<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/">
	<channel>
		<title><![CDATA[Indeks forum Nasze Pasieki - SSL]]></title>
		<link>https://naszepasieki.org/forum/</link>
		<description><![CDATA[Indeks forum Nasze Pasieki - https://naszepasieki.org/forum]]></description>
		<pubDate>Mon, 20 Apr 2026 01:40:41 +0000</pubDate>
		<generator>MyBB</generator>
		<item>
			<title><![CDATA[Instalacja Certyfikatu dla domeny https]]></title>
			<link>https://naszepasieki.org/forum/showthread.php?tid=229</link>
			<pubDate>Sat, 29 Oct 2022 14:27:19 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://naszepasieki.org/forum/member.php?action=profile&uid=1">matt</a>]]></dc:creator>
			<guid isPermaLink="false">https://naszepasieki.org/forum/showthread.php?tid=229</guid>
			<description><![CDATA[Ponizszy atrykól z linka : <a href="https://www.cloudbooklet.com/how-to-install-lets-encrypt-ssl-with-apache-on-debian-11/" target="_blank" rel="noopener" class="mycode_url">https://www.cloudbooklet.com/how-to-inst...debian-11/</a> podpunkt 6 <br />
<br />
<span style="font-weight: bold;" class="mycode_b">Step 1</span>: Install Let’s Encrypt SSL<br />
<br />
HTTPS is a protocol for secure communication between a server (instance) and a client (web browser). Due to the introduction of Let’s Encrypt, which provides free SSL certificates, HTTPS are adopted by everyone and also provides trust to your audiences.<br />
Here we will install Certbot to install Let’sEncrypt SSL using Snap.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">sudo apt update</span><br />
<span style="font-weight: bold;" class="mycode_b">sudo apt install snapd -y</span><br />
<span style="font-weight: bold;" class="mycode_b">sudo snap install core</span><br />
<span style="font-weight: bold;" class="mycode_b">sudo snap refresh core</span><br />
<br />
Install Certbot tool.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">sudo snap install --classic certbot</span><br />
<br />
Configure Certbot to be executable as as a command.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">sudo ln -s /snap/bin/certbot /usr/bin/certbot</span><br />
<br />
<br />
Now we have installed Certbot to install Let’s Encrypt for Debian 11.<br />
Execute the following command to install your certificates.<br />
<br />
<br />
<span style="font-weight: bold;" class="mycode_b">sudo certbot --apache --agree-tos --redirect -m youremail@email.com -d domainname.com -d <a href="http://www.domainname.com" target="_blank" rel="noopener" class="mycode_url">www.domainname.com</a></span><br />
<br />
<br />
Select the appropriate option and hit Enter<br />
This command will install Free SSL, configure redirection to HTTPS and restarts the Apache server.<br />
<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Step 2</span>: Renewing SSL Certificate<br />
Certificates provided by Let’s Encrypt are valid for 90 days only, so you need to renew them often. So, let’s test the renewal feature using the following command.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">sudo certbot renew --dry-run</span><br />
<br />
This command will test the certificate expiry and configures the auto-renewable feature.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Step: 3:</span> Test the Setup<br />
<br />
Once you have done the able steps you can create a new test HTML file in your web directory.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">sudo nano /var/www/html/domainname/public/index.html</span><br />
<br />
Paste the below code inside the file.<br />
<br />
<br />
&lt;!DOCTYPE html&gt;<br />
