LAB :: Secure HTTP traffic using Secure Sockets Layer (SSL) Certificate

Similar documents
Expedition. Hardening Guide Version Palo Alto Networks, Inc.

Your Apache ssl.conf in /etc/httpd.conf.d directory has the following SSLCertificate related directives.

Server software page. Certificate Signing Request (CSR) Generation. Software

Exercises Basics of Web Security Experiential Learning Workshop

Installing an SSL certificate on your server

Managing Certificates

2. Installing OpenBiblio 1.0 on a Windows computer

This documentation can used to generate a request that can be submitted to any of these CA types.

Mac OSX Certificate Enrollment Procedure

System Administration

14. Configuring Telnet in Knoppix

DEPLOYMENT GUIDE. SSL Insight Certificate Installation Guide

Public-Key Infrastructure (PKI) Lab

How to Enable Client Certificate Authentication on Avi

mobilefish.com Create self signed certificates with Subject Alternative Names

LAB :: Secure SHell (SSL)

An internal CA that is part of your IT infrastructure, like a Microsoft Windows CA

Fasthosts Customer Support Generating Certificate Signing Requests

Integration Guide. Dell EMC Data Domain Operating System and Gemalto KeySecure. DD OS and Gemalto KeySecure Integration. Version 6.

ConnectUPS-X / -BD /-E How to use and install SSL, SSH

Cisco has more than 200 offices worldwide. Addresses, phone numbers, and fax numbers are listed on the Cisco website at

Creating and Installing SSL Certificates (for Stealthwatch System v6.10)

Secure Websites Using SSL And Certificates

IceWarp SSL Certificate Process

Generating Certificate Signing Requests

eroaming platform Secure Connection Guide

CYAN SECURE WEB HOWTO. SSL Intercept

Replace HyperFlex Self-Signed SSL Certificates with CA-issued Certificates

شرکت توسعه ارتباطات پردیس پارس. owncloud. The last file sharing platform you'll ever need

Content and Purpose of This Guide... 1 User Management... 2

Client Authenticated SSL Server Setup Guide for Apache Webservers

Getting Started with the VQE Startup Configuration Utility

Practical Exercise: Smartcard-based authentication in HTTP

Crypto Programming with OpenSSL. (Creating Certificates)

HPE Knowledge Article

Controller Installation

Using ISE 2.2 Internal Certificate Authority (CA) to Deploy Certificates to Cisco Platform Exchange Grid (pxgrid) Clients

System Setup. Accessing the Administration Interface CHAPTER

Getting Started with the VQE Startup Configuration Utility

Certificate service - test bench. Project to establish the National Incomes Register

Bitnami Tiny Tiny RSS for Huawei Enterprise Cloud

Public-key Infrastructure

Best Practices for Security Certificates w/ Connect

Bitnami ProcessMaker Community Edition for Huawei Enterprise Cloud

Bitnami Piwik for Huawei Enterprise Cloud

Bitnami Dolibarr for Huawei Enterprise Cloud

How to Import a Certificate When Using Microsoft Windows OS

IEA 2048 Bit Key Support for CSR on IEA Configuration Example

App Orchestration 2.6

Bitnami Pimcore for Huawei Enterprise Cloud

Using SSL to Secure Client/Server Connections

Quick Note 040. Create an SSL Tunnel with Certificates on a Digi TransPort WR router using Protocol Switch.

Deploying a Dialogic 4000 Media Gateway as a Survivable Branch Appliance for Microsoft Lync Server 2010

Acano solution. Virtualized Deployment R1.2 Installation Guide. Acano. December G

How to Setup Total Application Security

Bitnami ez Publish for Huawei Enterprise Cloud

Stats of Web Server types

Please select your version

DOCUMENT DESCRIPTION...

