You are here

Back-end Client Certificates

Affects version(s): 
7.4.x and older

This is a howto for setting up mutual SSL authentication between Airlock WAF and a back-end server. With mutual SSL authentication both parties, the Airlock WAF and the back-end server, can be certain that they are communicating with the trusted endpoint (man in the middle attack is mitigated).

  • Configure the back-end server to listen for HTTPS and require a SSL client certificate.
  • Create a SSL client certificate in the PEM format for Airlock WAF. The PEM format looks like this (example):

    -----END RSA PRIVATE KEY----

  • Upload the files backend_server_ca.pem, backend_client_cert.pem and backend_client_cert_key.pem to the directory /opt/airlock/custom-settings/gatekeeper/ on Airlock WAF by using scp.
  • Sign in on the Airlock WAF console as root
  • Run the following commands:

    chmod 040 /opt/airlock/custom-settings/gatekeeper/*.pem
    chown fown:sg /opt/airlock/custom-settings/gatekeeper/*.pem

    The settings below defines whether or not Airlock WAF should verify the back-end server certificate.

    The file contains one or more CA certificates in the PEM format. To successfully establish a connection, the back-end server certificate must be signed by at least one of those certificate authorities.

    In case that BackendSSLVerifyHost is set to TRUE, the common name (CN) in the back-end server certificate must match the Host header which is sent to the back-end server. Keep in mind that the Airlock WAF Response Action "Rewrite Host Header" directly influences this value and could result in a failed verification. The default of this setting is TRUE.

  • Configure the following Expert-Settings either globally or only in the Back-end Group:

BackendSSLServerCA "/opt/airlock/custom-settings/gatekeeper/backend_server_ca.pem"
BackendSSLClientCert "/opt/airlock/custom-settings/gatekeeper/backend_client_cert.pem"
BackendSSLClientCertKey "/opt/airlock/custom-settings/gatekeeper/backend_client_cert_key.pem"
BackendSSLVerifyHost "TRUE"

  • Activate

This configuration including the uploaded files are activation-, reboot- and update-resistent. Only in case of a new Airlock WAF installation the uploaded files are no longer available. Since the files are not part of the configuration zip file which can be exported through Airlock WAF configuration center, ensure that those files are properly backed up.


Knowledge Base Categories: