
Change to the directory that has the r file created by the previous step.
Stunnel ciphers windows#
Therefore, for an encrypted connection, the certificate file must be installed to a Windows certificate store. On Windows, Refinitiv Real-Time SDKs use WinInet to create HTTP and HTTPS connections to a server.
Stunnel ciphers install#
(Windows Only) Install the certificate file This example supports an encrypted connection.ġ. To demonstrate this, I use the Cons112 example (112 MarketPriceTunnelingConnection) in the package.
Stunnel ciphers how to#
The next sections show how to set up and configure Refinitiv Real-Time SDKs to connect to the stunnel. Then, the stunnel is ready for accepting encryption connections from Refinitiv Real-Time APIs. The converted certificate file will be used in the following sections.Īfter starting stunnel, you need to make sure that the ADS is up and running. Add the following configurations to nf at the end of file

The stunnel package can be downloaded from 2. In this article, stunnel is used as an SSL accelerator to handle encryption on behalf of ADS. stunnel uses the OpenSSL library to support the underlying TLS or SSL protocol. Stunnel is an open-source multi-platform application used to provide secure encrypted connections for clients or servers that do not natively support SSL or TLS. The ADS must be installed and run properly on the environment. It is assumed that the reader is familiar with EMA or ETA applications, and has experience developing products using the C, C++ or java programming language in a networked environment. For more information, please refer to the Configuring Encrypted Connections on ADS article. There is no need to have an SSL accelerator to handle the encryption. The peer-certificate.pem file needs to contain the server certificate.Note: However, since version 3.4.0.L1, ADS has supported encrypted connections. The following configuration requires stunnel version 4.46 or higher: The ca-certs.pem file contains the certificates of trusted certificate authorities.Īlternatively, a technique known as certificate pinning can be used. The following configuration requires stunnel 5.15 or later: Stunnel can use an existing PKI (Public Key Infrastructure). The "key" option may be omitted if cert.pem also contains the private key. A certificate can also be purchased from one of the available commercial certificate authorities. On Unix platforms, a certificate can be built with "make cert". The Windows installer of stunnel automatically builds a certificate. Unless PSK authentication is configured, each stunnel server needs a certificate with the corresponding private key. The advantage of this configuration is that it does not require individual secrets for each of the clients. Certificatesįor simplicity, this tutorial only covers server authentication. Otherwise, all the clients sharing the same key will have to be reconfigured if the key is compromised. The psk1.txt file only needs a single line: test1:oaP4EishaeSaishei6rio6xeeph3azĮach client needs a separate secret. The psk.txt file contains one line for each client: test1:oaP4EishaeSaishei6rio6xeeph3az Server ConfigurationĪ trivial configuration example: PSK authentication requires stunnel version 5.09 or higher. PSK is also the fastest TLS authentication.

It provides both client and server authentication. The easiest way to configure authentication is with PSK (Pre-Shared Key). Client authentication allows for restricting access for individual clients (access control).Server authentication prevents Man-In-The-Middle (MITM) attacks on the encryption protocol.Either the TLS client, the TLS server, or both need to be authenticated:
