Serving EC2 traffic over HTTPS

mbadola

Mayank Badola

Posted on June 12, 2020

Serving EC2 traffic over HTTPS

Prologue

You may skip this section if you're aware of how a HTTPS connection works.

As developers, we need to ensure that interactive web applications can securely transmit data (HTTPS) over public network. Systems achieve this using Transport Layer Security (TLS), a successor to the widely known Secure Sockets Layer (SSL) protocol.

In crude terms, TLS (handshake) is an encryption mechanism, where participants decide on a few parameters to setup a secure connection.

So how do the actors (systems) make this decision?
They do it by using a TLS certificate.

A certificate is an integral part of spinning up a HTTPS server. Anyone can create a certificate and provision a HTTPS-complaint actor using it, but since no one is a trusted entity on the internet, using a self-signed certificate to setup a secure connection is not recommended.

Self-Signed Certificate Chrome Warning

To be able to serve HTTPS traffic, your server needs a TLS certificate signed by a certificate/certification authority (CA). These authorities perform the role of a trustworthy third party between two participants that don't trust each other.

In this post, we'll look at how to generate and use TLS certificates from LetsEncrypt and AWS Certificate Manager.


Pre-requisites

If you are student, check out this amazing initiative from GitHub. You should be able to setup the pre-requisites for free using the promotions available as a part of the student developer program.

  • Provision an EC2 instance
    Follow this extensive documentation to create a compute resource on AWS.

    For our exercise, you can select t2.nano as the instance type (cheapest option, unless you qualify for the free tier usage) and Ubuntu 18.04 as the AMI.

    As you configure your instance, do not forget to setup/assign a security group policy that allows inbound connections to port 22, 80 and 443,  
      
    Security Group Inbound Rules  
    and make sure AWS launches your instance with a public IP address (verify on EC2 dashboard).
       Instance Description  
    Keep the instance IP address handy, along with the SSH key you generated/assigned.

  

  • Deploy an application
    Refer to this document if you're not familiar with how to remotely access your EC2 instance. As an example, we will be deploying (executing) a "hello world" node(js) web application using SSH.

    We are using a linux-based system for our exercise.

    Open a terminal and execute the following command :
    ssh -i /path/to/ssh-key-name.pem ubuntu@instance-public-ip-addr
      

    EC2 ssh  
    If you see something like the above screenshot, you've successfully connected to your EC2 instance. Let's run a few commands now, to deploy our example application.

    
    
    # Update platform package manager
    sudo apt-get update
    
    # Install Node Package Manager
    sudo apt-get install npm
    
    # Download application codebase
    git clone https://github.com/fhinkel/nodejs-hello-world.git
    
    # Navigate into codebase directory
    cd nodejs-hello-world
    
    # Download application dependencies
    npm install
    
    # Execute the application
    sudo npm start > /dev/null 2>&1 &
    
    # Terminate connection to the instance
    exit
    
    If you were successfully able to execute the above commands, go ahead and open a browser on your system. Type in your instance's public IP address and trigger a search. What do you see?

  
    ![Not Secure Hello World](https://dev-to-uploads.s3.amazonaws.com/i/cfdt71gearf6mjnozjd1.png)

- **Get a domain name**
For demonstration, we will be using [Namecheap](https://www.namecheap.com/) as our [domain name registrar](https://en.wikipedia.org/wiki/Domain_name_registrar) but feel free to purchase your domain from any other provider. Just make sure to opt-out of any hosting add-ons as AWS is already the host for your application.

  
## How To ([LetsEncrypt](https://letsencrypt.org/))

I'll be generating a LetsEncrypt-issued certificate for **_test.mayankbadola.com_** (managed through [Namecheap](https://www.namecheap.com/)) and use it to interact with our application over HTTPS. You can follow similar steps for your domain.

### Point your domain to the EC2 instance

> You might have to wait for upto one hour, as DNS entries takes time to propagate

- Get to domain management page
![Namecheap dashboard](https://dev-to-uploads.s3.amazonaws.com/i/orq8sh35ovz5o3ojwwb5.png)  

- Open DNS settings
![Namecheap advanced DNS](https://dev-to-uploads.s3.amazonaws.com/i/f03zlhzfbk5sffw9cv37.png)  

- Add a type "A" record with the value as the public IP address of your EC2 instance. The host field maps to the sub-domain, so I've put "test" there. If you're mapping the instance to your apex domain, put a "@" instead (or whatever your registrar interprets as the apex domain).
![DNS entry](https://dev-to-uploads.s3.amazonaws.com/i/jaoyrn65s1kyypig45i7.png)  

- Visit your URL
![Hello world with domain](https://dev-to-uploads.s3.amazonaws.com/i/ag2rsu07ligcmlf0ruhm.png)

### Setup [Nginx](https://www.nginx.com/)
Nginx will serve as a reverse proxy, so we'll have to stop our application for a bit (as it is currently listening on port 80) and update it to start listening on port 8080.

Log into your instance using SSH and leverage the following commands to achieve the above.

Enter fullscreen mode Exit fullscreen mode

Stop the application using the PID of your application

ps -aux | grep node

root 8217 0.0 5.9 922544 29228 ? Sl 09:26 0:00 node index.js

sudo kill -9 [application_pid]

Use vim to update port (from 80 to 8080) for your application

You can choose any port which is not accessible from outside the instance

Navigate to your codebase directory first

vim index.js

Restart the application

sudo npm start > /dev/null 2>&1 &

Install and start nginx

sudo apt-get install nginx

![Insecure Nginx Welcome](https://dev-to-uploads.s3.amazonaws.com/i/uimcbxk9ztkrw5mdpted.png)

### Provision (and Install) the Certificate
We will use [Certbot](https://certbot.eff.org/) to issue certificates signed by LetsEncrypt.

Enter fullscreen mode Exit fullscreen mode

Add certbot PPA

sudo apt-get install software-properties-common
sudo add-apt-repository ppa:certbot/certbot
sudo apt-get update

Install certbot

sudo apt-get install certbot python3-certbot-nginx

Get certificates and setup for use with nginx

When prompted, setup redirection of port 80 to 443

that will upgrade HTTP request to HTTPS

sudo certbot --nginx


![Certificate](https://dev-to-uploads.s3.amazonaws.com/i/pxpok2rv0szmdq7b2ile.png)

Nginx should now be serving its static page over HTTPS, but we want to serve our application instead, so let's add a routing rule for that.

Open nginx configuration

`sudo vim /etc/nginx/sites-available/default`

and replace existing settings within the "location /" section of the port 443 listener, with the following :

Enter fullscreen mode Exit fullscreen mode

proxy_pass http://localhost:8080;
proxy_http_version 1.1;
proxy_set_header Upgrade $http_upgrade;
proxy_set_header Connection 'upgrade';
proxy_set_header Host $host;
proxy_cache_bypass $http_upgrade;


Save this file and restart nginx.

`sudo systemctl restart nginx`

At this point, you've installed a TLS certificate on nginx, added a redirection for port 80 traffic to port 443 and are forwarding port 443 traffic to port 8080.

Time to visit your secure application. Don't forget the _https://_ prefix!

![Secure Hello World with LetsEncrypt](https://dev-to-uploads.s3.amazonaws.com/i/uf756g7p4kbfdkduhxow.png)

### Retrospection
* Generating certificates using LetsEncrypt is hosting agnostic. If you have a public IP address, a domain and SSH access to your deployment environment, you can generate a TLS certificate for your application.
* We were using nginx because of the certbot nginx setup which renews certificates automatically and reloads nginx configuration. You can run a "https" server as well but then you'd miss out on the automated renewed certificate reload.
* This example works for a "hack" as having nginx on the same instance as your application is not a scalable setup. If you want to scale, better to provision an instance which uses nginx to do load balancing as well for your application stack.
* We had to do instance bootstrapping (run scripts) in order to enable HTTPS connectivity. There will be effort involved to automate all of those steps.


  
## How To ([AWS Certificate Manager](https://aws.amazon.com/certificate-manager/))

In this exercise, we'll be generating an Amazon-issued certificate for **_*.mayankbadola.me_** (managed through [Namecheap](https://www.namecheap.com/)) and use it to interact with our application through **_https://test.mayankbadola.me_**. The (\*) implies that the certificate can be used to identify all of the sub-domains of **_mayankbadola.me_**. So, we can re-use this same certificate across multiple applications, as long as they are fronted by **_(\*.)mayankbadola.me_**.

### Provision Certificate
Visit [ACM dashboard](https://us-west-2.console.aws.amazon.com/acm/home?region=us-west-2#/) and "Request a certificate".

![Request a certificate](https://dev-to-uploads.s3.amazonaws.com/i/kpb95uo7kyntsq3cf7hz.png)

By default, you'll be provisioning a public certificate, which is what we want.

![Request public cert](https://dev-to-uploads.s3.amazonaws.com/i/vixt76fr4kg188ci9nj8.png)

**Step 1**
![Step 1](https://dev-to-uploads.s3.amazonaws.com/i/qji095w949d8q1roh0p9.png)

**Step 2**
![Step 2](https://dev-to-uploads.s3.amazonaws.com/i/txynbdonp7ganeawn3rw.png)

Finish the rest of the steps (fast-forward to Step 5), where ACM will provide you a "CNAME" record that needs to be added to your domain's DNS configuration.

