esync - Receiving data over HTTPS

Similar documents
SecuritySpy Setting Up SecuritySpy Over SSL

User s guide. APACHE SSL Linux. Using non-qualified certificates with APACHE SSL Linux. version 1.3 UNIZETO TECHNOLOGIES S.A.

ViMP 3.0. SSL Configuration in Apache 2.2. Author: ViMP GmbH

Installing an SSL certificate on the InfoVaultz Cloud Appliance

Apache SSL Certificate Deployment Guide

How to setup HTTP & HTTPS Load balancer for Mediator

This section describes how to use SSL Certificates with SOA Gateway running on Linux.

GlobalSign Enterprise Solutions Google Apps Authentication User Guide

Enterprise SSL Support

SSL Installing your new Certificate

Securing the OpenAdmin Tool for Informix web server with HTTPS

How to: Install an SSL certificate

Creating X.509 Certificates With OpenSSL

Building a Secure RedHat Apache Server HOWTO

Laboratory Exercises VI: SSL/TLS - Configuring Apache Server

Securing Your Apache Web Server With a Thawte Digital Certificate

To enable https for appliance

How-to-Guide: Apache as Reverse Proxy for Fiori Applications

Administering mod_jk. To Enable mod_jk

e-cert (Server) User Guide For Apache Web Server

CentOS. Apache. 1 de 8. Pricing Features Customers Help & Community. Sign Up Login Help & Community. Articles & Tutorials. Questions. Chat.

A STEP- BY-STEP GUIDE

LAB :: Secure HTTP traffic using Secure Sockets Layer (SSL) Certificate

Installing Apache as an HTTP Proxy to the local port of the Secure Agent s Process Server

HP Cloud Service Automation Deployment Architectures

Apache, SSL and Digital Signatures Using FreeBSD

CERTIFICATE-BASED SINGLE SIGN-ON FOR EMC MY DOCUMENTUM FOR MICROSOFT OUTLOOK USING CA SITEMINDER

Security Workshop. Apache + SSL exercises in Ubuntu. 1 Install apache2 and enable SSL 2. 2 Generate a Local Certificate 2

Technical specification

Install an SSL Certificate onto SilverStream. Sender Recipient Attached FIles Pages Date. Development Internal/External None 5 6/16/08

HP ALM. Software Version: External Authentication Configuration Guide

Apache Security with SSL Using Linux

LAB :: Secure HTTP traffic using Secure Sockets Layer (SSL) Certificate

10gAS SSL / Certificate Based Authentication Configuration

Configuring Apache HTTP Server as a Reverse Proxy Server for SAS 9.3 Web Applications Deployed on Oracle WebLogic Server

Example Apache Server Installation for Centricity Electronic Medical Record browser & mobile access

Setting Up SSL on IIS6 for MEGA Advisor

Using EMC Unisphere in a Web Browsing Environment: Browser and Security Settings to Improve the Experience

PassBy[ME] - Bugzilla integration on

Configuring MassTransit for the Web Using Apache on Mac OS 10.2 and 10.3

APACHE HTTP SERVER 2.2.8

By default, STRM provides an untrusted SSL certificate. You can replace the untrusted SSL certificate with a self-signed or trusted certificate.

Implementing HTTPS in CONTENTdm 6 September 5, 2012

GlobalSign Solutions

Use Enterprise SSO as the Credential Server for Protected Sites

Protect your CollabNet TeamForge site

Host your websites. The process to host a single website is different from having multiple sites.

CentraSite SSO with Trusted Reverse Proxy

User Guide Generate Certificate Signing Request (CSR) & Installation of SSL Certificate

Configuring Security Features of Session Recording

CA Workload Automation DE

To install and configure SSL support on Tomcat 6, you need to follow these simple steps. For more information, read the rest of this HOW-TO.

How-to-Guide: Reverse Proxy and Load Balancing for SAP Mobile Platform 3.X

Implementing Secure Sockets Layer on iseries

Apache Security with SSL Using Ubuntu

Exercises: FreeBSD: Apache and SSL: SANOG VI IP Services Workshop

EQUELLA. Clustering Configuration Guide. Version 6.2

Table of Contents GEEK GUIDE APACHE WEB SERVERS AND SSL AUTHENTICATION

App Orchestration 2.5

Running Multiple Shibboleth IdP Instances on a Single Host

MassTransit 6.0 Enterprise Web Configuration for Macintosh OS 10.5 Server

Configuring Apache HTTP Server as a Reverse Proxy Server for SAS 9.2 Web Applications Deployed on BEA WebLogic Server 9.2

BlackBerry Enterprise Service 10. Version: Configuration Guide

Configuring IBM HTTP Server as a Reverse Proxy Server for SAS 9.3 Web Applications Deployed on IBM WebSphere Application Server