Bitnami ERPNext for Huawei Enterprise Cloud

BROWSER-BASED SUPPORT CONSOLE USER S GUIDE. 31 January 2017

Cisco Unified Serviceability

Nimsoft Unified Management Portal

Public-key Infrastructure

1 How to create a Certificate for your pass

Managing User Accounts

Certificates for Live Data

Cryptography. Basic Concept and Applications. Chung-Yi Chi Jun. 26, 2010

DPI-SSL. DPI-SSL Overview

CP860, SIP-T28P, SIP-T26P, SIP-T22P, SIP-T21P, SIP-T20P, SIP-T19P, SIP-T46G, SIP-T42G and SIP-T41P IP phones running firmware version 71 or later.

VMware Identity Manager Connector Installation and Configuration (Legacy Mode)

CA Nimsoft Unified Management Portal

Public-key Infrastructure

Bitnami Re:dash for Huawei Enterprise Cloud

akkadian Global Directory 3.0 System Administration Guide

Exinda How To Guide: SSL Acceleration. Exinda ExOS Version Exinda Networks, Inc.

Bitnami Moodle for Huawei Enterprise Cloud

Bitnami DokuWiki for Huawei Enterprise Cloud

Use a class C setting for maximum security. The class C setting is Click RoomWizard Setup.

Bitnami OroCRM for Huawei Enterprise Cloud

UCON-IP-NEO Operation Web Interface

Setting up the Apache Web Server

Bitnami TestLink for Huawei Enterprise Cloud

UCS Manager Communication Services

Bitnami OSQA for Huawei Enterprise Cloud

Managing the SSL Certificate for the ESRS HTTPS Listener Service Technical Notes P/N Rev 01 July, 2012

Mitel MiVoice Connect Security Certificates

Bitnami Coppermine for Huawei Enterprise Cloud

User Inputs for Installation

Comodo Certificate Manager

Getting Started. Introduction to Cisco Connected Mobile Experiences

Lab 7: Tunnelling and Web Security

This document describes the configuration of Secure Sockets Layer (SSL) decryption on the FirePOWER Module using ASDM (On-Box Management).

TLS encryption and mutual authentication using syslog-ng Open Source Edition

Bitnami Trac for Huawei Enterprise Cloud

Setting up Certificate Authentication for SonicWall SRA / SMA 100 Series

Enterprise EC2 Quick Start Guide v1.3

Downloading, Installing, and Configuring Blackboard Drive

SSL Certificate Based VPN

Buzztouch Server 2.0 with Amazon EC2

Transcription:

LAB :: Secure HTTP traffic using Secure Sockets Layer (SSL) Certificate In this example we are using apnictraining.net as domain name. # super user command. $ normal user command. N replace with your group no. Username apnic and password traning / You already have ssh key to login. Topology [group1.apnictraining.net] [192.168.30.1] [group2.apnictraining.net] [192.168.30.2] [group3.apnictraining.net] [192.168.30.3]... [group10.apnictraining.net] [192.168.30.10] [group11.apnictraining.net] [192.168.30.11]... [group20.apnictraining.net] [192.168.30.20] [group21.apnictraining.net] [192.168.30.21]... [group30.apnictraining.net] [192.168.30.30] In this lab we wll generate SSL certificated, signed it with our own CA server. Step 1: Generate Your Certificate Signing Request (CSR) Step 2: Send the CSR to the CA. CA will sign the CSR and generate certficate Step 3: Enable SSL and configure Apache with the certificate Requirements 1. Login to the server. 2. Check openssl installed and check it s version # openssl version. If openssl is not present do the following: sudo apt-get update sudo apt-get install openssl -y Step 1