![CNAME entry](https://dev-to-uploads.s3.amazonaws.com/i/6ctv959tzzkqdjf5atzm.png)

Visit your domain's DNS settings page and add the "CNAME" entry requested by ACM.

![ACM CNAME Record](https://dev-to-uploads.s3.amazonaws.com/i/fspmk3hjkrryv4rl3ewm.png)

The "Name" provided by AWS is actually a sub-domain ACM will use to verify that you own the domain you've requested the certificate for. As my domain (_mayankbadola.me_) is managed through Namecheap, while adding the CNAME record, I will take out the sub-domain prefix from the "Name" field (everything before ".mayankbadola.me.") to insert into the "Host" entry. The "Value" field will be copied over as-is.

Wait for the usual DNS propagation delays for the certificate status to change from Pending to Issued.

![Certificate ACM](https://dev-to-uploads.s3.amazonaws.com/i/kg4akw1ypc38e4raxi1l.png)

We will now install this certificate for use with your application.

### Create a Load Balancer and attach our EC2 instance to it
Let's [provision a load balancer](https://us-west-2.console.aws.amazon.com/ec2/v2/home?region=us-west-2#LoadBalancers:sort=loadBalancerName) which will take care of managing a secure connection on behalf of our application and forward HTTP requests to our EC2 instance.

![Load Balancer Create](https://dev-to-uploads.s3.amazonaws.com/i/vsvshxzmyisuttq74s61.png)

For our exercise, we will create a classic load balancer.

![CLB](https://dev-to-uploads.s3.amazonaws.com/i/cyzjfp6gij08ufm2zxd3.png)

**Step 1**
Assign a name to your load balancer and update the incoming load balancer protocol (HTTPS) and the instance protocol (HTTP).

![LB Step 1](https://dev-to-uploads.s3.amazonaws.com/i/x6pgg08ucqa84gf1pzxr.png)

**Step 2**
Add a security group which allows inbound connections to port 443 (HTTPS) and outbound connections to port 80 (HTTP).

**Step 3**
Select "Choose a certificate from ACM" and assign the certificate we provisioned using ACM. For now, you can ignore cipher settings.

![LB Step 3](https://dev-to-uploads.s3.amazonaws.com/i/yjif405lp3tsqa4jindv.png)

**Step 4**
Just update the ping path to "/" and continue to the next step.

**Step 5**
Select the EC2 instance where your application is running.

![LB Step 5](https://dev-to-uploads.s3.amazonaws.com/i/kjoyiyzofkjnn0f6edxd.png)

Skip through the rest of the steps and submit the LB creation request. In a few seconds, you should have the load balancer ready.

![LB Created](https://dev-to-uploads.s3.amazonaws.com/i/veehtv41vp85le6qg5rp.png)

We now have to map our domain name to the load balancer's DNS name. You can find the DNS name within the description section for the load balancer.

![LB DNS name](https://dev-to-uploads.s3.amazonaws.com/i/ll4lrbnoejmysug55c42.png)

Create a CNAME record on your domain's DNS settings page mapping a domain entry to the load balancer's DNS name.

> I'm adding an entry for test.mayankbadola.me

![LB CNAME entry](https://dev-to-uploads.s3.amazonaws.com/i/7phevgcfuaocjhqh371w.png)

That's it! We've successfully setup a secure connection to our application using AWS Certificate Manager.

![Secure Hello World with ACM](https://dev-to-uploads.s3.amazonaws.com/i/uf756g7p4kbfdkduhxow.png)

### Retrospection
* ACM automatically renews certificates.
* Generating certificates using ACM is pretty straight-forward and doesn't need any bootstrapping effort. As ACM is free and it integrates well with AWS, I would recommend you to use ACM if AWS is your infrastructure provider.
* In our example, we've exposed our instance to internet traffic on port 80, which means that it is possible to by-pass our secure connection. Ideally, you have to make sure that the instances are not accessible from the outside world. That way, only the load-balancer will be the ingress point for public traffic for our application.
* You can automate all of these steps quite easily if your domain is managed through [Route53](https://aws.amazon.com/route53/).


  
## Conclusion

I hope this post was able to explain briefly how "HTTPS" works and what does it take to enable it for your applications, although, be careful with using the exact setups shared in this post for your production applications.

Alternatively, if this is too much of an infrastructure hassle and you're a frontend developer, I recently got acquainted to [NextJS](https://nextjs.org/), which just might be the answer you need.

Thanks for your time and interest!

---



Enter fullscreen mode Exit fullscreen mode
💖 💪 🙅 🚩
mbadola
Mayank Badola

Posted on June 12, 2020

Join Our Newsletter. No Spam, Only the good stuff.

Sign up to receive the latest update from our blog.

Related