EventTracker Windows syslog User Guide

HP Business Service Management

Integrating Apache Web Server with Tomcat Application Server

Advanced Administration

Setup a Virtual Host/Website

InduSoft Thin Client Setup and Troubleshooting Guide

CHAPTER 7 SSL CONFIGURATION AND TESTING

Set up a Home Secure Global Desktop Enterprise Edition Remote Access Server

Citrix Receiver for Mobile Devices Troubleshooting Guide

SolarWinds Technical Reference

Managing the SSL Certificate for the ESRS HTTPS Listener Service Technical Notes P/N REV A01 January 14, 2011

(n)code Solutions CA

i2b2: Security Baseline

Setup Corporate (Microsoft Exchange) . This tutorial will walk you through the steps of setting up your corporate account.

Cisco SSL Encryption Utility

White Paper. Installation and Configuration of Fabasoft Folio IMAP Service. Fabasoft Folio 2015 Update Rollup 3

Architecture and Data Flow Overview. BlackBerry Enterprise Service Version: Quick Reference

ENABLING RPC OVER HTTPS CONNECTIONS TO M-FILES SERVER

Real Vision Software, Inc.

Puppet CA: Certificates explained. Thomas Gelf - PuppetCamp Düsseldorf 2014

Owner of the content within this article is Written by Marc Grote

DoD Public Key Enablement (PKE) Quick Reference Guide. Securing Apache HTTP with mod_ssl for Linux

Configuration (X87) SAP Mobile Secure: SAP Afaria 7 SP5 September 2014 English. Building Block Configuration Guide

NEFSIS DEDICATED SERVER

Trend Micro Worry-Free Remote Manager Agent Installation Guide

Configuring Remote HANA System Connection for SAP Cloud for Analytics via Apache HTTP Server as Reverse Proxy

unigui Developer's Manual 2014 FMSoft Co. Ltd.

How To Set Up The Barclaycard Epdq Cardholder Payment Interface (Cpi) On Papercut (Barclay Card) On A Microsoft Card (For A Credit Card) With A Creditcard (For An Account)

BlackBerry Enterprise Service 10. Universal Device Service Version: Administration Guide

SonicOS Enhanced 3.2 LDAP Integration with Microsoft Active Directory and Novell edirectory Support

orrelog Apache TLS / Crypto Enhanced Encryption Software

9.92 Using HTTPS for building secure web applications v 1.0

Reference and Troubleshooting: FTP, IIS, and Firewall Information

ewon-vpn - User Guide Virtual Private Network by ewons

Setting Up SSL From Client to Web Server and Plugin to WAS

Customer Tips. Xerox Network Scanning HTTP/HTTPS Configuration using Microsoft IIS. for the user. Purpose. Background

Transcription:

esync - Receiving data over HTTPS 1 Introduction Natively, the data transfer between ewon and esync is done over an HTTP link. However when esync is hosted on Internet, security must be taken in account and HTTP is not a secure protocol. For security reason HTTPS is recommended more and more. The HTTPS protocol ensures encryption of data exchanges and the server identity. This KB will show you how to configure your esync server to listen for HTTPS requests and how to configure the ewon to send the data out using HTTPS. 2 HTTPS Keys and Certificates HTTPS protocol is a HTTP protocol encrypted using OpenSSL technology. OpenSSL uses certificates to identify Web Server and key files to encrypt data. These certificates and keys can be generated from OpenSSL directly. However, to be trusted on Internet, your esync certificate must be signed by trusted certificate authorities such as Thawte, VeriSign, etc. Inside this document we use StartSSL (www.startssl.com). StartSSL delivers SSL certificates for free, which can be handy to test esync/https setups. Note A server certificate is associated to a domain name. Therefore you need to own a domain name (e.g : mydomain.com) and this domain name must be associated to the IP address of your esync server. In case the esync server does not have a fixed IP address and you use DynDNS, DynDNS.com can also issue server certificates. 3 esync Configuration esync is running an Apache Web Server. All Apache related files are located in...\esync\apache24 (Default esync Root Directory is C:\eSync\ ). KB-0058-0-EN (esync - Receiving data over HTTPS) Page 1/7

