Cockpit usually requires that web browsers communicate with it using HTTPS, for security reasons.
Cockpit listens for both HTTP and HTTPS connections on the same port, by default 9090. If an HTTP connection is made, Cockpit will redirect that connection to HTTPS. There are some exceptions:
If an HTTP connection comes from
127.0.0.0/8
, then Cockpit will allow communication without redirecting to HTTPS.Certain URLs, like
/ping
are not required to use HTTPS.
This behavior can be overridden by setting the
AllowUnencrypted
option in cockpit.conf
.
Cockpit will load a certificate from the /etc/cockpit/ws-certs.d
directory. It will use the last file with a .cert
or .crt
extension in alphabetical order. The file should contain one or more OpenSSL
style BEGIN CERTIFICATE
blocks for the server certificate and
the intermediate certificate authorities.
The private key can either be contained in the same .cert
/.crt
file as an additional BEGIN PRIVATE KEY
or similar block, or in
a separate file with the same name as the certificate, but with a .key
suffix instead. The key must not be encrypted. For example, a merged file looks like this:
-----BEGIN CERTIFICATE----- MIIDUzCCAjugAwIBAgIJAPXW+CuNYS6QMA0GCSqGSIb3DQEBCwUAMD8xKTAnBgNV BAoMIGI0OGE2NGNkNmMwNTQ1YThhZTgxOTEzZDE5YmJjMmRjMRIwEAYDVQQDDAls ... -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- MIIDUzCCAjugAwIBAgIJAPXW+CuNYS6QMA0GCSqGSIb3DQEBCwUAMD8xKTAnBgNV BAoMIGI0OGE2NGNkNmMwNTQ1YThhZTgxOTEzZDE5YmJjMmRjMRIwEAYDVQQDDAls ... -----END CERTIFICATE----- -----BEGIN PRIVATE KEY----- MIIEvgIBADANBgkqhkiG9w0BAQEFAASCBKgwggSkAgEAAoIBAQCyOJ5garOYw0sm 8TBCDSqQ/H1awGMzDYdB11xuHHsxYS2VepPMzMzryHR137I4dGFLhvdTvJUH8lUS ... -----END PRIVATE KEY-----
Note that for EC keys, the BEGIN EC PARAMETERS
block must occur
before the BEGIN EC PRIVATE KEY
block (this
is how OpenSSL, LetsEncrypt, etc. generate the key files).
If no certificate is found, a self-signed certificate is created and
stored in the 0-self-signed.cert
file. On some
platforms, Cockpit will also generate a ca.crt in that directory, which
may be safely imported into client browsers.
To check which certificate cockpit-ws
will use run
the following command.
$ sudo /usr/libexec/cockpit-certificate-ensure --check
Or, on Debian-based systems:
$ sudo /usr/lib/cockpit/cockpit-certificate-ensure --check
If using certmonger
to manage certificates, following command can
be used to automatically prepare concatenated .cert file:
CERT_FILE=/etc/pki/tls/certs/$(hostname).pem KEY_FILE=/etc/pki/tls/private/$(hostname).key getcert request -f ${CERT_FILE} -k ${KEY_FILE} -D $(hostname --fqdn) -C "sed -n w/etc/cockpit/ws-certs.d/50-from-certmonger.cert ${CERT_FILE} ${KEY_FILE}"