Raymii.org
Quis custodiet ipsos custodes?Home | About | All pages | Cluster Status | RSS Feed
Ejabberd SSL Certificate
Published: 13-06-2013 | Author: Remy van Elst | Text only version of this article
❗ This post is over eleven years old. It may no longer be up to date. Opinions may have changed.
Table of Contents
This tutorial shows you how to set up an SSL Certificate for use with Ejabberd. It covers both the creation of the Certificate Signing Request, the preparing of the certificate for use with Ejabberd and the installation of the certificate.
Recently I removed all Google Ads from this site due to their invasive tracking, as well as Google Analytics. Please, if you found this content useful, consider a small donation using any of the options below:
I'm developing an open source monitoring app called Leaf Node Monitoring, for windows, linux & android. Go check it out!
Consider sponsoring me on Github. It means the world to me if you show your appreciation and you'll help pay the server costs.
You can also sponsor me by getting a Digital Ocean VPS. With this referral link you'll get $200 credit for 60 days. Spend $25 after your credit expires and I'll get $25!
If you need to set up an ejabberd server then you can read my tutorial here how to do that.
This tutorial assumes a working ejabberd installation. It is tested on Debian and Ubuntu, but should work on any ejabberd installation.
Steps and Explanation
To get an SSL certificate working on ejabberd we need to do a few things:
- Create an Certificate Signing Request (CSR) and a Private Key
- Submit the CSR to a Certificate Authority, let them sign it and give you a Certificate
- Combine the certificate, private key (and chain) into a ejabberd compatible PEM file
- Install the certificate in ejabberd
With a certificate we can secure our XMPP connection and conversations. This way it is much harder for others to spy on your conversations. Combined with OTR this enabled a super secure channel for conversation.
Creating the Certificate Signing Request
Create a folder to store all the files and cd to that:
mkdir -p ~/Certificates/xmpp cd ~/Certificates/xmpp
Now use OpenSSL to create both a Private Key and a CSR. The first command will do it interactively, the second command will do it non-interactive. Make sure to set the correct values, your Common Name (CN) should be your XMPP server URL:
Interactive:
openssl req -nodes -newkey rsa:2048 -keyout private.key -out CSR.csr
Non-interactive:
openssl req -nodes -newkey rsa:2048 -keyout private.key -out CSR.csr -subj "/C=NL/ST=State/L=City/O=Company Name/OU=Department/CN=chat.example.org"
This will result in two files, CSR.csr
and private.key
. You now have to
submit the CSR to a Certificate Authority. This can be any CA, I myself have
good experiences with Xolphin, but there are others like Digicert and
Verisign.
Once you have submitted your CSR and have gotten a Certificate you can continue.
Creating the ejabberd certificate
Once you have all the files (private key, certificate and certificate chain),
put them all in a folder and continue. We are going to cat
all the required
files into a ejabberd.pem
file.
This needs to happen in a specific order:
- private key
- certificate
- chains
So adapt the following commands to your filenames and create the pem file:
cat private.key >> ejabberd.pem cat certificate.pem >> ejabberd.pem cat chain-1.pem >> ejabberd.pem cat chain-2.pem >> ejabberd.pem
If that all works out continue.
Installing the certificate in ejabberd
Copy the certificate to all your ejabberd servers:
scp ejabberd.pem user@srv1.example.org:
The place the certificate in the /etc/ejabberd
folder:
cp ejabberd.pem /etc/ejabberd/ejabberd.pem
Now change the ejabberd config to point to the new certificate:
vim /etc/ejabberd/ejabberd.cfg
Check/change the following to point to the new certificate:
[...] {listen, [ {5222, ejabberd c2s, [ {access, c2s}, {shaper, c2s shaper}, {max stanza size, 65536}, starttls, {certfile, "/etc/ejabberd/ejabberd.pem"} ]}, [...] {s2s use starttls, true}. {s2s_certfile, "/etc/ejabberd/ejabberd.pem"}. [...]
Afterwards restart ejabberd:
/etc/init.d/ejabberd restart
You can now use any XMPP client to connect with SSL/TLS to see if it works.
Tags: certificate , chat , dns , ejabberd , erlang , federation , jabber , secure , ssl , starttls , tutorials , xmpp