Changeset 38020 in vbox
- Timestamp:
- Jul 18, 2011 2:17:33 PM (14 years ago)
- File:
-
- 1 edited
Legend:
- Unmodified
- Added
- Removed
-
trunk/doc/manual/en_US/user_Frontends.xml
r36313 r38020 514 514 this hard-coded private key became public some years ago, RDP5.1 515 515 authentication is also insecure.</para> 516 </listitem> 517 518 <listitem> 519 <para>RDP5.2 authentication uses the Enhanced RDP Security, which 520 means that an external security protocol is used to secure the 521 connection. RDP4 and RDP5.1 use Standard RDP Security. 522 VRDP server supports Enhanced RDP Security with TLS protocol and, 523 as a part of TLS handshake, sends the server certificate to the 524 client.</para> 525 526 <para>The <computeroutput>Security/Method</computeroutput> VRDE 527 property sets the desired security method, which is used for a 528 connection. Valid values are:<itemizedlist> 529 <listitem> 530 <computeroutput>Negotiate</computeroutput> - both Enhanced (TLS) 531 and Standard RDP Security connections are allowed. The security 532 method is negotiated with the client. This is the default setting. 533 </listitem> 534 535 <listitem> 536 <computeroutput>RDP</computeroutput> - only Standard RDP Security 537 is accepted. 538 </listitem> 539 540 <listitem> 541 <computeroutput>TLS</computeroutput> - only Enhanced RDP Security 542 is accepted. The client must support TLS. 543 </listitem> 544 </itemizedlist> 545 For example the following command allows a client to use either Standard 546 or Enhanced RDP Security connection: 547 <screen>vboxmanage modifyvm NAME --vrdeproperty "Security/Method=negotiate"</screen> 548 </para> 549 550 <para>If the <computeroutput>Security/Method</computeroutput> property is 551 set to either <computeroutput>Negotiate</computeroutput> or 552 <computeroutput>TLS</computeroutput>, the TLS protocol will be automatically 553 used by the server, if the client supports TLS. However in order to use TLS 554 the server must possess the Server Certificate, the Server Private Key and the 555 Certificate Authority (CA) Certificate. The following example shows how to 556 generate a server certificate.<orderedlist> 557 <listitem> 558 Create a CA self signed certificate: 559 <screen>openssl req -new -x509 -days 365 -extensions v3_ca -keyout ca_key_private.pem -out ca_cert.pem</screen> 560 </listitem> 561 562 <listitem> 563 Generate a server private key and a request for signing: 564 <screen>openssl genrsa -out server_key_private.pem 565 openssl req -new -key server_key_private.pem -out server_req.pem</screen> 566 </listitem> 567 568 <listitem> 569 Generate the server certificate: 570 <screen>openssl x509 -req -days 365 -in server_req.pem -CA ca_cert.pem -CAkey ca_key_private.pem -set_serial 01 -out server_cert.pem</screen> 571 </listitem> 572 </orderedlist> 573 The server must be configured to access the required files: 574 <screen>vboxmanage modifyvm NAME --vrdeproperty "Security/CACertificate=path/ca_cert.pem"</screen> 575 <screen>vboxmanage modifyvm NAME --vrdeproperty "Security/ServerCertificate=path/server_cert.pem"</screen> 576 <screen>vboxmanage modifyvm NAME --vrdeproperty "Security/ServerPrivateKey=path/server_key_private.pem"</screen> 577 </para> 516 578 </listitem> 517 579 </orderedlist></para>
Note:
See TracChangeset
for help on using the changeset viewer.