&lt;html&gt;<br />
    &lt;body&gt;<br />
        &lt;h1&gt;Test page with HTTPS&lt;/h1&gt;<br />
  &lt;/body&gt;<br />
&lt;/html&gt;<br />
Save the file.<br />
Now go ahead and check your domain name in browser (domainname.com).<br />
<br />
You will see that your domain got redirected to HTTPS and see the HTML output.<br />
Supercharge your <a href="https://click.linksynergy.com/deeplink?id=CsOszDAK/ss&amp;mid=39197&amp;murl=https%3A%2F%2Fwww.udemy.com%2Fcourses%2Fsearch%2F%3Fq%3Dlinux%2520administration%26src%3Dsac%26kw%3Dlinux%26p%3D1%26ratings%3D4.5" target="_blank" rel="noopener" class="mycode_url">Linux Administration Career</a> with completed training course and get your dream job.<br />
Conclusion<br />
Now you have learned how to install Let’s Encrypt Free SSL with Apache on Debian 11.<br />
Thanks for your time. If you face any problem or any feedback, please leave a comment below.]]></description>
			<content:encoded><![CDATA[Ponizszy atrykól z linka : <a href="https://www.cloudbooklet.com/how-to-install-lets-encrypt-ssl-with-apache-on-debian-11/" target="_blank" rel="noopener" class="mycode_url">https://www.cloudbooklet.com/how-to-inst...debian-11/</a> podpunkt 6 <br />
<br />
<span style="font-weight: bold;" class="mycode_b">Step 1</span>: Install Let’s Encrypt SSL<br />
<br />
HTTPS is a protocol for secure communication between a server (instance) and a client (web browser). Due to the introduction of Let’s Encrypt, which provides free SSL certificates, HTTPS are adopted by everyone and also provides trust to your audiences.<br />
Here we will install Certbot to install Let’sEncrypt SSL using Snap.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">sudo apt update</span><br />
<span style="font-weight: bold;" class="mycode_b">sudo apt install snapd -y</span><br />
<span style="font-weight: bold;" class="mycode_b">sudo snap install core</span><br />
<span style="font-weight: bold;" class="mycode_b">sudo snap refresh core</span><br />
<br />
Install Certbot tool.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">sudo snap install --classic certbot</span><br />
<br />
Configure Certbot to be executable as as a command.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">sudo ln -s /snap/bin/certbot /usr/bin/certbot</span><br />
<br />
<br />
Now we have installed Certbot to install Let’s Encrypt for Debian 11.<br />
Execute the following command to install your certificates.<br />
<br />
<br />
<span style="font-weight: bold;" class="mycode_b">sudo certbot --apache --agree-tos --redirect -m youremail@email.com -d domainname.com -d <a href="http://www.domainname.com" target="_blank" rel="noopener" class="mycode_url">www.domainname.com</a></span><br />
<br />
<br />
Select the appropriate option and hit Enter<br />
This command will install Free SSL, configure redirection to HTTPS and restarts the Apache server.<br />
<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Step 2</span>: Renewing SSL Certificate<br />
Certificates provided by Let’s Encrypt are valid for 90 days only, so you need to renew them often. So, let’s test the renewal feature using the following command.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">sudo certbot renew --dry-run</span><br />
<br />
This command will test the certificate expiry and configures the auto-renewable feature.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Step: 3:</span> Test the Setup<br />
<br />
Once you have done the able steps you can create a new test HTML file in your web directory.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">sudo nano /var/www/html/domainname/public/index.html</span><br />
