SSL offloading allows an application server to serve only the business functionalities by delegating the encryption/decryption to a dedicated web server running as a reverse proxy.
Securing web communications with SSL/TLS certificates is crucial for protecting sensitive data. But depending on the inbound traffic volume, you can delegate the encryption-decryption task to a dedicated web server allowing your application server to focus on serving the business functionality only.
Let’s Encrypt, a free and open certificate authority, provides an accessible way to obtain and manage SSL certificates. This blog post will explore leveraging Let’s Encrypt certificates for SSL offloading using the Apache HTTP Server as a reverse proxy on an Ubuntu 22.10 machine.
Before proceeding, ensure that you have the following:
Install Apache HTTP server: Execute the following commands to install the Apache webserver that will act as a reverse proxy for our backend application.
# install apache
sudo apt install apache2
# check status
sudo systemctl status apache2
Install Certbot: Start by installing Certbot, a widely used Let’s Encrypt client that simplifies the certificate management process. You can follow the official documentation specific to your operating system for installation instructions.
sudo apt update
sudo apt install certbot
sudo apt install python3-certbot-apache
Configure Apache mods: To enable the Apache HTTP Server as a reverse proxy, ensure the required modules are enabled. Run the following commands:
sudo a2enmod ssl
sudo a2enmod proxy
sudo a2enmod proxy_balancer
sudo a2enmod proxy_http
# restart apache
sudo systemctl restart apache2
Obtain Let’s Encrypt Certificates: Use Certbot to obtain SSL certificates for your domain or subdomain. Run the following command:
sudo certbot certonly --apache -d your-domain.com
# follow on-screen prompts. the final cert confirmation should be similar
# to the one mentioned below
Requesting a certificate for your-domain.com
Successfully received certificate.
Certificate is saved at: /etc/letsencrypt/live/your-domain.com/fullchain.pem
Key is saved at: /etc/letsencrypt/live/your-domain.com/privkey.pem
This certificate expires on 2023-08-28.
These files will be updated when the certificate renews.
Certbot has set up a scheduled task to automatically renew this certificate in the background.
your-domain.com with your existing domain or subdomain. Certbot will guide you through the process, and upon successful completion, the certificates will be stored in the
Configure Apache as a Reverse Proxy with SSL Offloading: Next, configure Apache as a reverse proxy with SSL offloading. Open the Apache configuration file, usually located at
/etc/apache2/sites-available/000-default.conf, and add the following lines within the appropriate VirtualHost block:
Redirect permanent / https://your-domain.com/
# Proxy settings
ProxyPass / http://localhost:8080/
ProxyPassReverse / http://localhost:8080/
Ensure you replace “your-domain.com” with your actual domain or subdomain and configure the appropriate ProxyPass and ProxyPassReverse directives to point to your backend server or application.
Restart Apache: Save the configuration file and restart Apache using the appropriate command for your system:
sudo systemctl restart apache2
As mentioned above, the Certbot will set up a background task to renew certificates. You can check the job via the
systemctl list-timers command.
One can also set up a custom job to regularly check the certificates and avoid downtime. To automate their renewal, set up a cron job to run the renew command:
sudo crontab -e
30 2 * * 1 certbot renew >> /var/log/le-renew.log
This will create a new cron job that will execute the letsencrypt-auto renew command every Monday at 0230hrs.
That is all for this post. If you want to share any feedback, please drop me an email, or contact me on any social platforms. I’ll try to respond at the earliest. Also, please consider subscribing feed for regular updates.