Creating Your Own Website
Acquire a Domain Name
Acquire a domain name if you haven't already. This is done through a registrar. A registrar is a company that registers domain names with ICANN on your behalf. Examples of registrars include: Spaceship (newer company owned by NameCheap and started by its founder), NameCheap, Porkbun and Cloudfare.
Setup a Web Server
A web server is a computer that serves web-pages to clients (i.e. it 'hosts' your website). One can use their own (usually spare) computer to do this, or rent a computer. If using your own computer, you'll also need a static Internet Protocol (IP) address. Static IP addresses are issued by your Internet Service Provider (ISP). This usually costs more money on personal internet plans (approximately 5 AUD extra per month), or is commonly free with business plans. In addition to this increased cost, one also needs to ensure that their private network is protected, as using a static IP address on your own local network means that people from around the world will be connecting to that network. Thus, the simpler solution is to rent a computer (server) from web server provider. A very basic shared Virtual Private Server (VPS) will cost around 5 AUD per month. Examples of web server providers include: Vultr and DigitalOcean.
Once a computer has been setup and a static IP address allocated, one can then setup the DNS records.
Setup DNS Records
A Domain Name System (DNS) is a system that links domain names to the IP addresses of the web servers for given domains. DNSs are managed by DNS service providers. Often your registrar where you purchased your domain will provide such a service. Other specialised DNS providers include: DNS Made Easy, DynDNS and EasyDNS. Using your registrar to setup your DNS records is the simplest.
Create both IPV4 (Type A) and IPV6 (Type AAAA) DNS records. For example:
Hostname | Type | Value (IP Address) | Time To Live (TTL) |
---|---|---|---|
mydomain.com | A | 40.21.10.163 | 30min |
www.mydomain.com | A | 40.21.10.163 | 30min |
mydomain.com | AAAA | 23a4:e206:caae:... | 30min |
www.mydomain.com | AAAA | 23a4:e206:caae:... | 30min |
If you are setting up an e-mail server as well, you will also have to setup a reverse DNS record. However, this is not necessary for just a website.
Harden the Security of the Web Server
Force Using a Non-Root User
Why not use root?
Logging in as root is generally considered bad practice. The reason being is that applications and commands should be run at a non-administrative level in order to prevent accidental or unwanted changes to the underlying system. For example, a crash of software to wipe a directory or a vulnerability to allow an attacker to gain root access. Instead, it is good practice to run applications and commands at a user level, and elevate privileges on a per-need basis.
Creating a Non-Root User with Superuser Privileges
The following commands assume that you are logged in as root to your server, and have not yet created a non-root user.
Add a new user:
adduser <username>
Enter the password for the new user. You can leave the full name, room number and phone numbers blank by just pressing Enter in each of the fields; otherwise, if you want to add these details, then add them here.
Add the user to the superuser group to give them superuser (administrator) privileges:
usermod -aG sudo <username>
To check that the new user has been added, switch to it:
su - <username>
Check if superuser privileges have been added by running a command that requires them, for example reconfiguring time-zone data:
sudo dpkg-reconfigure tzdata
If the reconfiguration Terminal User Interface (TUI) opens successfully, a non-root user with superuser privileges has been added successfully.
Disable Root Log-Ins
Once a user with superuser privileges has been added, one can disable root log-ins.
Edit the SSH daemon configuration file on your server:
sudo vim /etc/ssh/sshd_config
Replace the line containing PermitRootLogin yes
with
PermitRootLogin no
.
Save the file, then restart the daemon:
sudo systemctl restart sshd
Change the SSH Port Number
The default port for the Secure Shell (SSH) protocol is port 22. One can change this to a random port number greater than 1,024 and less than 65,536 to make automated SSH attacks less likely. Once changed, attackers attempting to gain access to your server via SSH will have to first scan all ports to see if the SSH daemon is listening on another port, then initiate the attack (e.g. brute-force). This is time consuming, so attackers are more likely to move onto other servers.
Decide on a port number greater than 1024 and less than 65,536, then log-in to the server.
Determine if a firewall is active. Debian and Ubuntu will likely have Uncomplicated Firewall (UFW) set up by default. If you are using another Linux distribution, find the equivalent commands to the ones below.