<br />
Paste the below code inside the file.<br />
<br />
<br />
&lt;!DOCTYPE html&gt;<br />
&lt;html&gt;<br />
    &lt;body&gt;<br />
        &lt;h1&gt;Test page with HTTPS&lt;/h1&gt;<br />
  &lt;/body&gt;<br />
&lt;/html&gt;<br />
Save the file.<br />
Now go ahead and check your domain name in browser (domainname.com).<br />
<br />
You will see that your domain got redirected to HTTPS and see the HTML output.<br />
Supercharge your <a href="https://click.linksynergy.com/deeplink?id=CsOszDAK/ss&amp;mid=39197&amp;murl=https%3A%2F%2Fwww.udemy.com%2Fcourses%2Fsearch%2F%3Fq%3Dlinux%2520administration%26src%3Dsac%26kw%3Dlinux%26p%3D1%26ratings%3D4.5" target="_blank" rel="noopener" class="mycode_url">Linux Administration Career</a> with completed training course and get your dream job.<br />
Conclusion<br />
Now you have learned how to install Let’s Encrypt Free SSL with Apache on Debian 11.<br />
Thanks for your time. If you face any problem or any feedback, please leave a comment below.]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Generowanie i instalacja certyfikatu SSL na WWW]]></title>
			<link>https://naszepasieki.org/forum/showthread.php?tid=226</link>
			<pubDate>Wed, 26 Oct 2022 16:03:53 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://naszepasieki.org/forum/member.php?action=profile&uid=1">matt</a>]]></dc:creator>
			<guid isPermaLink="false">https://naszepasieki.org/forum/showthread.php?tid=226</guid>
			<description><![CDATA[<div class="codeblock"><div class="title">Kod:</div><div class="body" dir="ltr"><code>openssl genrsa -des3 -out www.varlog.pl.key 2048</code></div></div><br />
<br />
<div class="codeblock"><div class="title">Kod:</div><div class="body" dir="ltr"><code>Mając klucz, możemy wygenerować CSR, czyli żądanie certyfikatu:<br />
# openssl req -new -key www.varlog.pl.key -out www.varlog.pl.csr</code></div></div><br />
<div class="codeblock"><div class="title">Kod:</div><div class="body" dir="ltr"><code>Po wygenerowaniu CSR na wszelki wypadek powinniśmy sprawdzić, czy nie ma w nim żadnej pomyłki. Do sprawdzenia służy polecenie:<br />
# openssl req -in www.varlog.pl.csr -text</code></div></div><br />
<br />
<br />
<div class="codeblock"><div class="title">Kod:</div><div class="body" dir="ltr"><code>Dane certyfikatu możemy wyświetlić przy użyciu polecenia openssl:<br />
# openssl x509 -in www.varlog.pl.crt -text</code></div></div><br />
<br />
wiecesz szczególowego opisu ponizej w linku<br />
<br />
<a href="https://niebezpiecznik.pl/post/generowanie-i-instalacja-certyfikatu-ssl-na-serwerze-www/#:~:text=Aby%20zdobyć%20certyfikat%20SSL%20ptrzebujemy,opensourceo%27wego%20i%20multiplatformowego%20narzędzia" target="_blank" rel="noopener" class="mycode_url">https://niebezpiecznik.pl/post/generowan...0narzędzia</a>.]]></description>
			<content:encoded><![CDATA[<div class="codeblock"><div class="title">Kod:</div><div class="body" dir="ltr"><code>openssl genrsa -des3 -out www.varlog.pl.key 2048</code></div></div><br />
<br />
<div class="codeblock"><div class="title">Kod:</div><div class="body" dir="ltr"><code>Mając klucz, możemy wygenerować CSR, czyli żądanie certyfikatu:<br />
# openssl req -new -key www.varlog.pl.key -out www.varlog.pl.csr</code></div></div><br />
<div class="codeblock"><div class="title">Kod:</div><div class="body" dir="ltr"><code>Po wygenerowaniu CSR na wszelki wypadek powinniśmy sprawdzić, czy nie ma w nim żadnej pomyłki. Do sprawdzenia służy polecenie:<br />
# openssl req -in www.varlog.pl.csr -text</code></div></div><br />
<br />