Generate Certificate Signing Request (CSR) To generate the keys for the Certificate Signing Request (CSR) run the following command from a terminal prompt {please replace N with your group no}: sudo su cd /etc/ssl sudo openssl req -nodes -days 365 -newkey rsa:2048 \ -keyout /etc/ssl/groupn.apnictraining.net.key \ -out /etc/ssl/groupn.apnictraining.net.csr This will ask for few question: Country Name (2 letter code) [AU]: BD State or Province Name (full name) [Some-State]: Dhaka Locality Name (eg, city) [ ]: Dhaka Organization Name (eg, company) [Internet Widgits Pty Ltd]: Training Organizational Unit Name (eg, section) [ ]: ISPAB Common Name (e.g. server FQDN or YOUR name) [ ]: groupn.apnictraining.net Email Address [ ]: groupn@apnictraining.net A challenge password [ ]: An optional company name []: You can now enter your passphrase. For best security, it should at least contain eight characters. Also remember that your passphrase is case-sensitive. You can keep An optional company name []: blank. Once you have re-typed it correctly, the server key is generated and stored in the two file in /etc/ssl/ folder. ls -alh /etc/ssl/ groupn.apnictraining.net.csr groupn.apnictraining.net.key groupn.apnictraining.net.csr is the CSR file which we will send to CA. groupn.apnictraining.net.key the private key. Step 2 Upload CSR to the CA server cd /etc/ssl/ scp groupn.apnictraining.net.csr apnic@ca.apnictraining.net:/home/apnic/csr

password is training STOP **Now instructor will generate SSL certificate for you. Wait... ** Step 3 Download your certificate to the server. cd /etc/ssl/ sudo apt-get install wget -y sudo wget http://ca.apnictraining.net/cert/groupn.apnictraining.net.crt [replace N with your group no] Now we have the certificate in /etc/ssl folder which has been send by CA. Install APACHE & Enable SSL in APACHE sudo apt-get update sudo apt-get install apache2 -y Enable SSL sudo a2enmod ssl Edit SSL configuration file and enable it.ss sudo vi /etc/apache2/sites-available/default-ssl.conf SSLEngine on # disable existing demo certificate # SSLCertificateFile /etc/ssl/certs/ssl-cert-snakeoil.pem # SSLCertificateKeyFile /etc/ssl/private/ssl-cert-snakeoil.key SSLCertificateFile /etc/ssl/groupn.apnictraining.net.crt SSLCertificateKeyFile /etc/ssl/groupn.apnictraining.net.key [replace N with your group no] Copy default-ssl.conf file to /etc/apache2/sites-enabled/

cp /etc/apache2/sites-available/default-ssl.conf /etc/apache2/sites-enabled/ Restart Apache server. /etc/init.d/apache2 restart Now try to browse https://groupn.apnictraining.net. This will give you an error that certificate is not tursted. We need to import CA server root certificate. Step 4 **Ask your instructor to provide you the CA server root certificate. ** Step 5 Import Certificate: 1. Internet Explorer: a. Run IE 9 and click the "Options" > "Internet Options" menu. The Internet Options dialog box shows up.

b. Click the "Content" tab and the "Certificates" button. The Certificates dialog box shows up.

c. Click the "Trusted Root Certification Authorities" tab, and click the "Import..." button. The Certificate Import Wizard shows up.

d. Click the "Next" button. The File to Import step shows up. e. Use the "Browse" button to find and select cacert.pem. Then click the "Next" button. The Certificate Store step shows up.

f. Keep the default certificate store selection: "Trusted Root Certificate Authorities", and click the "Next" button. The confirmation step shows up. g. Click the "Yes" button. My self-signed certificate will be installed as a trusted root certificate. 2. Mozilla Firefox: a. 1. Run Mozilla Firefox and click the "Preference" menu. The Preferiece Options dialog box shows up. b. Click the "Advanced" > "Certificates" tab. The Certificates dialog box shows up.

c. Click the "View Certificates" > "Authorities". d. Use the "Import" button to find and select cacert.pem. Then click the "Next" button. The Certificate Store step shows up. e. Select "Trust this CA to identify websites" and click ok.

Try to browse the site over https. Now it should not give any certificate error as you trust the CA. ***END OF EXERCISE***