Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

DNS SSL/TLS certificate import #103

Closed
F9Alejandro opened this issue Apr 18, 2021 · 10 comments
Closed

DNS SSL/TLS certificate import #103

F9Alejandro opened this issue Apr 18, 2021 · 10 comments

Comments

@F9Alejandro
Copy link

How would one go about importing a SSL/TLS certificate to allow secure connection between DNS provider and the server/VM?

I attempted using some of the methods provided by payara documentation, however now I can't access it at vs connecting via external IP.

I am using a SRV record for allowing the use of a sub domain ex. fido.example.com forwards to 192.168.56.1:8181.

Would the certificate have to specify fido.example.com for this to work? What is the proper way to import ssl certificates that are in pem/pcks7/der format with a normal private key?

Thank you for all the work that has been put into this!

@arshadnoor
Copy link
Contributor

arshadnoor commented Apr 19, 2021 via email

@F9Alejandro
Copy link
Author

F9Alejandro commented Apr 19, 2021

So the TLS cert was made using openssl in pkcs12 mode following what was provided on this site here: https://docs.payara.fish/enterprise/docs/5.27.0/documentation/payara-server/server-configuration/ssl-certificates.html

Then imported the srckeystore into the destkeystore with the alias of skfs and ran part of the installer that generates a key and imports it into the glassfish and java keystores. Except taking out the keygen portion.

The IP is using the external ip of the cloud service I only used 192.168.x.x as an example.

I have actually used the keytool already for the creation of the pkcs12 bundle and for certs in the past. Just not with glassfish/payara since those are new tools for me.

The cloudflare TLS/SSL is for secure connection (Full encryption) between browser Cloudflare and the end server (Fido2 server), I would like to note that the TLS is for the Origin server communication to/from Cloudflare.

Also is the choice of port 8181 for not having to use root with the glassfishd?

@max-smyth
Copy link

max-smyth commented Apr 20, 2021 via email

@F9Alejandro
Copy link
Author

Thank you! I forgot about being able to have the cert signed. Still a bit of a SSL/TLS newb

@F9Alejandro
Copy link
Author

So it is loading the cert. Now it is down to getting Cloudflare to properly send a request to the server. SRV record was made for it seems it doesn't want to use it though.

@arshadnoor
Copy link
Contributor

arshadnoor commented Apr 20, 2021 via email

@F9Alejandro
Copy link
Author

So I am trying to reach the Fido server via SRV record https://www.cloudflare.com/learning/dns/dns-records/dns-srv-record/

The issue I am having is that it will not work between Cloudflare and Fido server. Would it be wise to use the dns handler provided by my domain provider?

@max-smyth
Copy link

max-smyth commented Apr 21, 2021 via email

@F9Alejandro
Copy link
Author

possibly will go the firewall route it seems to be a bit easier to do and less hassel.

@F9Alejandro
Copy link
Author

Or I will just make a web client in python or nodejs as a frontend for it. Then just have it work as normal if the user is registered and authed.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

4 participants