Forcing Visits to use SSL

January 1, 2009

Intro

Doesn’t matter whether it’s a CakePHP app for a client, your own personal CMS, or any other web based application. If your passing around passwords or other sensitive info you should really implement SSL. SSL provides 2 main perks to your visitors.

  • First it encrypts all communication that flies across the web. This prevents curious or devious billies from getting your secrets.
  • Secondly it ensures to the user that your server is in fact who it claims, and not a nasty ‘man in the middle" attack.
  • Finally it gives your site that touch of class…. which of course a classy person like yourself relies on.

Once you implement SSL certificates on your server you’ll want to require secure connections using Apache’s rewrite module. Now I won’t dwell on the creation and signing of certificates, its already well documented.  If your just starting out though,heres a few links I recommend;

The second link uses the schools internal CA, you will need to pay a public CA like Entrust or Verisign. All of this information is aimed at ‘nix or solaris servers running apache. Why? cause a production windows server is laughable :-p

Now that you have a certificate, whats next?

So there you are you have a shiny new Certificate and Server key, how do you force visitors to your apache driven site to use the SSL? You copied the certificates into the appropite locations right? And you have made the needed changes in httpd.conf right? So now when you view https://example.com you see a ‘trusted’ warning or your site right? If No to any of these than this article does a pretty good job of outlining those steps.

The SSL Works, How do I force connections to use it?

First you need to decide if you want to force every page on your site to use SSL, or only a particular sub-domain, or maybe just your admin directory.  Since the overhead is minimal there is no harm is forcing the entire domain to leverage SSL, but if it is a self-signed certificate for your personal use than you’ll most certainly want to restrict its use to your own areas. This prevents users from seeing that nasty warning “This server is not trusted” You’ll know if your using SSL because the url prefix changes from http to https (s for secure).

Forcing entire domain to use SSL

You want any visit, any where to use ssl. This probably the simplest solution. Create or append to your htaccess file in the top directory of your server. Some people use a port check (80 is typically http, while 443 is https) but if you have alernate configs or the user just adds :8080 to the end of the url this method is useless. Instead check whether the https environmental variable is set, if not then redirect.

RewriteCond %{HTTPS} !=on RewriteRule ^(.*)$ https://%{SERVER_NAME}$1 [R,L]

Forcing sub-domains to use SSL

Maybe you only want mysecretarea.example.com to use SSL, that’s easy enough. Its the same premise as above, but you move the htaccess file into the directory that corresponds to the subdomain. Also change the second line like below;

RewriteCond %{HTTPS} !=on RewriteRule ^(.*)$ https://mysecretarea.%{SERVER_NAME}$1 [R,L]

Forcing a directory to use SSL

This method cn get a little hairier if your using aliases or redirects on top of this one. You’ll need to consider what order the commands are read. The basic principle is like so.  You want all visits to example.com/admin to use ssl. Create a htaccess file in the parent directory.  Again will check for the https variable, but this time we also check for the sub-directory to be in the path.

RewriteCond %{HTTPS} !=on RewriteRule ^/admin/(.*)$ https://%{SERVER_NAME}/admin/$1 [R,L]

Nifty tech tag lists from Wouter Beeftink | Page content generated from commit: d197a6c