★ダウンロード
cd /etc
mkdir letsencrypt
cd letsencrypt/
git clone https://github.com/letsencrypt/letsencrypt
cd letsencrypt/

★発行
./letsencrypt-auto –help

★先に止めないと発行できない。
sudo service httpd stop
./letsencrypt-auto certonly -a standalone -d dev.furoom.net
sudo ls /etc/letsencrypt/live/dev.furoom.net
sudo ls /etc/letsencrypt/live/dev.furoom.net/cert.pem

★python2.7が必要
★–debugが必要になる場合も
★–server xxx でデバッグ用指定可(メリットは?)

実行するだけでめっちゃ入った・・。
更新 : openssl-1.0.1e-48.el6_8.1.x86_64 1/32
更新 : libgcc-4.4.7-17.el6.x86_64 2/32
更新 : libstdc++-4.4.7-17.el6.x86_64 3/32
更新 : libstdc++-devel-4.4.7-17.el6.x86_64 4/32
更新 : httpd-tools-2.2.15-53.el6.centos.x86_64 5/32
更新 : httpd-2.2.15-53.el6.centos.x86_64 6/32
更新 : libgomp-4.4.7-17.el6.x86_64 7/32
更新 : libgfortran-4.4.7-17.el6.x86_64 8/32
更新 : cpp-4.4.7-17.el6.x86_64 9/32
更新 : gcc-4.4.7-17.el6.x86_64 10/32
更新 : gcc-c++-4.4.7-17.el6.x86_64 11/32
更新 : gcc-gfortran-4.4.7-17.el6.x86_64 12/32
更新 : 1:mod_ssl-2.2.15-53.el6.centos.x86_64 13/32
更新 : httpd-devel-2.2.15-53.el6.centos.x86_64 14/32
更新 : openssl-devel-1.0.1e-48.el6_8.1.x86_64 15/32
更新 : redhat-rpm-config-9.0.3-51.el6.centos.noarch

★しかもエラーに。
[nilesflow@dev ~]$ wget -O – https://dev.furoom.net
–2016-06-03 01:28:58– https://dev.furoom.net/
dev.furoom.net をDNSに問いあわせています… 160.16.117.208
dev.furoom.net|160.16.117.208|:443 に接続しています… 接続しました。
エラー: dev.furoom.net の証明書(発行者: /C=US/O=Let\'s Encrypt/CN=Let\'s Encrypt Authority X3')の検証に失敗しました:
発行者の権限を検証できませんでした。
dev.furoom.net に安全の確認をしないで接続するには、
–no-check-certificate’ を使ってください。

★ブラウザ経由だと問題ないっぽい。
https://dev.furoom.net/

ELBは各リージョン。

cloudfrontは、バージニア北部のみ。

 

https://elb.nilesflow.net

https://cloudfront.nilesflow.net/

SSL評価はAだったよという話。
https://www.ssllabs.com/ssltest/analyze.html?d=cloudfront.nilesflow.net&latest
https://www.ssllabs.com/ssltest/analyze.html?d=elb.nilesflow.net&latest

# pear upgrade pear

WARNING: “pear/Console_Getopt” is deprecated in favor of “pear/Console_GetoptPlus”
downloading PEAR-1.10.1.tgz …
Starting to download PEAR-1.10.1.tgz (296,139 bytes)
…………………………………………………….done: 296,139 bytes
could not extract the package.xml file from “/tmp/pear/download/PEAR-1.10.1.tgz”
Download of “pear/pear” succeeded, but it is not a valid package archive
Error: cannot download “pear/PEAR”

・・・

 

PHPを更新していたので、以下のように。

# cp /usr/local/php-5.6.12/lib/php/Archive/Tar.php /usr/share/pear/Archive/Tar.php

参考:

http://phpobenkyo.seesaa.net/article/410455059.html

http://www.gentei.org/~yuuji/rec/pc/memo/2014/08/30/

以下のサイトを参考にした。

http://d.hatena.ne.jp/ozuma/20120424/1335265500

 

configureで以下の指定を追加する事

yum install mod_ssl

 

vi /etc/httpd/conf/httpd.conf

LoadModule ssl_module modules/mod_ssl.so

 

vi /etc/httpd/conf.d/ssl.conf

##
## SSL Virtual Host Context
##

NameVirtualHost *:443
Listen 443

<VirtualHost *:443>

# General setup for the virtual host, inherited from global configuration
DocumentRoot “/var/www/html”
ServerName dev.furoom.net

# Use separate log files for the SSL virtual host; note that LogLevel
# is not inherited from httpd.conf.
ErrorLog logs/ssl_error_log
TransferLog logs/ssl_access_log
LogLevel warn

# SSL Engine Switch:
# Enable/Disable SSL for this virtual host.
SSLEngine on

# SSL Protocol support:
# List the enable protocol levels with which clients will be able to
# connect. Disable SSLv2 access by default:
SSLProtocol all -SSLv2

# SSL Cipher Suite:
# List the ciphers that the client is permitted to negotiate.
# See the mod_ssl documentation for a complete list.
SSLCipherSuite ALL:!ADH:!EXPORT:!SSLv2:RC4+RSA:+HIGH:+MEDIUM:+LOW

# Server Certificate:
# Point SSLCertificateFile at a PEM encoded certificate. If
# the certificate is encrypted, then you will be prompted for a
# pass phrase. Note that a kill -HUP will prompt again. A new
# certificate can be generated using the genkey(1) command.
#SSLCertificateFile /etc/pki/tls/certs/localhost.crt
SSLCertificateFile /etc/pki/CA/certs/dev.furoom.net-ca.crt

# Server Private Key:
# If the key is not combined with the certificate, use this
# directive to point at the key file. Keep in mind that if
# you’ve both a RSA and a DSA private key you can configure
# both in parallel (to also allow the use of DSA ciphers, etc.)
#SSLCertificateKeyFile /etc/pki/tls/private/localhost.key
SSLCertificateKeyFile /etc/pki/CA/private/dev.furoom.net.key
</VirtualHost>