{"id":43,"date":"2006-01-22T21:34:42","date_gmt":"2006-01-22T20:34:42","guid":{"rendered":"http:\/\/blog.blackdown.de\/2006\/01\/22\/securing-wordpress-2-admin-access-with-ssl\/"},"modified":"2016-10-29T03:51:01","modified_gmt":"2016-10-29T01:51:01","slug":"securing-wordpress-2-admin-access-with-ssl","status":"publish","type":"post","link":"https:\/\/blackdown.de\/articles\/securing-wordpress-2-admin-access-with-ssl\/","title":{"rendered":"Securing WordPress 2 Admin Access With SSL"},"content":{"rendered":"
A few people have asked for an updated version of my Securing WordPress Admin Access With SSL<\/a> guide. So here is an updated version for WordPress<\/a> 2!<\/p>\n The situation has not changed much since WordPress 1.5: WordPress 2.0 still does not support HTTPS access to the admin area when the rest of the blog is served via normal HTTP and I still do not like logging in to my server over unencrypted connections, especially not when using public WLANs. Getting around this WordPress limitation requires quite a few steps:<\/p>\n All communication involving passwords or authentication cookies should be done over HTTPS connections. Note: This documentation assumes a Debian<\/a> sarge installation with Apache<\/a> 2. Some things, in particular Apache module related ones, will be different on other systems. Then import The patch is against svn<\/a> version 3825 of WordPress (ie. WordPress 2.0.3), when you apply it to a newer version, you will likely get some harmless \u2018 The module gets enabled automatically after installation.<\/p>\n<\/li>\n Debian provides sane default configurations for both modules. You might want to take a look at the configuration files ( in February 1st, 2006:<\/strong> wp2-ssl.patch<\/a> updated for WordPress 2.0.1<\/a><\/em><\/p>\n March 11st, 2006:<\/strong> WordPress 2.0.2<\/a> has been released, fixing some security issues. The HTTPS patch still applies fine to that version.<\/em><\/p>\n March 19th, 2006:<\/strong> Updated wp2-ssl.patch<\/a>. Changes: Fix bug in list-manipulation.php, use HTTPS for ‘Login’ and ‘Register’ links, backport ‘Mark-as-Spam’ feature from trunk<\/em><\/p>\n May 1st, 2006:<\/strong> WordPress 2.0.3<\/a> has been released. Here is the updated wp2-ssl.patch<\/a>.<\/em><\/p>\n July 29th, 2006:<\/strong> WordPress 2.0.4<\/a> has been released, fixing some security issues. Here is an updated version of the wp2-ssl.patch<\/a>.<\/em><\/p>\n January 12st, 2007:<\/strong> wp2-ssl.patch<\/a> updated for 2.0.6 and 2.0.7-RC1<\/em><\/p>\n January 15st, 2007:<\/strong> WordPress 2.0.7<\/a> has been released. The patch still applies fine to that version.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":" A few people have asked for an updated version of my Securing WordPress Admin Access With SSL guide. So here is an updated version for WordPress 2! The situation has not changed much since WordPress 1.5: WordPress 2.0 still does not support HTTPS access to the admin area when the rest of the blog isThe Goal<\/h3>\n
wp-login.php<\/code> and the
wp-admin<\/code> directory should only be accessible over HTTPS.
\nNormal reading access, as well as comments, tracebacks, and pingbacks still should go over ordinary HTTP.<\/p>\nThe Plan<\/h3>\n
\n
The Implementation<\/h3>\n
\nThe server used throughout the instructions is example.org\/192.0.34.166. The server’s DocumentRoot<\/code> is \/blog and WordPress resides in \/blog\/wp. The value of WordPress’
home<\/code> option is ‘http:\/\/example.org’ and the value of its
site_url<\/code> option is ‘http:\/\/example.org\/wp’.<\/p>\n
\n
\n
$ openssl pkcs12 -export -clcerts \\r\n -in blogclient.cert \\r\n -inkey blogclient.key \\r\n -out blogclient.p12<\/pre>\n
blogclient.p12<\/code> into your browser.<\/p>\n<\/li>\n<\/ul>\n<\/li>\n
\nApply this patch<\/a> to the WordPress code. It makes the following changes:<\/p>\n\n
wp_setcookie()<\/code><\/li>\n
check_admin_referer()<\/code> work with HTTPS URLs<\/li>\n
wp-login.php<\/code><\/li>\n
Hunk succeeded<\/code>\u2019 message. If you are getting \u2018
Hunk FAILED<\/code>\u2019 message, just send me note and I’ll update the patch.<\/p>\n<\/li>\n
\n
$ aptitude install libapache2-mod-proxy-html<\/pre>\n
$ a2enmod proxy\r\n$ a2enmod ssl<\/pre>\n
ssl.conf<\/code> and
proxy.conf<\/code>) nevertheless.
\nI have changed SSLCipherSuite<\/code> to<\/p>\n
TLSv1:SSLv3:!SSLv2:!aNULL:!eNULL:!NULL:!EXP:!DES:!MEDIUM:!LOW:@STRENGTH<\/pre>\n
ssl.conf<\/code> in order to just allow TLS v1 and SSL v3 ciphers which provide strong encryption and authentication (see ciphers(1)<\/a>).<\/p>\n<\/li>\n
$ a2enmod headers<\/pre>\n<\/li>\n<\/ul>\n<\/li>\n
$ cat > \/etc\/apache2\/conf.d\/ssl.conf << EOF\r\n<IfModule mod_ssl.c>\r\n\tListen 443\r\n<\/IfModule>\r\nEOF<\/pre>\n<\/li>\n
wp-login.php<\/code> and
wp-admin<\/code> to the local host. Also completely deny access to files which should never be accessed directly. Here is an example:
10-wp2-example.org<\/code><\/a><\/li>\n
20-wp2-example.org-ssl<\/code><\/a>
\nIf you are compressing WordPress output you have to enable the RequestHeader<\/code> line.\n<\/li>\n
$ a2ensite 20-blog-ssl\r\n$ \/etc\/init.d\/apache2 restart<\/pre>\n<\/li>\n
[→ Read the rest of this entry<\/a>]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false,"jetpack_publicize_feature_enabled":true},"categories":[6,3,2,8,20],"tags":[],"yoast_head":"\n\n\n\n\n\n\n\n\n\n\n\n\n\t\n\t\n\t\n