3.1 Apache Configuration Open the file httpd.conf located in...\esync\apache24\conf and do the following operations : Replace "Listen 80" (80 = HTTP port) by "Listen 443" (443 Standard HTTPS port). To avoid port conflicts, it is recommended to check that the port 443 is not already used by a third party program (Using netstat command for example) Note HTTP and HTTPS can be both enabled on esync. For this, use the configuration lines Listen 80 and Listen 443 (on 2 separate lines) in the file httpd.conf Uncomment the line LoadModule ssl_module modules/mod_ssl.so (remove the # in front of the line). Add the content : <VirtualHost _default_:443>" ServerName mydomain.be ErrorLog "C:/eSync/Apache24/conf/error_log" TransferLog "C:/eSync/Apache24/conf/access_log" SSLEngine on SSLProtocol all -SSLv2 SSLCipherSuite ALL:!ADH:!EXPORT:!SSLv2:RC4+RSA:+HIGH:+MEDIUM SSLCertificateFile "C:/eSync/Apache24/conf/mysite.crt" SSLCertificateKeyFile "C:/eSync/Apache24/conf/mysite.key" SSLCertificateChainFile "C:/eSync/Apache24/conf/ca.pem" CustomLog C:/eSync/Apache24/logs/ssl_request_log \ "%t %h %{SSL_PROTOCOL}x %{SSL_CIPHER}x \"%r\" %b" </VirtualHost> and modify the value of the following parameters : ServerName SSLCertificateFile SSLCertificateKeyFile SSLCertificateChainFile type your domain name type the path to your server certificate type the path to your server key type the path to your CA certificate KB-0058-0-EN (esync - Receiving data over HTTPS) Page 2/7

Warning Check that all directory paths defined above exist on your system. Copy your certificates and key files in the right directory. See directories configured at point 3 for the parameters SSLCertificateFile, SSLCertificateKeyFile and SSLCertificateChainFile. When everything is setup, you can then restart the service "esync Apache Web Server" from the Windows services panel (Control Panel\Administrative Tools\Services) KB-0058-0-EN (esync - Receiving data over HTTPS) Page 3/7

3.2 Troubleshooting In case the esync Apache service does not restart, it probably means that there is a mistake in your configuration, certificate or key file. Error logs can be retrieved from different locations : C:\eSync\Apache24\conf\ (File : error_log) C:\eSync\Apache24\logs (File : error.log) For debugging purposes, you can also stop the Apache service and start the Apache server manually. For this, open a dos prompt and run "C:\eSync\Apache24\bin\httpd.exe". The errors are directly returned in the DOS prompt. Sometimes the process returns immediately but without any errors displayed. In this case, check the error file C:\eSync\Apache24\logs\error.log 3.2.1 Possible issues Private Key is protected by a pass-phrase. Apache Web Server does not support pass-phrase protection. To disable it, run the command : C:\eSync\Apache24\bin\openssl.exe rsa -in server.key.org -out server.key Rem : StartSSL provides pass-phrase protected Private Keys. Key does not match with Certificate In this case, you will see the following error in the log file C:\eSync\Apache24\conf\error_log [Wed May 07 11:27:17.093067 2014] [ssl:emerg] [pid 6796:tid 488] AH02238: Unable to configure RSA server private key [Wed May 07 11:27:17.093067 2014] [ssl:emerg] [pid 6796:tid 488] SSL Library Error: error:0b080074:x509 certificate routines:x509_check_private_key:key values mismatch To verify that, you must display the modulus of the key and the certificate and KB-0058-0-EN (esync - Receiving data over HTTPS) Page 4/7

then check that they match OpenSSL> rsa -noout -modulus -in "C:\eSync\Apache24\conf\ssl.key" Modulus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penSSL> x509 -noout -modulus -in "C:\eSync\Apache24\conf\ssl.crt" Modulus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f they do not match, reissue your certificates. Incorrect Server Name In this case, in C:\eSync\Apache24\conf\error_log, you get the log : [Wed May 07 11:16:05.559920 2014] [ssl:warn] [pid 7256:tid 488] AH01909: RSA certificate configured for LAP146.AD.ACTL.BE:443 does NOT include an ID which matches the server name It means that the domain name used to create the certificate does not match with your web server domain name. Check the value of the parameter "ServerName" in httpd.conf. KB-0058-0-EN (esync - Receiving data over HTTPS) Page 5/7

4 ewon Configuration Natively ewon only supports HTTP. So ewon is not able to post data to esync directly using HTTPS. The solution is to use the M2U service of Talk2M (www.talk2m.com). M2U will act as a HTTP to HTTPS Gateway for the ewon. The idea is to use the secured VPN connection established between the ewon and Talk2M server to send out the data using HTTP protocol. M2U receives these data and forward the data to esync in HTTPS. With this topology, you can see that the data are encrypted from the start to the end, either in VPN (between ewon and Talk2M/M2U) or in HTTPS (between Talk2M/M2U and esync). Note To configure your ewon on Talk2M, follow the guide Talk2M Getting Started Free +. KB-0058-0-EN (esync - Receiving data over HTTPS) Page 6/7

To configure the M2U service to send the ewon data to your esync server, you need to associate your esync Domain Name to one of the 4 M2U URL links. To do this, connect to your Talk2M account using ecatcher and open the menu Account > M2U : Encode here the url of your esync server. On the ewon, inside the Data Management configuration window, you'll then need to encode m2u.talk2m.com for the Server URL. KB-0058-0-EN (esync - Receiving data over HTTPS) Page 7/7