Turris OS v.3.8 - changed ports for lighttpd

Hi,

I had standardports for web interface changed from 443 to another port (lets assume 40000) and assigned 443 to openvpn.
After update webinterface has not been reachable anymore. By pure luck @ladislav.balik found out (-> Turris OS 3.8 is out!) that in some configuration file lighttpd seems to look for 443.
So I changed lighttpd.conf server.port to 443, closed access from outside and disabled openvpn server.
Please tell me which config file has to be changed in order to get my non standard port (again let’s assume 40000) working again!

ssdnvv

Ok, I found out myself:
My former /etc/lighttpd/lighttpd.conf included all necessary information on ssl-configuration.

In v.3.8(?) /etc/lighttpd/conf.d/ssl-enable.conf has been created with standard-port 443 and a link to a certificate that I deleted long long time ago.

Changed those ports and the link to the *.pem-file and now got my webif and all other config back again.

File /etc/lighttpd/conf.d/ssl-enable.conf is not configuration file editable by user. It is replaced on every update of package lighttpd-https-cert. So you shouldn’t be editing that file. I would suggest you to unistall said package (it’s part of base system so see: https://www.turris.cz/doc/en/howto/updater#i_deleted_a_package_but_it_came_back), configured your own ssl certificate and then you can use what ever port you want.

Also you can check if you are not editing some file that is part of package and will be replaced with update using pkg_check. It reports some files that are edited as part of standard router operation, such as /etc/root.keys or /etc/config/luci. So just check if it contains files you have edited.

2 Likes

Is there really not an easier way? This seems like an overkill for such a simple task :frowning:

Well… they changed the design and therefore there seems to be really no other way…
But anyway - this packet seems to be of no real use for advanced users, (just as luci-ssl in openwrt) as one can easily generate a certificate via openssl and add HSTS functionality in the main config-file.