dmitri wrote: |
No I won't tell you to stop using SSL, not at all. It's a valid environment for the debugger and everything should work fine and actually working fine for many customers. If you're using in prod, meaning with a real SSL cert, not self-signed, it's not a common case and there could be some problems we haven't seen. |
I dispatch my debugging tests across prod servers, backup servers and home copy of them.
If I use a prod server, that I tend to avoid, it is generally into a test copy of the actual production virtual server into a side-by-side directory, and because I sometimes need resources that couldn't be easily available on test copies (a 10 Gb database, for example).
And why would I want to use a self-signed certificate where I can use a real Let's Encrypt one for the same price?
This also has the advantage of better validating the changes that I make in the test servers before copying them to the prod ones.
dmitri wrote: |
I guess ALPN and SNI might cause some problems -- they are part of SSL protocol. Does your server restrict SNIs, for instance? I saw this problem reported by customers who work with CloudFlare env. Or we may have issues with cert chain validation in the HTTPS client that is used in the Wizard. |
I never digged inside the SSL configuration. I installed it using the default Apache values.
Let's Encrypt, however, strongly suggests to use some of their tunings, so I include a file (provided by Let's Encrypt) containing this in all of my SSL virtual servers:
# This file contains important security parameters. If you modify this file
# manually, Certbot will be unable to automatically provide future security
# updates. Instead, Certbot will print and log an error message with a path to
# the up-to-date file that you will need to refer to when manually updating
# this file. Contents are based on https://ssl-config.mozilla.org
SSLEngine on
# Intermediate configuration, tweak to your needs
SSLProtocol all -SSLv2 -SSLv3 -TLSv1 -TLSv1.1
SSLCipherSuite ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384
SSLHonorCipherOrder off
SSLSessionTickets off
SSLOptions +StrictRequire
|
All SSL tunings that I could have made should be there.
dmitri wrote: |
(RE huge fees associated with SSL certs, FYI some companies provide SSL certs for free as long as you're using their resources, not cheapest though, just a hint) |
The only company from which I could use resources is my hosting provider, OVHcloud.
The only SSL certificate resource that OVHcloud provides for free is … Let's Encrypt.
But thank you for the hint, anyway.
dmitri wrote: |
As of CLI -- it's cli, command line interface, an environment that has nothing to do with your web servers at all. It means that SSL is not applicable to this mode at all. If you select both WEB and CLI mode in the Wizard, does it work? |
I already told that into my September 27th, 2023 (French time) message here.
CLI tests succeed if I use them along with HTTP into the same project wizard (while the HTTP one fails).
CLI tests fail if I use them alone, without HTTP, into their own project wizard.
I understand this is absolutely not logical.
Despite CLI has nothing to do with web servers, I intensively use CLI on my servers for fetching external data (from open data sources), processing them, and putting the result into a database which HTTP scripts next use for displaying.
These CLI scripts are triggered by CRON tasks.
Once per minute.
As this is not handled inside the same directories, I use separate projects for debugging them.
CLI and HTTP scripts share some common libraries, however.