iTP Secure WebServer System Administrators Guide (Version 7.5+)

Setup for IP CIP Support.....................................................................................................43
Installing the Resource Locator.............................................................................................44
Installation Considerations..................................................................................................44
Verifying the Configuration......................................................................................................44
Upgrading iTP Secure WebServer online...................................................................................44
The Ninety-Day Test Certificate.................................................................................................45
Test-starting the Administration Server and the iTP Secure WebServer............................................46
If You Plan to Use TLS or SSL Encryption.....................................................................................46
If You Are Using the Nonsecure Version.....................................................................................46
3 Planning the iTP Secure WebServer PATHMON Environment..........................47
Conventional TCP/IP: The Distributor Process..............................................................................47
TCP/IPv6 and IP CIP:The Auto Accept Feature............................................................................47
Migration Considerations For TCP/IPv6 and IP CIP Support.....................................................48
Configuring the PATHMON Environment....................................................................................49
Threading Considerations for the httpd Server............................................................................49
Security for the Server's Pathway Environment.............................................................................50
Who Can Modify the Configuration Files?............................................................................50
Who Can Start/Stop the iTP Secure WebServer?...................................................................50
What TCP/IP Port Is the Distributor Process Monitoring?..........................................................50
Common Gateway Interface (CGI) Application Security Considerations.....................................51
Pathway CGI Server Class Considerations.............................................................................51
Other Security Considerations..................................................................................................51
Protecting the Key Database File..........................................................................................51
Protecting the Server Password.............................................................................................52
Protecting Core Dumps.......................................................................................................52
Protecting Transmission of Key Database Files and Core Dumps...............................................52
4 Configuring for Secure Transport................................................................53
Using the Administration Server Securely...................................................................................53
Overview of Server Configuration.............................................................................................54
Keyadmin Utility Configuration............................................................................................54
Server Configuration..........................................................................................................54
Managing Certificates.............................................................................................................55
Formatting Distinguished Names (DNs).................................................................................55
Using the Keyadmin Utility to Manage Keys and Certificates....................................................56
Using Server Certificate Chains With the iTP Secure WebServer..............................................72
Managing Client Authentication...............................................................................................72
Using the -requireauth Option...................................................................................................73
Using the -requestauth Option..................................................................................................73
Updating TLS and SSL Configuration.........................................................................................74
Controlling Access and Privacy.................................................................................................74
Specifying Content Access Using the Region Command...............................................................75
Using TLS and SSL Environment Variables in CGI Programs..........................................................75
Controlling Encryption and Integrity Checking............................................................................75
Using Ciphers With the AcceptSecureTransport Directive..............................................................76
Hashing Ciphers Used by iTP Secure WebServer Ciphers............................................................76
Negotiating Selection Among Available Ciphers........................................................................76
Migrating the key database from iTP Secure WebServer 7.0 to 7.2 and later..................................76
Configuring Trusted Client Root Certificate Database...................................................................79
Configuring Support For Certificates with Non-English Characters.................................................79
5 Managing the iTP Secure WebServer Using Scripts.......................................82
The httpd Command...............................................................................................................82
Starting the iTP Secure WebServer Using the start Script..............................................................83
Stopping the iTP Secure WebServer Using the stop Script.............................................................83
4 Contents