Last week on Twitter @getify started an excellent thread pointing out that we should be using even on our local machines. Why?

You want your local web development set up to reflect your production reality as much as possible. URL parsing, routing, redirects, avoiding mixed-content warnings, etc. It’s very easy to accidentally find oneself on http:// when everything in 2018 should be under https://.

I’m using ASP.NET 2.1 which makes local super easy. After installing from http://dot.net I’ll “dotnet new razor” in an empty folder to make a quick web app.

Then, when I “dotnet run” I see two URLs serving pages:

C:UsersscottDesktoplocalsslweb> dotnet run
Hosting environment: Development
Content root path: C:UsersscottDesktoplocalsslweb
Now listening on: https://localhost:5001
Now listening on: http://localhost:5000
Application started. Press Ctrl+C to shut down.

One is HTTP over port 5000 and the other is HTTPS over 5001. However, if I hit https://localhost:5001, I may see an error:

Your connection to this site is not secure

That’s because this is an untrusted SSL cert that was generated :

Untrusted cert

There’s a dotnet global tool built into .NET Core 2.1 to help with at dev time, called “dev-.”

C:Usersscott> dotnet dev-certs https --help

Usage: dotnet dev-certs https [options]

Options:
-ep|--export-path Full path to the exported certificate
-p|--password Password to use when exporting the certificate with the private key into a pfx file
-c|--check Check for the existence of the certificate but do not perform any action
--clean Cleans all HTTPS development certificates from the machine.
-t|--trust Trust the certificate on the current platform
-v|--verbose Display more debug information.
-q|--quiet Display warnings and errors only.
-h|--help Show help information

I just need to run “dotnet dev-certs https –trust” and I’ll get a pop up asking if I want to trust this localhost cert..

You want to trust this local cert?

On Windows it’ll get added to the certificate store and on Mac it’ll get added to the keychain. On Linux there isn’t a standard way across distros to trust the certificate, so you’ll need to perform the distro specific guidance for trusting the development certificate.

Close your browser and open up again at https://localhost:5001 and you’ll see a trusted “Secure” badge in your browser.

Secure

Note also that by default HTTPS redirection is included in ASP.NET Core, and in Production it’ll use HTTP Strict Transport Security (HSTS) as well, avoiding any initial insecure calls.

public void Configure(IApplicationBuilder app, IHostingEnvironment env)
{
if (env.IsDevelopment())
{
app.UseDeveloperExceptionPage();
}
else
{
app.UseExceptionHandler("/Error");
app.UseHsts();
}

app.UseHttpsRedirection();
app.UseStaticFiles();
app.UseCookiePolicy();

app.UseMvc();
}

That’s it. What’s historically been a huge hassle for local development is essentially handled for you. Given that Chrome is marking http:// sites as “Not Secure” as of Chrome 68 you’ll want to consider making ALL your sites Secure by Default. I wrote up how to get certs for free with Azure and Let’s Encrypt.


Sponsor: Preview the latest JetBrains Rider with its built-in spell checking, initial Blazor support, partial C# 7.3 support, enhanced debugger, C# Interactive, and a redesigned Solution Explorer.




















Source link http://feeds.hanselman.com/~/562584530/0/scotthanselman~-locally-with--Core-under-HTTPS-SSL-and--Certs.aspx

LEAVE A REPLY

Please enter your comment!
Please enter your name here