Changes

2,288 bytes added ,  14:12, 22 March 2023
no edit summary
Line 30: Line 30:  
| style="width: auto; text-align: left; background: #F6F6FB;"        | These features will only show up in configurator when device is connected to a computer.
 
| style="width: auto; text-align: left; background: #F6F6FB;"        | These features will only show up in configurator when device is connected to a computer.
 
|}
 
|}
 +
 +
Some services (such as OpenVPN, MQTT, etc.) on Teltonika Mobility devices can be secured using <b>TLS</b> for encryption and authentication. This page discusses where one can obtain TLS certificates and key for this purpose.
 +
 +
===What is TLS/DTLS ?===
 +
'''Transport Layer Security (TLS)''' aims primarily to provide privacy and data integrity between user (device) and server, where it negotiates the message cryptography, it authenticates code keys to ensure a safe data transfer.
 +
 +
'''Datagram Transport Layer Security (DTLS)''' is a communications protocol designed to protect data privacy and preventing eavesdropping and tampering. It is based on the Transport Layer Security (TLS) protocol, which is a protocol that provides security to computer-based communications networks.
 +
 +
The main difference between DTLS and TLS: 
 +
* '''Datagram Transport Layer Security (DTLS)''' uses '''User Datagram Protocol (UDP)'''
 +
* '''Transport Layer Security (TLS)''' uses '''Transmission Control Protocol (TCP)'''.
 +
 +
===Why does traffic encryption matter?===
 +
 +
1) '''It prevents a man-in-the-middle attack.''' TLS encryption turns structured data into randomized noise which makes it impossible to pull anything usable out of it. <br>
 +
2) '''It prevents data injection.''' TLS connection implies an initial handshake so the connection will be closed if certificates mismatch. <br>
 +
3) '''Traffic encryption is better than no traffic encryption.''' TLS allows and guarantees data exchange in a safe and private environment between two entities, user and server. <br>
 +
 +
===Certificate generation===
 +
 +
Certificates secure client and server identities. After root certificates are installed, certificates get added to the root trust stores to secure connections between users and hosts, including devices and application users.
 +
 +
If you are using a third party service that requires TLS, all necessary files should be provided by the provider of that service. However, if you are setting up your own solution you may find use in of the <b>TLS certificate generation methods</b> described below.
 +
 +
====Computer====
 +
----
 +
You can also use third party software to generate the certificates on your computer. Guides are available for:
 +
 +
<ul>
 +
    <li>[[How to generate TLS certificates (Windows)?|Windows]]</li>
 +
</ul>
0

edits

Navigation menu