Domino and Internet. Security. IBM Collaboration Solutions. Ask the Experts 12/16/2014



Similar documents
Encrypted Connections

Application Note AN1502

SBClient SSL. Ehab AbuShmais

Apache, SSL and Digital Signatures Using FreeBSD

Apache Security with SSL Using Ubuntu

Linux Deployment Guide. How to deploy Network Shutdown Module for Linux

Domino Certification Authority and SSL Certificates

Proto Balance SSL TLS Off-Loading, Load Balancing. User Manual - SSL.

Managing the SSL Certificate for the ESRS HTTPS Listener Service Technical Notes P/N REV A01 January 14, 2011

SSL Interception on Proxy SG

Understanding SSL/TLS

Network-Enabled Devices, AOS v.5.x.x. Content and Purpose of This Guide...1 User Management...2 Types of user accounts2

Using Microsoft s CA Server with SonicWALL Devices

Sun Java System Web Server 6.1 Using Self-Signed OpenSSL Certificate. Brent Wagner, Seeds of Genius October 2007

EventTracker Windows syslog User Guide

Go to Policy/Global Properties/SmartDashboard Customization, click Configure. In Certificates and PKI properties, change host_certs_key_size to 2048

HTTPS Configuration for SAP Connector

SolarWinds Technical Reference

SSL Certificate Generation

BEA Weblogic Guide to Installing Root Certificates, Generating CSR and Installing SSL Certificate

Secure IIS Web Server with SSL

Unifying Information Security. Implementing TLS on the CLEARSWIFT SECURE Gateway

Scenarios for Setting Up SSL Certificates for View

LoadMaster SSL Certificate Quickstart Guide

Iowa Immunization Registry Information System (IRIS) Web Services Data Exchange Setup. Version 1.1 Last Updated: April 14, 2014

Enterprise SSL Support

Introduction SSL-VPN. Creating and Installing Digital Certificates on SonicWALL SSL-VPN Appliances

Implementing Secure Sockets Layer on iseries

WHITE PAPER Citrix Secure Gateway Startup Guide

Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University

Security Workshop. Apache + SSL exercises in Ubuntu. 1 Install apache2 and enable SSL 2. 2 Generate a Local Certificate 2

Replacing vcenter Server 4.0 Certificates VMware vsphere 4.0

OpenADR 2.0 Security. Jim Zuber, CTO QualityLogic, Inc.

Crypto Lab Public-Key Cryptography and PKI

User s guide. APACHE SSL Linux. Using non-qualified certificates with APACHE SSL Linux. version 1.3 UNIZETO TECHNOLOGIES S.A.

SSL Configuration on Weblogic Oracle FLEXCUBE Universal Banking Release [August] [2014]

Cisco Expressway Certificate Creation and Use

CHAPTER 7 SSL CONFIGURATION AND TESTING

ASA 8.x Manually Install 3rd Party Vendor Certificates for use with WebVPN Configuration Example

CTERA Portal Datacenter Edition

Configuring DoD PKI. High-level for installing DoD PKI trust points. Details for installing DoD PKI trust points

CERTIFICATE-BASED SINGLE SIGN-ON FOR EMC MY DOCUMENTUM FOR MICROSOFT OUTLOOK USING CA SITEMINDER

e-cert (Server) User Guide For Apache Web Server

Certificate Management. PAN-OS Administrator s Guide. Version 7.0

Enabling SSL and Client Certificates on the SAP J2EE Engine

Certificate technology on Pulse Secure Access

WEB SERVICES CERTIFICATE GUIDE

Use Enterprise SSO as the Credential Server for Protected Sites

Setting Up SSL From Client to Web Server and Plugin to WAS

Certificate technology on Junos Pulse Secure Access

Creating and Managing Certificates for My webmethods Server. Version 8.2 and Later

BusinessLink Software Support

Red Hat Linux Guide to Installing Root Certificates, Generating CSR and Installing SSL Certificate