<br />
<div class="codeblock"><div class="title">Kod:</div><div class="body" dir="ltr"><code>Dane certyfikatu możemy wyświetlić przy użyciu polecenia openssl:<br />
# openssl x509 -in www.varlog.pl.crt -text</code></div></div><br />
<br />
wiecesz szczególowego opisu ponizej w linku<br />
<br />
<a href="https://niebezpiecznik.pl/post/generowanie-i-instalacja-certyfikatu-ssl-na-serwerze-www/#:~:text=Aby%20zdobyć%20certyfikat%20SSL%20ptrzebujemy,opensourceo%27wego%20i%20multiplatformowego%20narzędzia" target="_blank" rel="noopener" class="mycode_url">https://niebezpiecznik.pl/post/generowan...0narzędzia</a>.]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Tutorial Apache - Enable HTTPS]]></title>
			<link>https://naszepasieki.org/forum/showthread.php?tid=225</link>
			<pubDate>Wed, 26 Oct 2022 15:59:30 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://naszepasieki.org/forum/member.php?action=profile&uid=1">matt</a>]]></dc:creator>
			<guid isPermaLink="false">https://naszepasieki.org/forum/showthread.php?tid=225</guid>
			<description><![CDATA[<div class="codeblock"><div class="title">Kod:</div><div class="body" dir="ltr"><code>apt-get update<br />
apt-get install apache2 openssl</code></div></div><br />
<br />
<br />
<div class="codeblock"><div class="title">Kod:</div><div class="body" dir="ltr"><code>apt-get update<br />
apt-get install apache2 openssl</code></div></div><br />
<br />
<div class="codeblock"><div class="title">Kod:</div><div class="body" dir="ltr"><code>sudo nano /etc/apache2/apache2.conf</code></div></div><br />
<span style="font-weight: bold;" class="mycode_b">write</span><br />
<br />
&lt;Directory /var/www/html&gt;<br />
AllowOverride All<br />
&lt;/Directory&gt;<br />
<br />
<br />
<div class="codeblock"><div class="title">Kod:</div><div class="body" dir="ltr"><code>mkdir /etc/apache2/certificate<br />
cd /etc/apache2/certificate<br />
# sudo openssl req -new -newkey rsa:4096 -x509 -sha256 -days 365 -nodes -out apache-certificate.crt -keyout apache.key</code></div></div><br />
<div class="codeblock"><div class="title">Kod:</div><div class="body" dir="ltr"><code>sudo nano /etc/apache2/sites-enabled/000-default.conf</code></div></div><br />
<br />
Write :<br />
<br />
&lt;VirtualHost *:80&gt;<br />
        ServerAdmin webmaster@localhost<br />
        DocumentRoot /var/www/html<br />
        ErrorLog &#36;{APACHE_LOG_DIR}/error.log<br />
        CustomLog &#36;{APACHE_LOG_DIR}/access.log combined<br />
&lt;/VirtualHost&gt;<br />
<br />
<br />
<span style="font-weight: bold;" class="mycode_b"> &lt;VirtualHost *:443&gt;</span><br />
<span style="font-weight: bold;" class="mycode_b">        ServerAdmin webmaster@localhost</span><br />
<span style="font-weight: bold;" class="mycode_b">        DocumentRoot /var/www/html</span><br />
<span style="font-weight: bold;" class="mycode_b">        ErrorLog &#36;{APACHE_LOG_DIR}/error.log</span><br />
<span style="font-weight: bold;" class="mycode_b">        CustomLog &#36;{APACHE_LOG_DIR}/access.log combined</span><br />
<span style="font-weight: bold;" class="mycode_b">        SSLEngine on</span><br />
<span style="font-weight: bold;" class="mycode_b">        SSLCertificateFile /etc/apache2/certificate/apache-certificate.crt  </span><br />
<span style="font-weight: bold;" class="mycode_b">        SSLCertificateKeyFile /etc/apache2/certificate/apache.key</span><br />
<span style="font-weight: bold;" class="mycode_b">&lt;/VirtualHost&gt;</span><br />
<br />
<br />
<br />
