SUNScholar/Secure Internet Connections
Back to Internet Security
For the need to use https, check: https://pressfreedomfoundation.org/encryption-works and https://ssd.eff.org
To check if your internet connection is secure, use: https://www.eff.org/https-everywhere
Contents
- 1 Introduction
- 2 Requirements
- 3 Procedure
- 3.1 Step 1 - Create the SSL certificates
- 3.2 Step 2 - Apply for a signed certificate
- 3.3 Step 3 - Get the intermediate CA certs
- 3.4 Step 4 - Configure Tomcat to use the SSL certs
- 3.5 Step 5 - Enable secure XMLUI logins
- 3.6 Step 6 - Enable HTTPS by default
- 3.7 Step 7 - Rebuild DSpace
- 3.8 Step 8 - Check the secure connection
- 4 YouTube Video
- 5 References
- 6 News
Introduction
This wiki page describes a method of securing communications to a DSpace installation on the internet.
To protect the user credentials of the members of the research community that your repository will serve, it is highly recommended that all logins to the system are encrypted using the procedure detailed below.
- Update - 2014/11/18
A free certificate authority service is launching in 2015 that will greatly simplify the configuration of a secure server. See the link below.
https://letsencrypt.org
Requirements
- Secure connections are not needed if doing an evaluation of the software on a test server behind your institutions firewall.
- It is assumed that DSpace has been installed according to the suggested guidelines here: http://wiki.lib.sun.ac.za/index.php/SUNScholar/DSpace.
Port 443 Firewall Access
Secure internet connections are created using the secure port (443) which must be opened on the campus and local server firewall.
http://wiki.lib.sun.ac.za/index.php/SUNScholar/Firewall
SSL Certificate Defaults
- The default location for certificates is: /etc/ssl/certs.
- This is where we will put the certificates.
- Other services should point to this folder for the certificates.
Procedure
Step 1 - Create the SSL certificates
Step 2 - Apply for a signed certificate
Step 3 - Get the intermediate CA certs
Step 4 - Configure Tomcat to use the SSL certs
Step 5 - Enable secure XMLUI logins
Step 6 - Enable HTTPS by default
Step 7 - Rebuild DSpace
Step 8 - Check the secure connection
YouTube Video
References
Tomcat
- https://tomcat.apache.org/tomcat-7.0-doc
- https://tomcat.apache.org/tomcat-7.0-doc/config/http.html#SSL_Support
- https://tomcat.apache.org/tomcat-6.0-doc
- https://tomcat.apache.org/tomcat-6.0-doc/ssl-howto.html
- http://www.brandonchecketts.com/archives/convert-and-openssl-apache-ssl-certificate-to-a-pkcs12-tomcat
- http://www.tomcatexpert.com/knowledge-base/using-openssl-configure-ssl-certificates-tomcat
- http://code.google.com/p/jianwikis/wiki/TomcatSSLWithAPR
- http://johnjianfang.blogspot.com/2009/06/ssl-configuration-for-tomcat.html
- http://mircwiki.rsna.org/index.php?title=Configuring_Tomcat_to_Support_SSL
- http://blog.lesc.se/2009/09/how-to-makejava-ssl-trust-certificate.html
- https://www.owasp.org/index.php/Securing_tomcat
- https://www.mulesoft.com/tcat/tomcat-security
- https://community.letsencrypt.org/t/how-to-use-the-certificate-for-tomcat/3677/1
- https://github.com/StuAtGit/LetsEncrypt
SSL/TLS
- http://www.openssl.org
- http://www.openssl.org/docs/apps/pkcs12.html
- http://www.madboa.com/geek/openssl/
- http://news.netcraft.com/ssl-survey
- http://www.mulesoft.com/tomcat-ssl
- http://www.sslshopper.com
- http://www.sslshopper.com/ssl-faq.html
- http://www.sslshopper.com/article-most-common-openssl-commands.html
- http://www.clintharris.net/2009/self-signed-certificates
- https://www.ssllabs.com/projects/best-practices/index.html
- https://www.feistyduck.com/books/openssl-cookbook/
- http://askubuntu.com/questions/537293/how-do-i-disable-sslv3-in-tomcat
- https://www.maketecheasier.com/apache-server-ssl-support
- https://mozilla.github.io/server-side-tls/ssl-config-generator
Monopoly Notes
Please note: A quiet monopoly has been created in the SSL cert business. Verisign buys Thawte, Verisign buys Geotrust, Symantec buys Verisign.
- http://en.wikipedia.org/wiki/Thawte
- http://en.wikipedia.org/wiki/Geotrust
- http://en.wikipedia.org/wiki/Verisign
- http://en.wikipedia.org/wiki/Symantec
Update - 2013/10/09. Now we know why a monopoly, so that the NSA can spy on everyone even with SSL certs. What a joke these certs are.