Obtaining SSL Certificates for VMware View Servers

SWITCHBOARD SECURITY

Apache Security with SSL Using Linux

Secure Communication Requirements

KMIP installation Guide. DataSecure and KeySecure Version SafeNet, Inc

How To Enable A Websphere To Communicate With Ssl On An Ipad From Aaya One X Portal On A Pc Or Macbook Or Ipad (For Acedo) On A Network With A Password Protected (

HMRC Secure Electronic Transfer (SET)

Using EMC Unisphere in a Web Browsing Environment: Browser and Security Settings to Improve the Experience

COMP 3704 Computer Security

2014 IBM Corporation

CA Nimsoft Unified Management Portal

Cisco TelePresence VCS Certificate Creation and Use

Internet Script Editor (ISE)

PowerChute TM Network Shutdown Security Features & Deployment

Laboratory Exercises VI: SSL/TLS - Configuring Apache Server

App Orchestration 2.0

Configuring Secure Socket Layer and Client-Certificate Authentication on SAS 9.3 Enterprise BI Server Systems That Use Oracle WebLogic 10.

webmethods Certificate Toolkit

Enterprise Content Management System Monitor 5.1 Security Considerations Revision CENIT AG Brandner, Marc

Integrated SSL Scanning

Boundary Encryption Service. MTA Setup Guide

Cisco TelePresence VCS Certificate Creation and Use

(n)code Solutions CA A DIVISION OF GUJARAT NARMADA VALLEY FERTILIZERS COMPANY LIMITED P ROCEDURE F OR D OWNLOADING

Configuring HTTPS support. Overview. Certificates

Obtaining SSL Certificates for VMware Horizon View Servers

Configuring Multiple ACE Management Servers VMware ACE 2.0

Netzwerksicherheit Übung 6 SSL/TLS, OpenSSL

This section includes troubleshooting topics about certificates.

Install an SSL Certificate onto SilverStream. Sender Recipient Attached FIles Pages Date. Development Internal/External None 5 6/16/08

Cisco SSL Encryption Utility

Implementing SSL Security on a PowerExchange Network

HOWTO. Configure Nginx for SSL with DoD CAC Authentication on CentOS 6.3. Joshua Penton Geocent, LLC

HP Device Manager 4.7

Generating SSH Keys and SSL Certificates for ROS and ROX Using Windows AN22

ECA IIS Instructions. January 2005

NetApp Storage Encryption: Preinstallation Requirements and Procedures for SafeNet KeySecure

Configuring TLS Security for Cloudera Manager

Secure Sockets Layer (SSL ) / Transport Layer Security (TLS) Network Security Products S31213

App Orchestration 2.5

SSL BEST PRACTICES OVERVIEW

Generate CSR for Third Party Certificates and Download Unchained Certificates to the WLC

Creating Certificate Authorities and self-signed SSL certificates

ISY994 Series Network Security Configuration Guide Requires firmware version Requires Java 1.7+

AN054 SERIAL TO WI-FI (S2W) HTTPS (SSL) AND EAP SECURITY

Customer Tips. Xerox Network Scanning HTTP/HTTPS Configuration using Microsoft IIS. for the user. Purpose. Background

Installing an SSL Certificate Provided by a Certificate Authority (CA) on the BlueSecure Controller (BSC)

Avoid the SSLippery Slope of Default SSL

Transcription:

Domino and Internet Ask the Experts 12/16/2014 Security IBM Collaboration Solutions

Agenda Overview of internet encryption technology Domino's implementation of encryption Demonstration of enabling an SSL certificate in Domino 2014 IBM Corporation 2

Encryption on the internet Public Key Cryptography Standards have defined a framework for implementing encrypted communications on the internet Protects internet communications from being read Private keys, certificates, hashes and ciphers 2014 IBM Corporation 3

Internet encryption Certificates identify who you are. In order for you certificate to be trusted, a trusted authority stamps your certificate as being trusted by it, and provides it certificate proving it was indeed that authority who stamped it. Certificates usually have a chain of trust. (I don't know who gave you this, but that person has provided a certificate of trust from someone I know, so I will trust all of these certificates.) Star Trek example of chain of trust: Should I trust Ensign Smith? Chief Science Officer Scott provided a certified letter that says I can trust him Captain Kirk provided a certified letter that says I can trust Mr. Scott I trust Captain Kirk, so I can trust Ensign Smith 2014 IBM Corporation 4

