Skip to main content

Raymii.org Logo (IEC resistor symbol)logo

Quis custodiet ipsos custodes?
Home | About | All pages | RSS Feed | Gopher

Ejabberd SSL Certificate

Published: 13-06-2013 | Author: Remy van Elst | Text only version of this article


Table of Contents


This tutorial shows you how to set up an SSL Certificate for use with Ejabberd.It covers both the creation of the Certificate Signing Request, the preparing ofthe certificate for use with Ejabberd and the installation of the certificate.

If you like this article, consider sponsoring me by trying out a Digital OceanVPS. With this link you'll get $100 credit for 60 days). (referral link)

If you need to set up an ejabberd server then you can read my tutorial here howto do that.

This tutorial assumes a working ejabberd installation. It is tested on Debianand Ubuntu, but should work on any ejabberd installation.

Steps and Explanation

To get an SSL certificate working on ejabberd we need to do a few things:

With a certificate we can secure our XMPP connection and conversations. This wayit is much harder for others to spy on your conversations. Combined with OTRthis enabled a super secure channel for conversation.

Creating the Certificate Signing Request

Create a folder to store all the files and cd to that:

mkdir -p ~/Certificates/xmpp cd ~/Certificates/xmpp

Now use OpenSSL to create both a Private Key and a CSR. The first command willdo it interactively, the second command will do it non-interactive. Make sure toset the correct values, your Common Name (CN) should be your XMPP server URL:

Interactive:

openssl req -nodes -newkey rsa:2048 -keyout private.key -out CSR.csr

Non-interactive:

openssl req -nodes -newkey rsa:2048 -keyout private.key -out CSR.csr -subj"/C=NL/ST=State/L=City/O=Company Name/OU=Department/CN=chat.example.org"

This will result in two files, CSR.csr and private.key. You now have tosubmit the CSR to a Certificate Authority. This can be any CA, I myself havegood experiences with Xolphin, but there are others like Digicert andVerisign.

Once you have submitted your CSR and have gotten a Certificate you can continue.

Creating the ejabberd certificate

Once you have all the files (private key, certificate and certificate chain),put them all in a folder and continue. We are going to cat all the requiredfiles into a ejabberd.pem file.

This needs to happen in a specific order:

So adapt the following commands to your filenames and create the pem file:

cat private.key >> ejabberd.pem cat certificate.pem >> ejabberd.pem catchain-1.pem >> ejabberd.pem cat chain-2.pem >> ejabberd.pem

If that all works out continue.

Installing the certificate in ejabberd

Copy the certificate to all your ejabberd servers:

scp ejabberd.pem user@srv1.example.org:

The place the certificate in the /etc/ejabberd folder:

cp ejabberd.pem /etc/ejabberd/ejabberd.pem

Now change the ejabberd config to point to the new certificate:

vim /etc/ejabberd/ejabberd.cfg

Check/change the following to point to the new certificate:

[...] {listen, [ {5222, ejabberd c2s, [ {access, c2s}, {shaper, c2s shaper},{max stanza size, 65536}, starttls, {certfile, "/etc/ejabberd/ejabberd.pem"}]}, [...] {s2s use starttls, true}. {s2s_certfile,"/etc/ejabberd/ejabberd.pem"}. [...]

Afterwards restart ejabberd:

/etc/init.d/ejabberd restart

You can now use any XMPP client to connect with SSL/TLS to see if it works.

Tags: certificate, chat, dns, ejabberd, erlang, federation, jabber, secure, ssl, starttls, tutorials, xmpp