<div class="codeblock"><div class="title">Kod:</div><div class="body" dir="ltr"><code>service apache2 restart</code></div></div><br />
<br />
wiecej na ten temat w ponizszym linku <br />
<br />
<a href="https://techexpert.tips/apache/enable-https-apache/" target="_blank" rel="noopener" class="mycode_url">https://techexpert.tips/apache/enable-https-apache/</a><br />
<br />
Lub tutaj : <a href="https://linuxhint.com/enable-https-apache-web-server/" target="_blank" rel="noopener" class="mycode_url">https://linuxhint.com/enable-https-apache-web-server/</a>]]></description>
			<content:encoded><![CDATA[<div class="codeblock"><div class="title">Kod:</div><div class="body" dir="ltr"><code>apt-get update<br />
apt-get install apache2 openssl</code></div></div><br />
<br />
<br />
<div class="codeblock"><div class="title">Kod:</div><div class="body" dir="ltr"><code>apt-get update<br />
apt-get install apache2 openssl</code></div></div><br />
<br />
<div class="codeblock"><div class="title">Kod:</div><div class="body" dir="ltr"><code>sudo nano /etc/apache2/apache2.conf</code></div></div><br />
<span style="font-weight: bold;" class="mycode_b">write</span><br />
<br />
&lt;Directory /var/www/html&gt;<br />
AllowOverride All<br />
&lt;/Directory&gt;<br />
<br />
<br />
<div class="codeblock"><div class="title">Kod:</div><div class="body" dir="ltr"><code>mkdir /etc/apache2/certificate<br />
cd /etc/apache2/certificate<br />
# sudo openssl req -new -newkey rsa:4096 -x509 -sha256 -days 365 -nodes -out apache-certificate.crt -keyout apache.key</code></div></div><br />
<div class="codeblock"><div class="title">Kod:</div><div class="body" dir="ltr"><code>sudo nano /etc/apache2/sites-enabled/000-default.conf</code></div></div><br />
<br />
Write :<br />
<br />
&lt;VirtualHost *:80&gt;<br />
        ServerAdmin webmaster@localhost<br />
        DocumentRoot /var/www/html<br />
        ErrorLog &#36;{APACHE_LOG_DIR}/error.log<br />
        CustomLog &#36;{APACHE_LOG_DIR}/access.log combined<br />
&lt;/VirtualHost&gt;<br />
<br />
<br />
<span style="font-weight: bold;" class="mycode_b"> &lt;VirtualHost *:443&gt;</span><br />
<span style="font-weight: bold;" class="mycode_b">        ServerAdmin webmaster@localhost</span><br />
<span style="font-weight: bold;" class="mycode_b">        DocumentRoot /var/www/html</span><br />
<span style="font-weight: bold;" class="mycode_b">        ErrorLog &#36;{APACHE_LOG_DIR}/error.log</span><br />
<span style="font-weight: bold;" class="mycode_b">        CustomLog &#36;{APACHE_LOG_DIR}/access.log combined</span><br />
<span style="font-weight: bold;" class="mycode_b">        SSLEngine on</span><br />
<span style="font-weight: bold;" class="mycode_b">        SSLCertificateFile /etc/apache2/certificate/apache-certificate.crt  </span><br />
<span style="font-weight: bold;" class="mycode_b">        SSLCertificateKeyFile /etc/apache2/certificate/apache.key</span><br />
<span style="font-weight: bold;" class="mycode_b">&lt;/VirtualHost&gt;</span><br />
<br />
<br />
<br />
<div class="codeblock"><div class="title">Kod:</div><div class="body" dir="ltr"><code>service apache2 restart</code></div></div><br />
<br />
wiecej na ten temat w ponizszym linku <br />
<br />
<a href="https://techexpert.tips/apache/enable-https-apache/" target="_blank" rel="noopener" class="mycode_url">https://techexpert.tips/apache/enable-https-apache/</a><br />
<br />
Lub tutaj : <a href="https://linuxhint.com/enable-https-apache-web-server/" target="_blank" rel="noopener" class="mycode_url">https://linuxhint.com/enable-https-apache-web-server/</a>]]></content:encoded>
		</item>
	</channel>
</rss>