Internet encryption Public / private keys are used to encrypt conversations. Certificates provide hashed data about the key it works with. Hashes used may be SHA-2, SHA-1, or MD5 Internet encryption has standard protocols for communication SSL and TLS TLS is the successor to SSL, essentially a newer version of the protocol Domino supports TLS 1.0 on Domino 8.5.x and 9.x if updates are applied SSL/TLS starts with a handshake to establish the protocol version to use, and to exchange necessary information on certificates and keys. Once two parties agree to an encrypted session, they use a cipher that both have in common. This provides the framework for encrypting the conversation using their keys. 2014 IBM Corporation 5

Domino's implementation of encryption for web servers Certificates are stored in a keyring Keyring is a pair of files -.KYR file has the certificates,.sth file has the password To create a server certificate for the keyring, Certificate Signing Requests (CSRs) are created CSRs are encrypted with a private key and sent to a Certificate Authority (CA) Signed CSRs provide the Server Certificate and the Certificates of the CA that signed it. The signed CSR is merged into the keyring. The CA root certificates and the server certificate must all be merged. Requires the encryption of the signed CSRs matches the encryption used when it was created the private key must match. 2014 IBM Corporation 6

SHA-1 and SHA-2 Certificates Domino 8.5.x and 9.x have used SHA-1 certificates SHA-1 hashing is no longer recommended, CA's and browser vendors are transitioning to SHA-2 Domino 9.x servers can operate with SHA-2 certificates but its tool for working with certificates, the Domino Server Certificate Admin database, can not process SHA-2 certificates New tool created to bypass this limitation KYRTOOL Used in place of the Domino Server Certificate Admin database when SHA-2 certificates are used Domino 8.5.x can only work with SHA-1 certificates SHA-2 support is only with Domino 9.x 2014 IBM Corporation 7

KYRTOOL Command line tool. Provides a set of commands for working with Domino keyrings CREATE SHOW VERIFY IMPORT DELETE Can be used with SHA-2 certificates only in 9.x Can be used to import and delete trusted roots only with 9.0 IF6 or 9.0.1 FP2 IF1 Can work with new and existing keyrings TIP: Extract kyrtool.exe from the kyrtool/w32 directory of the zip to your Notes program directory 8 2014 IBM Corporation

Demonstration Using the KYRTOOL to provide a SHA-2 server certificate on a Domino server 2014 IBM Corporation 9

Domino SHA-2 Server Certificate 1. Create a Domino keyring kyrtool create -k keyring.kyr -p password 10

Domino SHA-2 Server Certificate 1. Create a Domino keyring kyrtool create -k keyring.kyr -p password 2. Generate CSR (Certificate signing request) 11

Generate CSR Create new keypair openssl genrsa -out server.key 4096 Private key that it creates will be in PEM format Display the private key using type server.key -----BEGIN RSA PRIVATE KEY----- MIIJKAIBAAKCAgEAr9uZYZ1BrraxW1AdM1ecexiD2uaPxNKjS2p2p9pygUc/vU2d rrqjj3taybdknefcwqly/eizceowhmhh0b9ut5eosmmxkb4vuhg6gwmse64wr2qx 5EmUfjZ/LDMDqnmFxTDvr2iiajZI/L/8thgwBEK2AEGhCppyvyo/mzvMua9j7I8G [Many lines removed] tuee3jgunhawetqyou6pmtkigppd3disflcje8k1dzn8bekqf2ezk/oodvhshryc 7Rw9zpLxTJmbd3iWW3+ZVHhpudYZrDE8NbaaiGMbfyfQBnSH1XbDHSveTxLOY3fo +d9lepmthdnmme6b1v8x4scudkrfjov5veo4qq8i+099hu3ttrq2zgpnpsg= -----END RSA PRIVATE KEY----- 12