Check the status of the firewall:
sudo ufw status
Ensure the UFW is active and SSH is allowed (it should be by default).
Allow the new port:
sudo ufw allow 5341
Edit the SSH daemon configuration file on your server:
sudo vim /etc/ssh/sshd_config
Replace the line containing #Port 22
with
Port 5341
.
Save the file, then restart the daemon:
sudo systemctl restart sshd
The new port is now allowed and required to be used via SSH. When using an SSH client program to access the server in future, you'll have to specify the new port number to be used (otherwise the default port 22 is used), for example:
ssh -p 5431 <user>@yourdomain.com
Similarly, when using a Secure Copy Protocol (SCP) client program to copy files to the server, you'll have to specify the port number to be used (otherwise the default port 22 is used), for example:
scp -P 5431 <src_file> <username>@yourdomain.com:<trgt_file>
Note: while the ssh
command uses a lower-case
-p
flag, the scp
command uses an upper-case
-P
to specify the port number.
Reject Connection Requests Without Passwords
Although it is bad practice, administrators can create a user account without a password. This means that remote connection requests from that account will have no password to check against; therefore, the connection will be accepted without authentication. By default, SSH accepts connection requests without passwords, disable it by editing the SSH daemon configuration file:
sudo vim /etc/ssh/sshd_config
Then uncomment the line containing #PermitEmptyPasswords no
by
removing the octothrope (#
) (i.e. the line should be
PermitEmptyPasswords no
).
Save the file, then restart the daemon:
sudo systemctl restart sshd
Disable X11 Forwarding
X11 forwarding allows remote users to run graphical applications from the server over an SSH session. It is recommended to disable features like this that will in general not be used. Edit the SSH daemon configuration file on your server:
sudo vim /etc/ssh/sshd_config
Then uncomment the line containing #X11Forwarding no
by
removing the #
(i.e. the line should be
X11Forwarding no
).
Save the file, then restart the daemon:
sudo systemctl restart sshd
Set an Idle Timeout Value
If an SSH session has had no activity for some time, it is likely that the session is unattended and could pose a security risk. Set an idle limit that will cause the SSH connection to timeout and drop connection if the session has no activity during that time period.
Edit the SSH daemon configuration file on your server:
sudo vim /etc/ssh/sshd_config
Replace the line containing #ClientAliveInterval 0
with
ClientAliveInterval 600
. The integer corresponds to a number of
seconds (e.g. 600 is 600 seconds i.e. 10 minutes).
Save the file, then restart the daemon:
sudo systemctl restart sshd
Force Public-Key (GPG) Authentication Only
Public-key cryptography provides a more secure means of logging into a server via SSH compared to passwords. Passwords are susceptible to guessing (via brute-force or other targeted means) or cracking. While public-key authentication is not perfect, it is not subject to such attacks.
Public-key cryptography relies on a pair of keys: the public key and the private key. The public key is shared with the others (in this case the server you want to connect to), while the private key, as the name suggests, is kept private and secure on your own computer.
When you make a connection request to the sever, the server uses its public key to create an encrypted message that is sent back to your computer. As it was encrypted with your public key, only you with your paired private key can decrypt it. Your computer does this and extracts information from the message, importantly, the session ID. Your computer then re-encrypts this and sends it back to the server. If the server can decrypt it with its copy of your public key, and the information provided matches what was initially sent, then the server knows that connection request is someone it should trust.
The SSH client program provides the ability to generate public-private key pairs that can be used for authentication. However, most people use Gnu Privacy Guard (GPG) so utilising those existing key-pairs produces fewer keys to manage.
Generate GPG Private-Public Key Pair
Create a Gnu Privacy Guard (GPG) private-public key pair. You can follow my guide on GPG key generation if needed.
Add Authentication Sub-Key to GPG Key for SSH Use
If you haven't already added an authentication sub-key to your existing GPG key-pair, edit the key:
gpg --expert --edit-key <email-assoc-with-key>
Add a key by typing addkey
and then pressing Enter.
Select the option that matches the encryption algorithm used for the original key (e.g. ECC), and that allows you to set your own capabilities.
Toggle the capabilities such that the only allowed action is authentication (i.e. signing and encryption are disabled).
