Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 10

Sri Lanka Institute of Information Technology.

SOFTWARE SECURITY - IE5042


Tutorial 01

Student ID Student Name


MS22910172 P. M. I. N. Kumara.

Master of Science in Information Technology Cyber


Security.

1|Page
1. Configure the Apache tomcat Web server to support HTTPS. Generating self-signed
certificate using keytool,

sudo keytool -genkey -keyalg RSA -alias selfsigned -keystore keystore.jks -storepass password -validity
360 -keysize 2048

Verifying the generated key,

sudo keytool -list -v -keystore keystore.jks

2|Page
Download Apache and set catalina.sh for execution

sudo chmod +x Catalina.sh

Configure server.xml file with self-signed certificate and port 8443 to run in TLS

Run catalina.sh,

Sudo ./catalina.sh run

3|Page
Connect to web server localhost with port 8443. It says “Your connection is not secure” due to self-
signed certificate,

4|Page
Accepting Security Exception,

5|Page
After accepting exception,

Self-signed certificate,

6|Page
2. Log the SSL handshake messages to a log file. Can you identify the SSL/TLS handshake
steps on the log?

Configure catalina.sh to print SSL debug messages when browser is communicating with Server,

7|Page
Print debug messages to a text file called “sslhstest.log”,

Some of the messages related to TLS handshake steps,

ClientHello in log file,

ServerHello in log file,

8|Page
Certificate,

ServerKeyExchange,

9|Page
ClientKeyExchange,

10 | P a g e

You might also like