Generate CSR Create new keypair openssl genrsa -out server.key 4096 Create certificate request stamped with private key from keypair openssl req -new -sha256 -key server.key -out server.csr 13

Domino SHA-2 Server Certificate 1. Create a Domino keyring 2. Generate CSR (Certificate signing request) 3. Export data from the signed CSR 14

Reviewing a certificate Signed CSRs are usually in a.crt file Online tools exist for converting other formats (Google search) Open.cer and.crt files with Microsoft Crypto Extensions in Windows Display certification tab Chain of trust is displayed 15

Extracting roots Select the intermediate root certificate View certificate 16

Extracting roots Select the Details tab of the certificate 17

Extracting roots Select the Details tab of the certificate Choose Copy to File 18

Extracting roots Select the Details tab of the certificate Choose Copy to File Certificate Export Wizard will open In the certificate export wizard, export to a.cer file in Base- 64 form, for example inter.cer You can name exported certificate files anything you want, use the.cer or.crt extension in order to be able to view the files using the Windows tool Repeat these steps to export all intermediate certificates and the root certificate to Base 64 (PEM) encoded files 19

Verify server certificate format Open server cert in Notepad Verify it is in PEM (base 64) format Should start with ----BEGIN CERTIFICATE----- If not, use copy to file to convert it to base 64 -----BEGIN CERTIFICATE----- MIIF0zCCBLugAwIBAgIQPzfwuNWcndsPgu/ur6M+pDANBgkqhkiG9w0BAQUFADCB ujelmakga1uebhmcvvmxfzavbgnvbaotdlzlcmltawdulcbjbmmumr8whqydvqql ExZWZXJpU2lnbiBUcnVzdCBOZXR3b3JrMTswOQYDVQQLEzJUZXJtcyBvZiB1c2Ug (lines removed) wl0pods9bfqyno1ly2plvs2q/vsb6gr+o5yc5nqe9h2ufcafudxdan4kvml1wfqm cxd0iv7odjbwe0+xlz8bhmfy8fauv/epwtbhppzfcuxspueun0u9rjytjoo2m+c9 UhIpK+nLMQZc7MHgpyfFo0g+XcDMMa4jx/4XZ6o7QsLAsH/6vvuf6xxQFpswzfrw oplrnup1pg== -----END CERTIFICATE----- 20

Domino SHA-2 Server Certificate 1. Create a Domino keyring 2. Generate CSR (Certificate signing request) 3. Export data from the signed CSR 4. Import certificates using the KYRTool 21

Create import PEM 1. Input PEM file is used to import private key, server certificate and root certificates. 2. Order is important. 3. Concatenate the private key and the exported certificates together Example: type server.key server.crt intermediate.crt root.crt > server.txt server.txt is the input file used by the kyrtool 22

Verify before importing kyrtool verify <path> Verify the contents of a PEM import file Example: kyrtool verify server.txt Successfully read 2048 bit RSA private key INFO: Successfully read 3 certificates INFO: IssuerName of cert 0 matches the SubjectName of cert 1 INFO: IssuerName of cert 1 matches the SubjectName of cert 2 INFO: Final certificate in chain is self-signed 23

Import certificates kyrtool import all [flags] -i arg Input PEM file (Mandatory) -k arg Path to keyfile (Mandatory) kyrtool import keys [flags] -i arg Input PEM file (Mandatory) -k arg Path to keyfile (Mandatory) -n arg Distinguished name kyrtool import roots [flags] -i arg Input PEM file (Mandatory) -k arg Path to keyfile (Mandatory) kyrtool import certs [flags] -i arg Input PEM file (Mandatory) -k arg Path to keyfile (Mandatory) Example: kyrtool import all -k keyring.kyr -i keyring_input.txt Using keyring path 'keyring.kyr' Successfully read 4096 bit RSA private key SECIssUpdateKeyringPrivateKey succeeded SECIssUpdateKeyringLeafCert succeeded 24