Set the sub-key validity for the desired period.
Create the key by typing y
and then pressing Enter.
Quit the GPG utility by typing quit
and then pressing
Enter.
Confirm that the new authentication sub-key has been created and is associated with your master key:
gpg --list-keys <email-assoc-with-key>
The output should be something like the following:
pub ed25519 2024-11-17 [SC] Q8FAP38902NFDB28339NSSFC2ACCD118AU8A82BF uid [ultimate] username <email@address.com> sub cv25519 2024-11-17 [E] sub ed25519 2024-11-17 [A]
Where one should now have the authentication sub-key listed, marked by the
[A]
.
As an aside, cv25519
(short for Curve25519) is the counterpart
to ed25519
:
-
cv25519
is used for X25519 key agreement (a type of Elliptic curve Diffie-Hellman (ECDH) key agreement) used for key exchange. -
ed25519
is the Edwards-curve Digital Signature Algorithm (EdDSA) key signature scheme which uses SHA-512 and an elliptic curve related to Curve25519 to create fast and secure digital signatures.
Enable SSH Support in GPG
Configure the SSH daemon on your computer to accept incoming
gpg agent
requests. Edit the GPG agent configuration file:
sudo vim ~/.gnupg/gpg-agent.confAdd the following line to the GPG agent configuration file:
enable-ssh-support
Save and close the GPG agent file.
Edit your bash run commands (.bashrc) file:
sudo vim ~/.bashrc
Add the following lines at the end of the file:
export GPG_TTY=$(tty) unset SSH_AGENT_PID if [ "${gnupg_SSH_AUTH_SOCK_by:-0}" -ne $$ ]; then export SSH_AUTH_SOCK="$(gpgconf --list-dirs agent-ssh-socket)" fi
Setting the GPG_TTY
environment variable tells the GPG utility
which tty (teletypewriter, i.e. terminal) is associated with the standard
input so that pin-entry (curses- or GUI-based) can work. Without pin-entry
you cannot enter a password to decrypt your secret key for subsequent use.
Unsetting the SSH_AGENT_PID
setting the
SSH_AUTH_SOCK
tells ssh
that
gpg-agent
will be used instead of the ssh-agent
.
Display the keygrips of the GPG keys:
gpgp --list-keys --with-keygrip
Copy the keygrip of the authentication sub-key.
Create an sshcontrol
file under the
.gnupg
directory:
sudo vim ~/.gnupg/sshcontrol
Paste the keygrip into this file and save it. Only keys in this file will be used in the SSH protocol.
Reload your bash run commands file on the current terminal session:
source ~/.bashrc
Test if the SSH daemon is linked to the GPG agent and is now working properly by listing its public SSH key:
ssh-add -l
Exporting and Testing Your GPG Key
Generate and save the SSH-compatible GPG key:
gpg --ssh-export-key <email-assoc-with-key> > ~/authorized_keys
Set the permission of the exported key to be only user-readable and writeable:
chmod 600 ~/authorized_keys
Connect via SSH to your server and log-in. Ensure that the .ssh directory exists in the home directory. If it doesn't, create it:
mkdir ~/.ssh
Press Ctrl+D to log-out of the server and close the SSH connection.
Send the authorized_keys
file to the server using the Secure
Copy Protocol (SCP) client program:
scp ~/authorized_keys <username>@yourdomain.com:~/.ssh/authorized_keys
Connect via SSH to your server and log-in. Restart the SSH daemon to apply the new key:
sudo systemctl restart sshd
Press Ctrl+D to log-out of the server and close the SSH connection. Re-connect via SSH to your server, a prompt asking for your GPG password should appear. You can now authenticate using your GPG key.
Disable All Other Authentication Methods
Edit the SSH daemon configuration file on your server:
sudo vim /etc/ssh/sshd_config
Disable password authentication by replacing the commented line containing
#PasswordAuthentication yes
with
PasswordAuthentication no
.
Disable any keyboard-based interactive authentication by replacing the line
containing
KbdInteractiveAuthentication yes
with
KbdInteractiveAuthentication no
.
