TLS secure connection
Posted: Fri Nov 11, 2016 8:16 pm
Thanks for adding the TLS secure connection feature! I do however have a few concerns:
1. By default all Xeoma installations use the same private key. While this does encrypt the connection anyone can can preform a MitM attack using that private key/cert. Would it be possible to randomly generate this private/public key by default?
2. Upon changing the certificate on the server (and restarting the service) clients connected to the server are disconnected (as expected) and are automatically re-connected without checking the certificate. Only upon close/re-open of the client is the certificate checked.
3. Currently any certificate must be manually added to clients (even signed certificates). Would it be possible to auto-accept signed certificates, and for self signed certificates prompt the user (once) about the SSL (like web browsers do)?
4. Please add information to the Xeoma Manual about TLS. Specifically, how to add the public certificate to clients which do not have a full install (including all supported OS's)
Thanks!
1. By default all Xeoma installations use the same private key. While this does encrypt the connection anyone can can preform a MitM attack using that private key/cert. Would it be possible to randomly generate this private/public key by default?
2. Upon changing the certificate on the server (and restarting the service) clients connected to the server are disconnected (as expected) and are automatically re-connected without checking the certificate. Only upon close/re-open of the client is the certificate checked.
3. Currently any certificate must be manually added to clients (even signed certificates). Would it be possible to auto-accept signed certificates, and for self signed certificates prompt the user (once) about the SSL (like web browsers do)?
4. Please add information to the Xeoma Manual about TLS. Specifically, how to add the public certificate to clients which do not have a full install (including all supported OS's)
Thanks!