Xentara v2.0.4
User Manual
|
Xentara uses secure communications protocols where possible. Usually, this involes the use of encryted Transport Layer Security (TLS) connections from and to other systems. TLS is the standard security protocol used by most secure communication protocols, like SSH and HTTPs.
The TLS configuration is loaded from the Xentara security configuration file.
When accepting TLS connections from remote clients, Xentara needs to present a valid certificate to the client. This certificate is called the Xentara server certificate.
Unless a custom path has been specified, Xentara locates the the server certificate by looking for a file named xentara.pem in the normal Xentara configuration directories described in Configuration File Location. The file must be located in a subdirectory named certs. By default, the following locations are tried, in order:
Linux:
Windows:
If no server certificate is found, no secure communication requiring a server certificate will be possible.
The private key belonging to the server certificate must be called xentara.key.pem, and reside in a subdirectory named private. By default, the following locations are tried, in order:
Linux:
Windows:
The private key file must be located under the same base directory as the certificate file. If the certificate is located under ${HOME}/.config, then the private key must also be located under ${HOME}/.config, for example. You cannot place the certificate file in ${HOME}/.config and the private key file in /etc/xdg, or vice versa. The same goes for %LOCALAPPDATA% and %ProgramData% under Windows.
You can specify a different location for the certificate and private key files in the Xentara security configuration file.
Depending on the properties of the certificate, the server certificate may also be suitable for use in TLS client connections that require a client certificate. This is generally the case for self-signed certificates, but certificates issued by a certificate authority (CA) are often restricted to a number of so-called purposes. In order to be used as a server certificate, the certificate must contain the purpose “TLS server”, In order to be used as a client certificate, the certificate must contain the purpose “TLS client”.