on
SSLCertificateFile /etc/apache2/ssl/apache.crt
SSLCertificateKeyFile /etc/apache2/ssl/apache.key

Save and Exit out of the file.

Step Five—Activate the New Virtual Host

Before the website that will come on the 443 port can be activated, we need to enable that Virtual Host:

sudo a2ensite default-ssl

You are all set. Restarting your Apache server will reload it with all of your changes in place.

sudo service apache2 reload

In your browser, type https://youraddress, and you will be able to see the new certificate.

See More

Once you have setup your SSL certificate on the site, you can Install an FTP server if you haven't done so yet.

By Etel Sverdlov

Thanks for learning with the DigitalOcean Community. Check out our offerings for compute, storage, networking, and managed databases.

Learn more about our products

About the author(s)

Etel Sverdlov
Etel Sverdlov
See author profile
Category:
Tutorial

Still looking for an answer?

Ask a questionSearch for more help

Was this helpful?
 
30 Comments
Leave a comment...

This textbox defaults to using Markdown to format your answer.

You can type !ref in this text area to quickly search our full set of tutorials, documentation & marketplace offerings and insert the link!

I Get An Error

bossman759@ubuntu:~$ sudo service apache2 reload Syntax error on line 173 of /etc/apache2/sites-enabled/default-ssl: SSLCertificateKeyFile: file ‘/etc/apache2/ssl/apache.ke’ does not exist or is empty Action ‘configtest’ failed. The Apache error log may have more information. …fail!

Moisey Uretsky
DigitalOcean Employee
DigitalOcean Employee badge
July 16, 2012

Maybe a small typo, the error lists: “/etc/apache2/ssl/apache.ke”

The tutorial is for: “/etc/apache2/ssl/apache.key”

So the key file you are pointing doesn’t exist, just looks like you missed the y on the end.

Double check the paths to make sure all of the files you are referencing are where they are supposed to be and if you still have an issue let us know.

You hava a mistake when you typed the location of your “apache.key” file. If you read the location of the error message, you can see that the file you typed was “/etc/apache2/ssl/apache.ke”

How about this?

Syntax error on line 47 of /etc/apache2/sites-enabled/default-ssl: SSLCertificateFile: file ‘/etc/apache2/ssl/apache.crt’ does not exist or is empty Action ‘configtest’ failed. The Apache error log may have more information. …fail!

ben
DigitalOcean Employee
DigitalOcean Employee badge
August 19, 2012

The error is the file does not exist or is empty, make sure you put your Apache certificate file in place /etc/apache2/ssl/apache.crt

You can verify that its the right file by running: cat /etc/apache2/ssl/apache.crt – that will show you the contents of the certificate file.

Worked like a charm. Thanks a lot.

Thanks Worked Like a charm on Ubuntu 12.04!

Etel Sverdlov
DigitalOcean Employee
DigitalOcean Employee badge
November 12, 2012

Thanks! Let me know if you there are any topics you would like to see. =]

100% worked on my VPS Ubuntu 12.04.1 LTS thanks for sharing …

Great walk-through, bookmarking this. This is the most clear and concise explanation that I have found yet. THANK YOU!

How could I do it to create a self-signed certificate that can work on all subdomains? example subdomain1.example.com, subdomain2.example.com, etc

Etel Sverdlov
DigitalOcean Employee
DigitalOcean Employee badge
January 11, 2013

You can create an self-signed SSL certificate that will work on all domains by including a catchall in the common name.

Include an asterisk in the following line: “Common Name (e.g. server FQDN or YOUR name) []:*.example.com”

I have a doubt… In the original file where do you have to change this? SSLEngine on SSLCertificateFile /etc/apache2/ssl/apache.crt SSLCertificateKeyFile /etc/apache2/ssl/apache.key ? I can’t find them like that

btw in this part ServerName example.com:443 I used this ServerName localhost:443

Moisey Uretsky
DigitalOcean Employee
DigitalOcean Employee badge
January 14, 2013

You would put: SSLEngine on SSLCertificateFile /etc/apache2/ssl/apache.crt SSLCertificateKeyFile /etc/apache2/ssl/apache.key Inside of the VirtualHost where you would like that SSL to be active.

As for the ServerName, that should actually be the name of the domain you setup such as “domain.com” and inside of your VirtualHost you can specify the IP as: VirtualHost xx.xx.xx.xx:443

Then this VirtualHost will only be active for requests on port 443 which is HTTPS.

I have an error when executing the last command (sudo service apache2 reload):

  • Reloading web server config apache2
    [Wed Jan 16 22:31:15 2013] [warn] NameVirtualHost *:80 has no VirtualHosts

During the setup of the initial certificate, I didn’t use the actual “.com” name of the website, as I thought common name was just a shorthand name. I then read the bit about common name being the most important step (oops), so after I received the above error the first time, I reran the certificate setup and used the correct “.com” name but I’m still getting the same error. Any ideas? (I checked that the SSL config file with VirualHost *:443 and the other edits and they have all been saved).

