Tripp Lite B098016V Owners Manual for B093- B097- and B098-Series Console Serv - Page 259

Secure Sockets Layer SSL Support, 8 HTTPS

Page 259 highlights

15. Advanced Configuration 15.6.8 SDT Connector Public Key Authentication SDT Connector can authenticate against a console server using your SSH key pair, rather than requiring you to enter your password (i.e. public key authentication). • To use public key authentication with SDT Connector, first create an RSA or DSA key pair (using ssh-keygen, PuTTYgen or a similar tool) and add the public part of your SSH key pair to the console server. • Next, add the private part of your SSH key pair (this file is typically named id_rsa or id_dsa) to SDT Connector client. Click Edit: Preferences: Private Keys: Add, locate the private key file and click OK. You do not have to add the public part of your SSH key pair, it is calculated using the private key. SDT Connector will now use public key authentication when SSH connects via console server. You may have to restart SDT Connector to shut down any existing tunnels that were established using password authentication. If you have a host behind the console server that you connect to by clicking the SSH button in SDT Connector, you can also configure it for public key authentication. Essentially, what you are using is SSH over SSH. The two SSH connections are entirely separate, and the host configuration is entirely independent of SDT Connector and the console server. You must configure the SSH client that SDT Connector launches (e.g., Putty, OpenSSH) and the host's SSH server for public key authentication. 15.7 Secure Sockets Layer (SSL) Support Secure Sockets Layer (SSL) is a protocol developed by Netscape for transmitting private documents via the Internet. SSL works by using a private key to encrypt data transferred over the SSL connection. The console server includes OpenSSL. The OpenSSL Project is a collaborative effort to develop a robust, commercial-grade, full-featured and open source toolkit implementing the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols, as well as a full-strength general-purpose cryptography library. The project is managed by a worldwide community of volunteers that use the Internet to communicate, plan and develop the OpenSSL toolkit and its related documentation. OpenSSL is based on the Slay library developed by Eric A. Young and Tim J. Hudson. The OpenSSL toolkit is licensed under an Apache-style license, which means you are free to get and use it for commercial and non-commercial purposes subject to some simple license conditions. In the console server, OpenSSL is used primarily in conjunction with http in order to have secure browser access to the GUI management console across insecure networks. More documentation on OpenSSL is available at: http://www.openssl.org/docs/apps/openssl.html http://www.openssl.org/docs/HOWTO/certificates.txt 15.8 HTTPS The management console UI is served using HTTPS by the built in Cherokee webserver. If your default network address is changed or the unit is to be accessed using a known domain name, you can use the following steps to replace the default SSL certificate and private key with those tailored for your new address. 15.8.1 Generating an Encryption Key To create a 1024-bit RSA key with a password, issue the following command on the Linux host command line with the openssl utility installed: openssl genrsa -des3 -out ssl_key.pem 1024 259

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288

259
15. Advanced Configuration
15.6.8 SDT Connector Public Key Authentication
SDT Connector can authenticate against a console server using your SSH key pair, rather than requiring you to enter your
password (i.e. public key authentication).
• To use public key authentication with SDT Connector, first create an RSA or DSA key pair (using
ssh-keygen
,
PuTTYgen
or a
similar tool) and add the public part of your SSH key pair to the console server.
• Next, add the private part of your SSH key pair (this file is typically named
id_rsa
or
id_dsa
) to SDT Connector client. Click
Edit: Preferences: Private Keys: Add
, locate the private key file and click
OK
. You do not have to add the public part of
your SSH key pair, it is calculated using the private key.
SDT Connector will now use public key authentication when SSH connects via console server. You may have to restart SDT
Connector to shut down any existing tunnels that were established using password authentication.
If you have a host behind the console server that you connect to by clicking the SSH button in SDT Connector, you can also
configure it for public key authentication. Essentially, what you are using is SSH over SSH. The two SSH connections are
entirely separate, and the host configuration is entirely independent of SDT Connector and the console server. You must
configure the SSH client that SDT Connector launches (e.g., Putty, OpenSSH) and the host’s SSH server for public key
authentication.
15.7 Secure Sockets Layer (SSL) Support
Secure Sockets Layer (SSL) is a protocol developed by Netscape for transmitting private documents via the Internet. SSL
works by using a private key to encrypt data transferred over the SSL connection.
The console server includes OpenSSL. The OpenSSL Project is a collaborative effort to develop a robust, commercial-grade,
full-featured and open source toolkit implementing the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1)
protocols, as well as a full-strength general-purpose cryptography library. The project is managed by a worldwide community of
volunteers that use the Internet to communicate, plan and develop the OpenSSL toolkit and its related documentation.
OpenSSL is based on the Slay library developed by Eric A. Young and Tim J. Hudson. The OpenSSL toolkit is licensed under
an Apache-style license, which means you are free to get and use it for commercial and non-commercial purposes subject
to some simple license conditions. In the console server, OpenSSL is used primarily in conjunction with http in order to have
secure browser access to the GUI management console across insecure networks.
More documentation on OpenSSL is available at:
15.8 HTTPS
The management console UI is served using HTTPS by the built in Cherokee webserver.
If your default network address is changed or the unit is to be accessed using a known domain name, you can use the
following steps to replace the default SSL certificate and private key with those tailored for your new address.
15.8.1 Generating an Encryption Key
To create a 1024-bit RSA key with a password, issue the following command on the Linux host command line with the openssl
utility installed:
openssl genrsa -des3 -out ssl_key.pem 1024