Ensure that the line:
Include /etc/ssh/sshd_config.d/*.conf
is after any manual changes to your configuration. The SSH daemon will be
configured with whatever setting is encountered first. Thus, if this line is
placed before your changes, whatever settings are provided in these
.conf
files will be used, which may be in contradiction to the
manual changes you made.
Save the file, then restart the daemon:
sudo systemctl restart sshd
Configuring the Nginx Server
Install Nginx
Ensure packages are up-to-date:
sudo apt update
Intall Nginx:
sudo apt install nginx
Update Firewall Settings
Nginx registers itself as a service with UFW upon installation. Thus, application profiles will be available to easily allow or deny firewall access to Nginx. Display the list of application profiles available:
sudo ufw app list
The output should include:
Available applications: ... Nginx Full Nginx HTTP Nginx HTTPS ...
Allow the Nginx traffic through your firewall:
sudo ufw allow 'Nginx HTTP'
In general, it is recommended that one only allow the traffic that has been configured for. That is why only HTTP is allowed for now until SSL/TLS has been setup to support HTTPS traffic. This will be done later.
Verify that Nginx HTTP traffic has been allowed:
sudo ufw status
The output should contain at least the following entries:
Status: active To Action From -- ------ ---- Nginx HTTP ALLOW Anywhere Nginx HTTP (v6) ALLOW Anywhere (v6)
Confirm the Nginx Server is Running
After installation, Nginx should have already been started. Confirm that it is running:
systemctl status nginx
Confirm that Nginx is working correctly by requesting a page. This is done by going to your browser and navigating to either the Internet Protocol (IP) of your server:
http://<your-domain-IP>
Or, if your Domain Name Server (DNS) records have been set up, the domain name:
http://<yourdomain.com>
You should now see the default Nginx landing page. You can use basic Nginx server management commands to manage the Nginx application if needed.
Set Up Server Blocks
Sever blocks are used to encapsulate configuration details and host more than one domain from a single server.
One server block is set up by default to serve files out of the
/var/www/html
directory. Instead of modifying
/var/www/html
, this default directory will be left in place as
something to be served if a client request does not match any other sites.
Create the following directory. Replace
<yourdomain-withoutTLD>
with your domain name, but
without any Top-Level Domains (e.g. .com
,
.org
etc.) in the name:
sudo mkdir -p /var/www/<yourdomain-withoutTLD>/html
The -p
flag ensures that any necessary parent directories are
automatically created.
Assign ownership of the directory created using the
$USER
environment variable:
sudo chown -R $USER:$USER /var/www/<yourdomain-withoutTLD>/html
Ensure that the file permission are correct, allowing the owner to read, write and execute files, while groups and others can only read and execute:
sudo chmod -R 755 /var/www/<yourdomain-withoutTLD>
Create a test HTML file:
sudo vim /var/www/<yourdomain-withoutTLD>/html/index.html
As an example, add the following content to it:
<html> <head> <title>Welcome!</title> </head> <body> <h1><yourdomain.com> server block is working!</h1> </body> </html>
Save the test HTML file.
In order for Nginx to serve the content in
/var/www/<yourdomain-withoutTLD>/html
, one must create a
server block with the correct directives. Create the server block:
sudo vim /etc/nginx/sites-available/<yourdomain-withoutTLD>
Paste the following configuration block into the server block:
server { listen 80; listen [::]:80; root /var/www/<yourdomain-withoutTLD>/html; index index.html index.htm index.nginx-debian.html; server_name <yourdomain.com> www.<yourdomain.com>; location / { try_files $uri $uri/ =404; } }
Enable the server block by creating a symbolic link to it in the
sites-enabled
directory:
sudo ln -s /etc/nginx/sites-available/<yourdomain-withoutTLD> /etc/nginx/sites-enabled/
The sites-enabled
is what Nginx reads during start-up. Creating
a symbolic link in this manner allows one to easily enable and disable
certain server blocks without deleting the actual server block.
With this server block enabled, now two server blocks are configured to
respond to requests based on the listen
and
server_name
directives:
-
/etc/nginx/sites-available/<yourdomain-withoutTLD>
will respond to requests for<yourdomain.com>
and<www.yourdomain.com>
. -
/etc/nginx/sites-available/default
will respond to any requests on port 80 that do not match the others.