Moisey Uretsky
DigitalOcean Employee
DigitalOcean Employee badge
January 16, 2013

That error is related to your Apache virtualhost configuration and not your SSL certificate.

It just means that you may have a Listen *:80 directive and that you have no VirtualHost *:80 configured, so while you are listening on port 80 you do not have anything configured to serve traffic which is what that refers to.

Ok, so where would I go to change the “Listen *:80” directive? I guess what I’m asking is, how do I go about fixing this? I’ve followed all the steps so far word for word…

So, I’ve found a “Listen 80” directive along with a “NameVirtualHost *:80” directive in ports.conf in /etc/apache2/. What and how do I need to edit this file (if it is this file) in order to make this work?

I’ve tried visiting the address of the site both with regular http and https and both time out…

Moisey Uretsky
DigitalOcean Employee
DigitalOcean Employee badge
January 17, 2013

In most cases the SSL protected website and the non-SSL website are the same so you can do one of two things:

  1. Create a VirtualHost *:80 directive with the same settings as your 443 VirtualHost just remove any mention of the SSL certs so you can serve the same website from http://

  2. Create a VirtualHost *:80 directive for the same site and redirect all requests via RewriteRules to the 443 SSL enabled VirtualHost.

We do not use Apache, we use nginx, but we employ method 2, so if you goto http://www.digitalocean.com you will be redirected to https://www.digitalocean.com - this way we ensure that all connections to our website are secure and encrypted.

So I searched around and instead of using rewrite rules, I decided to use a permanent redirect but I still am getting no results. Maybe posting these first few lines will shed some light on my situation:

<VirtualHost *:80> ServerName ec2-XXX.compute-1.amazonaws.com:80 Redirect permanent / ec2-XXX.compute-1.amazonaws.com:443 </VirtualHost>

<VirtualHost *:443> ServerAdmin webmaster@localhost ServerName ec2-XXX.compute-1.amazonaws.com:443

    SSLEngine on
    SSLCertificateFile /etc/apache2/ssl/apache.crt
    SSLCertificateKeyFile /etc/apache2/ssl/apache.key

I restarted the apache server with these settings but there is still a network timeout whenever I try to access either the regular or secure version of the site. Any ideas? I’ll try rewrite rules, but I feel like the issue may be rooted elsewhere…

Moisey Uretsky
DigitalOcean Employee
DigitalOcean Employee badge
January 17, 2013

Remove the SSL lines from your VirtualHost for :80.

Then also paste your 443 config, because it will be redirecting to 443 so if the 443 config isn’t working then it wont load for either.

Sorry about the last post, it apparently doesn’t like things wrapped in HTML-style tags so it was hard to see what was actually a part of what VirtualHost (I’ll post the rest of the 443 config though).

There were/are no SSL directives/lines in my VirtualHost for :80. Here are both VirtualHosts in /etc/apache2/sites-enabled/000-default:

<VirtualHost *:80 ServerName ec2-XXX.compute-1.amazonaws.com:80 Redirect permanent / ec2-XXX.compute-1.amazonaws.com:443 </VirtualHost

<VirtualHost *:443 ServerAdmin webmaster@localhost ServerName ec2-XXX.compute-1.amazonaws.com:443

    SSLEngine on
    SSLCertificateFile /etc/apache2/ssl/apache.crt
    SSLCertificateKeyFile /etc/apache2/ssl/apache.key

    DocumentRoot /var/www
    <Directory /
            Options FollowSymLinks
            AllowOverride None
    </Directory
    <Directory /var/www/
            Options Indexes FollowSymLinks MultiViews
            AllowOverride None
            Order allow,deny
            allow from all
    </Directory

    ScriptAlias /cgi-bin/ /usr/lib/cgi-bin/
    <Directory "/usr/lib/cgi-bin"
            AllowOverride None
            Options +ExecCGI -MultiViews +SymLinksIfOwnerMatch
            Order allow,deny
            Allow from all
    </Directory

    ErrorLog ${APACHE_LOG_DIR}/error.log

    # Possible values include: debug, info, notice, warn, error, crit,
    # alert, emerg.
    LogLevel warn

    CustomLog ${APACHE_LOG_DIR}/access.log combined

Alias /doc/ "/usr/share/doc/"
<Directory "/usr/share/doc/"
    Options Indexes MultiViews FollowSymLinks
    AllowOverride None
    Order deny,allow
    Deny from all
    Allow from 127.0.0.0/255.0.0.0 ::1/128
</Directory

</VirtualHost

Argh - I’m going to change the HTML style brackets to {{ and }}

{{VirtualHost *:80}} ServerName ec2-XXX.compute-1.amazonaws.com:80 Redirect permanent / ec2-XXX.compute-1.amazonaws.com:443 {{/VirtualHost}}

