Installation manual
Mutual authentication
Exchange of identification through public-key certificates. The client and
server identities are encoded in public-key certificates, which contain the
following components:
v Subject’s distinguished name
v Issuer’s distinguished name
v Subject’s public key
v Issuer’s signature
v Validity period
v Serial number
You can also use secure HTTP (HTTPS) to ensure that a client’s security
information is not compromised as it is downloaded from a server.
An SSL session is established in the following sequence:
1. The client and the server exchange hello messages to negotiate the encryption
algorithm and hashing function (for message integrity) to be used for the SSL
session.
2. The client requests an X.509 certificate from the server to prove its identity.
Optionally, the server can request a certificate from the client. Certificates are
verified by checking the certificate format and the validity dates and by
verifying that the certificate includes the signature of a trusted certificate
authority (or is self-signed).
3. The client randomly generates a set of keys that is used for encryption. The
keys are encrypted with the server’s public key and securely communicated to
the server.
Certificates, encryption, and authentication
Security is controlled by certificates that act as electronic ID cards. These are
usually issued by Certificate Authorities (CAs), which are organizations that are
trusted by the industry as a whole and whose business is the issuing of Internet
certificates. A CA’s certificate, which is also known as a root certificate, includes
(among other things) the CA’s signature and a validity period. For Host
On-Demand, you can use a CA’s certificate, but you can also create and sign your
own. The purpose of a certificate is to assure a program or a user that it is safe to
allow the proposed connection and, if encryption is involved, to provide the
necessary encryption/decryption keys.
Encryption and authentication are performed by means of a pair of keys, one
public, one private. The public key is embedded into a certificate, known as a site
or server certificate. The certificate contains several items of information, including
the name of the Certificate Authority (CA) that issued the certificate, the name and
public key of the server or client, the CA’s signature, and the date and serial
number of the certificate. The private key is created when you create a self-signed
certificate or a CA certificate request and is used to decrypt messages from clients.
To support SSL services, Host On-Demand uses two databases:
HODServerKeyDb.kdb
Is created the first time you configure SSL for the Host On-Demand
Redirector. This database contains the server’s private key and certificate,
and a list of CAs. Because the CAs are included in the file, they are called
Chapter 9. Security 49