To learn more about how Nginx processes server blocks, see the article on understanding Nginx server and location block selection algorithms by Justin Ellingwood.
To avoid possible hash bucket memory problems that can arise from adding additional sever names in future, specify the bash bucket size in the Nginx configuration file. Edit the file:
sudo vim /etc/nginx/nginx.conf
Then uncomment the line #server_names_hash_bucket_size 64;
by
removing the octothrope (#
) (i.e. the line should be
server_names_hash_bucket_size 64;
).
Save and close the file. Check there are no syntax errors:
sudo nginx -t
Restart Nginx to enable the changes:
sudo systemctl restart nginx
Nginx should now be serving the test HTML file to any requests made using your domain name. Test this by navigating to:
http://<yourdomain.com>
It is useful to familiarise yourself with the important directories and files of Nginx.
Setting Up HTTPS
Install Certbot
Ensure packages are up-to-date:
sudo apt update
Install certbot
:
sudo apt install certbot
Check the Configuration of Nginx
Ensure that the enabled server block in
/etc/nginx/sites-available/<yourdomain-withoutTLD>
has
the sever_name
set appropriately:
... server_name <yourdomain.com> www.<yourdomain.com> ...
Update Firewall Settings
Previously, the firewall was set up to allow only Nginx HTTP. Running the command:
sudo ufw status
You should see at least the following:
Status: active To Action From -- ------ ---- Nginx HTTP ALLOW Anywhere Nginx HTTP (v6) ALLOW Anywhere (v6)
Allow both HTTPS and HTTP traffic:
sudo ufw allow 'Nginx Full'
Delete the redundant Nginx profile for HTTP only traffic:
sudo ufw delete allow 'Nginx HTTP'
Recheck the status of the firewall:
sudo ufw status
The output should include at least the following:
Status: active To Action From -- ------ ---- Nginx Full ALLOW Anywhere Nginx Full (v6) ALLOW Anywhere (v6)
Get SSL Certificates and Reconfigure Nginx for HTTPS
Use certbot
to generate the SSL certificates:
sudo certbot --nginx -d <yourdomain.com> -d <www.yourdomain.com>
By running certbot
with the Nginx configuration, it will handle
the necessary reconfiguration of Nginx for the two domain names given.
If this is the first time running certbot
, you will be prompted
to enter an email and agree to the terms of service. If you don't want to
enter your email, use the
--register-unsafely-without-email
flag in the above
certbot
command.
If given the option to force redirection of HTTP traffic to HTTPS, enable this feature.
Once complete, certbot
will tell you the process is complete
and where your SSL certificates are stored.
Confirm HTTPS has been configured correctly by navigating to:
htts://<yourdomain.com>
Verify Auto-Renewal of Certificates
Let's Encrypt certificates are only valid for 90 days to encourage users to
automate certificate renewal. The certbot
package takes care of
this by setting up a systemd
timer that runs twice daily to
automatically renew any certificate that is within 30 days of expiration.
Check the status of the timer:
sudo systemctl status certbot.timer
Test the renewal process works:
sudo certbot renew --dry-run
If automated renewals fail, Let's Encrypt will send a reminder if you configured certbot with your email. If not, the responsibility will be on you to check.
Remove .HTML Extension from URLs
A request URI is the absolute path URL string, possibly followed by a URL
query string, of the full URL given in the HTTP request. For example, the
absolute path URL string and URL query string are indicted by the
^
and *
, respectively, in the example below:
https://yourdomain.com/path/to/file?param=3#fragment ^^^^^^^^^^^^ *******
To force all URLs to not use the .html
extension, one can
rewrite the request URI and then tell the client's browser, via a 301 status
code, that the updated request URI (without the
.html
extension) should be used in future.
Edit your Nginx server block file:
sudo vim /etc/nginx/sites-available/<yourdomain-withoutTLD>
Replace the location block:
location / { try_files $uri $uri/ =404; }
With the following:
location / { if ($request_uri ~ ^/(.*)\.html(\?|$)) { return 301 /$1; } try_files $uri $uri.html $uri/ =404; }
Save and close the file. Reload Nginx:
sudo nginx -s reload