By Mindy Preston , Hannes Mehnert - 2015-07-07
Building a static website is one of the better-supported user stories for MirageOS, but it currently results in an HTTP-only site, with no capability for TLS. Although there's been a great TLS stack available for a while now, it was a bit fiddly to assemble the pieces of TLS, Cohttp, and the MirageOS frontend tool in order to construct an HTTPS unikernel. With MirageOS 2.5, that's changed! Let's celebrate by building an HTTPS-serving unikernel of our very own.
To serve HTTPS, we'll need a certificate to present to clients (i.e., browsers) for authentication and establishing asymmetric encryption. For just testing things out, or when it's okay to cause a big scary warning message to appear for anyone browsing a site, we can just use a self-signed certificate. Alternatively, the domain name registrar or hosting provider for a site will be happy to sell (or in some cases, give!) a certificate -- both options are explained in more detail below.
Whichever option you choose, you'll need to install
certify to get started (assuming you'd like to avoid using
openssl). To do so, pin the package in opam:
opam pin add certify https://github.com/yomimono/ocaml-certify.git opam install certify
It's not strictly necessary to get someone else to sign a certificate. We can create and sign our own certificates with the
selfsign command-line tool. The following invocation will create a secret key in
secrets/server.key and a public certificate for the domain
secrets/server.pem. The certificate will be valid for 365 days, so if you choose this option, it's a good idea set a calendar reminder to renew it if the service will be up for longer than that. The key generated will be a 2048-bit RSA key, although it's possible to create certificates valid for different lengths -- check
selfsign --help for more information.
selfsign -c secrets/server.pem -k secrets/server.key -d 365 totallyradhttpsunikernel.example
We can now use this key and certificate with
mirage-seal! See "Packaging Up an HTTPS Site with Mirage-Seal" below.
Although there are many entities that can sign a certificate with different processes, most have the following in common:
No matter whom we ask to sign a certificate, we'll need to generate a certificate signing request so the signer knows what to create. The
csr command-line tool can do this. The line below will generate a CSR (saved as server.csr) signed with a 2048-bit RSA key (which will be saved as server.key), for the organization "Rad Unikernel Construction, Ltd." and the common name "totallyradhttpsunikernel.example". For more information on
csr -c server.csr -k server.key totallyradhttpsunikernel.example "Rad Unikernel Construction, Ltd."
csr will generate a
server.csr that contains the certificate signing request for submission elsewhere.
My domain is registered through the popular registrar Gandi.net, who happen to give a free TLS certificate for one year with domain registration, so I elected to have them sign a certificate for me (Gandi did not pay a promotional consideration for this mention). Most of this process is managed through their web GUI and a fairly large chunk is automatically handled behind the scenes. Here's how you can do it too:
Log in to the web interface available through the registrar's website. You can start the certificate signing process from the "services" tab, which exposes an "SSL" subtab. Click that (Gandi doesn't need to know that we intend only to support TLS, not SSL). Hit the "Get an SSL Certificate" button. Standard SSL is fine. Even if you're entitled to a free certificate, it will appear that you need to pay here; however at checkout, the total amount due will be 0 in your preferred currency. Ask for a single address and, if you want to pay nothing, a valid period of 1 year.
Copy the content of the certificate-signing request you generated earlier and paste it into the web form. Gandi will also ask you to identify your TLS stack; unfortunately
ocaml-tls isn't in the drop-down menu, so choose OTHER (and perhaps send them a nice note asking them to add the hottest TLS stack on the block to their list). Click "submit" and click through the order form.
If you're buying a certificate for a domain you have registered through Gandi (via the registered account), the rest of the process is pretty automatic. You should shortly receive an e-mail with a subject like "Procedure for the validation of your Standard SSL certificate", which explains the process in more detail, but really all you need to do is wait a while (about 30 minutes, for me). After the certificate has been generated, Gandi will notify you by e-mail, and you can download your certificate from the SSL management screen. Click the magnifying glass next to the name of the domain for which you generated the cert to do so.
Once you've downloaded your certificate, you may also wish to append the intermediate certificates. Here's a help page on gathering intermediate certificates. Equipped with the intermediate certificates, append them to the signed certificate downloaded for your site to provide a full certificate chain:
cat signed_cert.pem intermediate_certs.pem > server.pem
Another free TLS certificate provider is StartSSL. During online registration, StartSSL will generate a TLS client certificate for you. This is used for authentication of yourself towards their service.
You need to validate that you own the domain you want to request a certificate for. This is done via the "Validations Wizard", which lets you choose to validate a domain via "Domain Name Validation". There you enter your domain name, and receive an eMail with a token which you have to enter into the web interface.
Once done, run
csr to create a key and a certificate signing request. Go to the "Certificates Wizard", select "Web Server SSL/TLS Certificate", skip the generation of the private key (you already generated one with
csr), copy and paste your certificate signing request (only the public key of that CSR is used, everything else is ignored), select a domain name, and immediately receive your certificate.
Make sure to also download their intermediate CA certificate, and append them:
cat intermediate.pem cert.pem > server.pem
Equipped with a private key and a certificate, let's make an HTTPS unikernel! First, use
opam to install
opam or other MirageOS tooling aren't set up yet, check out the instructions for getting started.
opam install mirage-seal
mirage-seal has a few required arguments.
--data: one directory containing all the content that should be served by the unikernel. Candidates for such a directory are the top-level output directory of a static site generator (such as
publicfor octopress), the
DocumentRootof an Apache configuration, or the
rootof an nginx configuration.
--keys: one directory containing the certificate (
server.pem) and key (
server.key) for the site.
There are also a number of configurable parameters for IP settings. By default,
mirage-seal will use DHCP to configure the network at boot. To set static IP information, use the
You'll find more thorough documentation by looking at
mirage-seal --help or mirage-seal's README file.
To build a Xen unikernel, select the Xen mode with
-t xen. In full, for a unikernel that will configure its network via DHCP:
mirage-seal --data=/home/me/coolwebsite/public --keys=/home/me/coolwebsite/secrets -t xen
mirage-seal will then generate a unikernel
mir-seal.xen and a Xen configuration file
seal.xl in the current working directory. To boot it and open the console (on a machine running Xen), invoke
xl create on the configuration file with the
sudo xl create seal.xl -c
Via the console, we can see the sealed unikernel boot and obtain an IP through DHCP. Congratulations -- you made a static site unikernel browsable over HTTPS!