{{VirtualHost *:443}} ServerAdmin webmaster@localhost ServerName ec2-XXX.compute-1.amazonaws.com:443

    SSLEngine on
    SSLCertificateFile /etc/apache2/ssl/apache.crt
    SSLCertificateKeyFile /etc/apache2/ssl/apache.key

    DocumentRoot /var/www
    {{Directory /}}
            Options FollowSymLinks
            AllowOverride None
    {{/Directory}}
    {{Directory /var/www/}}
            Options Indexes FollowSymLinks MultiViews
            AllowOverride None
            Order allow,deny
            allow from all
    {{/Directory}}

    ScriptAlias /cgi-bin/ /usr/lib/cgi-bin/
    {{Directory "/usr/lib/cgi-bin"}}
            AllowOverride None
            Options +ExecCGI -MultiViews +SymLinksIfOwnerMatch
            Order allow,deny
            Allow from all
    {{/Directory}}

    ErrorLog ${APACHE_LOG_DIR}/error.log

    # Possible values include: debug, info, notice, warn, error, crit,
    # alert, emerg.
    LogLevel warn

    CustomLog ${APACHE_LOG_DIR}/access.log combined

Alias /doc/ "/usr/share/doc/"
{{Directory "/usr/share/doc/"}}
    Options Indexes MultiViews FollowSymLinks
    AllowOverride None
    Order deny,allow
    Deny from all
    Allow from 127.0.0.0/255.0.0.0 ::1/128
{{/Directory}}

{{/VirtualHost}}

Moisey Uretsky
DigitalOcean Employee
DigitalOcean Employee badge
January 18, 2013

When you access the 443 site directly what do you see?

And have you checked your error log ?

Lastly, you mentioned that you are getting a network timeout, so you want to also test connectivity to the webserver as well. For that just do:

telnet server.ip.address 80

telnet server.ip.address 443

That will show you if you can connect to the server’s HTTP server, if not that means you may have an issue possibly with firewall settings, or with what ports/ips HTTP is listening on.

Wow… silly me. I’m using amazon web services as the backbone of the project, and a barebones EC2 Ubuntu instance comes default with no open ports. All I had to do was edit the security settings to allow incoming connections on ports 80 and port 443.

I did have to edit the redirect code in the {{VirtualHost *:80}} tag though because simply using the port :443 without specifying the protocol (http vs https, it defaults to using http) comes back with an error saying that I was trying to access a secure port using regular http. I simply edited the redirect code like the following:

{{VirtualHost *:80}} ServerName ec2-XXX.compute-1.amazonaws.com:80 Redirect permanent / https://ec2-XXX.compute-1.amazonaws.com: {{/VirtualHost}}

Thanks for the help - apologies for the simplicity of my mistake.

Hi, it works in my server (Ubuntu12.04) but when i tried to connect with https, chrome show a warning. I allow it but in url, there is a line on https://… (it doesn’t seem trusted)

Is it work like this? How can I verify the ssl?

Moisey Uretsky
DigitalOcean Employee
DigitalOcean Employee badge
January 18, 2013

That warning means that your SSL certificate isn’t signed by a trusted authority like NetworkSolutions.

What this means is that the connection is secure via SSL, but visitors will get that warning, if you buy an SSL certificate from NetworkSolutions or another authority then they will provide you a new SSL cert based on your SSL key and then the warning will go away.

Etel Sverdlov
DigitalOcean Employee
DigitalOcean Employee badge
January 18, 2013

This is because it is a self-signed certificate and not verified by a third party.

To avoid getting that screen, you will need to install a valid, signed, SSL certificate from a provider such as StartSSL (for a free one) or Comodo (for a low-priced paid one).

Worth reading this too, only takes a few extra minutes: Hardening your Web Server’s SSL Ciphers - http://hynek.me/articles/hardening-your-web-servers-ssl-ciphers/

How do I make this work for a particular subdomain only?

Such as cart checkout with https at “https://secure.mydomain.com

And everything else with http at “http://mydomain.com

Many thanks!

Join the Tech Talk
Success! Thank you! Please check your email for further details.

Please complete your information!

Become a contributor for community

Get paid to write technical tutorials and select a tech-focused charity to receive a matching donation.

DigitalOcean Documentation

Full documentation for every DigitalOcean product.

Resources for startups and SMBs

The Wave has everything you need to know about building a business, from raising funding to marketing your product.

Get our newsletter

Stay up to date by signing up for DigitalOcean’s Infrastructure as a Newsletter.

New accounts only. By submitting your email you agree to our Privacy Policy

The developer cloud

Scale up as you grow — whether you're running one virtual machine or ten thousand.

Get started for free

Sign up and get $200 in credit for your first 60 days with DigitalOcean.*

*This promotional offer applies to new accounts only.