Domino SHA-2 Server Certificate 1. Create a Domino keyring 2. Generate CSR (Certificate signing request) 3. Export data from the signed CSR 4. Import certificates using the KYRTool 5. Update server and test 25

Update Domino server Copy keyring to server's data directory Verify keyring entry in server document is correct Ports internet ports tab of server document Verify SSL is enabled Restart HTTP Look for errors at HTTP startup 26

Verify certificate on server Connect to server over a browser using https Test opening a database, such as names.nsf Use view certificate option in browser to verify certificate is in use 27

Domino SHA-2 Server Certificate Summary of the steps: 1. Create a Domino keyring kyrtool create -k keyring.kyr -p password 2. Generate CSR (Certificate signing request) openssl genrsa -out server.key 4096 openssl req -new -sha256 -key server.key -out server.csr 3. Export data from the signed CSR Open signed certificate in Windows, use copy to file to save intermediate and root certificates Make sure server certificate is in PEM format 4. Import certificates using the KYRTool Concatenate private key, server certificate, intermediate certificate(s), and root certificate type server.key server.cer intermediate.cer root.cer > server_input.txt kyrtool verify server_input.txt kyrtool import all -k keyring.kyr -i server_input.txt 5. Update server and test Put keyring.kyr and keyring.sth in server's data directory Verify server document settings Connect to server over SSL 28

Troubleshooting / Debug Verify if there are keyring errors when HTTP starts Connect from a browser running on the server Takes the network out of the picture Debug_SSL_All=1 Logs all SSL/TLS connections 29

What about using an existing Domino keyring? KYRTOOL can show the keys in a keyring that already has a server certificate - recommended key size is 2048, so make sure the old key is not too small - create a file containing the private key using the output of kyrtool show keys command - create a CSR through the Domino Server Cert Admin database and get a CA to sign it - use same process as before to import the private key, signed server certificate and roots with the kyrtool kyrtool show keys -k oldkeyfile.kyr Using keyring path 'oldkeyfile.kyr' Key length: 1024 bits -----BEGIN PUBLIC KEY----- MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQC8/bUrdjRFlZqohBn5Q5DExTR0 qm1k4fiy8re8/yoso8itm1m4x5gvlvfufdx2hjubb53+c7vouixxylapkee5cdix h5at5eplv/a30kl+rjgir0nzrrilvq6gmt6zoswog886aoxq/lrjrjv6qfwrw9q+ zp5yeurw2qccfoz/2widaqab -----END PUBLIC KEY----- Key length: 1024 bits -----BEGIN RSA PRIVATE KEY----- MIICXQIBAAKBgQC8/bUrdjRFlZqohBn5Q5DExTR0qM1k4fIy8Re8/yoSO8itm1m4 x5gvlvfufdx2hjubb53+c7vouixxylapkee5cdixh5at5eplv/a30kl+rjgir0nz.(lots of lines removed) -----END RSA PRIVATE KEY----- 30

Documentation KYRTool: Installing and Running the Domino keyring tool http://www-10.lotus.com/ldd/dominowiki.nsf/dx/kyrtool Generating a keyring file with a third party CA SHA-2 cert using OpenSSL and KYRTool on a Windows workstation http://www-10.lotus.com/ldd/dominowiki.nsf/dx/3rd_party_sha-2_with_openssl_and_kyrtool Interim Fixes for Domino How is IBM Domino impacted by the POODLE attack? http://www-01.ibm.com/support/docview.wss?uid=swg21687167 IBM Domino Interim Fixes to support TLS 1.0 which can be used to prevent the POODLE attack http://www-10.lotus.com/ldd/dominowiki.nsf/dx/ibm_domino_tls_1.0 31

Questions? Press *1 on your telephone to ask a question. Visit our Support Technical Exchange page or our Facebook page for details on future events. To help shape the future of IBM software, take this quality survey and share your opinion of IBM software used within your organization: https://ibm.biz/bdxqb2 IBM Collaboration Solutions Support page http://www.facebook.com/ibmlotussupport IBM Collaboration Solutions Support http://twitter.com/ibm_icssupport 2014 IBM Corporation