OTP's built-in Grizzly web server is configured to accept HTTPS connections on port 8081 by default, but the HTTPS listener needs an encryption key to establish a connection. The key is placed in a " keystore", a format specific to Java server environments.
By default, OTP will look for the keystore at /var/otp/keystore
. To generate a self-signed key for
testing, use the command:
keytool -genkey -keystore /var/otp/keystore -alias OTPServerKey
The alias of the key is arbitrary, but it's best to supply one that indicates the purpose of the key
to override the default. keytool
will ask you a series of questions about you and your
organization; again, any values will do when creating this self-signed test key. keytool
will also
ask you for a password to protect your keystore and key. This password will eventually be
configurable, but for now it is hard-coded into the OTP server, so you must set the keystore and key
passwords both to opentrip
.
Of course with a self-signed key, most clients will (rightfully) refuse to connect without special
permission from the user. You'll need to add a security exception to most web browsers, or add
the --insecure
switch when using CURL. You could theoretically buy and install a "real" trusted
SSL/TLS certificate it in the keystore using keytool -gencert
, but since none of the functionality
protected by this encryption is public-facing a self-signed key should be sufficient for most use
cases. All connections to these API methods should be from trusted parties who can verify the
validity of the key with you directly as needed.
Once you have created a key, start up the OTP server and test that HTTPS access and authentication
are possible. You should also be able to fetch any OTP resources over HTTPS. For example, you could
simply open https://localhost:8081/index.html
in a browser, or open a raw TLS connection
using openssl s_client -connect localhost:8081
, then issue the request GET index.html HTTP/1.1
.
TODO explain CORS, explain adding TLS with reverse proxy e.g. nginx