E-Book: Mosquitto – MQTT BROKER FOR IoT (Internet of Things)

Some of my books i wrote for CTS GMBH (http://CTS.at) are published by them at Amazon. The full list of published books is available here.

Mosquitto – MQTT BROKER FOR IoT (Internet of Things)

ASIN: B01N21U0AA

Available at Amazon here

E-Book: Mosquitto  – MQTT BROKER FOR IoT (Internet of Things)

Mosquitto – MQTT BROKER FOR IoT (Internet of Things)

Guide to setup a free and secure MQTT network using 2 bridged brokers, SSL encryption and Cert based authentication.

Basic setup guide with pictures and sample configs!

Real life example using Owntracks App!

IoT (Internet of Things) short info

The Internet of Things (IoT) will massive change the world of IT professionals. Machine-to-machine communication, home automation and other new ways of communication or management will deeply move into the business and private world.

IoT is the next multi-billion dollar tech market where IT professionals will meet people from home automation, office and production automation, PLC (programmable logic controller) developers and transportation engineers. All of them are fighting for their part of the market.

Customers wants to switch heating on or off from their smartphone in the same way as they want to control home or office lights, doors, cams and even the fridge. Not enough, they want the lights go on the time they arrive at home, wants to see the location of family members or business staff on maps and far more.

Machines will communicate with machines to securely drive without a human, order missing food in your home and alert in case of emergency.

Developer, designers and managers already have $ signs in their eyes every time thinking about the M2M (machine-to-machine) market.

I am not sure we really want to have that way of control and communication entering and changing our personal live that much, but we will have to live with it and so we have to deal with the security of IoT.

Introducing a fully featured Open Source Software, available as source code and binary version for Windows, Linux and MAC.

Table of Contents

Introduction

Table of Contents

Legal Notes

Introduction to IoT

IoT (Internet of Things) short info 8

IoT security problems with 9

MQTT Broker for IoT (Internet of Things) 11

Developers MQTT description on mqtt.org 11

Firewall Setup (Optional)

Description of firewall ports 13

Setup of this guide – Our Goal

Network setup 14

Our final setup will be 15

Download & Install Mosquitto

Download the software 17

Install and start the software 17

First configuration steps

Prepare the needed SSL certificates 19

We will need the following certificates 19

Server Black 19

Server White 21

Configure Mosquitto 22

Black Server(copy certificates) 22

White Server(copy certificates) 23

Both Servers(mosquitto.conf) 24

Black Server(mosquitto.conf) 25

White Server(mosquitto.conf) 25

Create users in pwfile 26

Black Server(pwfile) 27

White Server(pwfile) 27

Create aclfile 27

Black Server(aclfile sample) 28

White Server(aclfile) 28

Restart the server and check log 29

Black Server(Startup Messages) 29

White Server(Startup Messages) 29

Testing Setup with MQTT.fx

Introducion to MQTT.fx 31

Black Server(MQTT.FX connection settings) 32

White Server(MQTT.FX connection settings) 33

MQTT.FX tabs 33

Log 33

Broker Status 33

Scripts 34

Subscribe 34

Publish 35

A real life example using Owntracks

Prepare Owntracks setup 38

Install Owntracks on your smartphone 38

More Features

About The Author

Other Books By (Author)

Link List for this e-book

Mosquitto project page 44

Openfire download page 44

MQTT.fx project page 44

MQTT.fx download page 44

Authors e-book about SSL Certificates 44

Description of the XMPP protocol 44

MQTT project page 45

Owntracks Project Page 45

FreeBSD Project Page 45

Can I Ask A Favour?

About The Author

Karl M. Joch is founder of CTS GMBH with more than 30 years experience in national and international projects. He worked in over 15 countries.

A CTS Solutions IT-Pro Book

E-Book: Openfire – Create your own XMPP Messaging Server

Some of my books i wrote for CTS GMBH (http://CTS.at) are published by them at Amazon. The full list of published books is available here.

Openfire

ASIN: B01MR4A5OU

Available at Amazon here

Openfire

Easy step by step guide with ~ 20 images to create your own XMPP Messaging Server with free Open Source Software available for Windows, Linux and MAC.

You can use the software introduced in this e-book to operate your server with encrypted messaging,

Openfire, previously know as Wildfire and Jive Messenger, is a Java based Open Source instant messaging system and group chat server.

The software is using the XMPP protocol and because of Java the software is platform independent and runs on all major operating systems like Linux, Unix, Mac OS X and Windows.

The Openfire project page shows more than 7 Million downloads for build 4.1.1 and offers binaries for the named operating systems.

Openfire is able to run your own secure and encrypted private messaging server for friends and family in the same way as the software can run your scalable enterprise messaging system.

Openfire offers:

Web-based administration panel

Plugin interface

SSL/TLS support

User-friendly web interface

embedded HSQLDB or other DBMS

LDAP connectivity

Platform independent, pure Java

can support > 50,000 concurrent users

Introducing a fully featured Open Source Software, available as source code and binary version for Windows, Linux and MAC.

Table of Contents

Introduction

Table of Contents

Legal Notes

Introduction to Openfire

SSL encrypted messaging 7

Firewall Setup (Optional)

Description of firewall ports 8

Download & Install Openfire

Download the software 13

Install and start the software 13

First configuration steps

Connect to the web interface 15

First time connecting 15

Detailed setup of Openfire

Protect the web interface with SSL 18

Create SSL certificates for all stores 21

The Server tab

Server Manager 22

Server Information 22

System Properties 22

Server Manager other tabs 22

Server Settings 23

Client Connections 23

Server to Server Settings 24

Registration & Login (Really check this one) 26

Gateways 27

Settings 27

Transport 27

Archiving 27

Archive Settings 27

User/Groups

Users 29

Groups 29

Configure your client

Setting up a desktop client 31

Connect and test 31

Test external connections 32

More Features

About The Author

Other Books By (Author)

Link List for this e-book

Openfire project page 36

Openfire download page 36

Authors e-book about SSL Certificates 36

Description of the XMPP protocol 36

FreeBSD Project Page 36

XMPP / Jabber Clients 36

Can I Ask A Favour?

About The Author

Karl M. Joch is founder of CTS GMBH with more than 30 years experience in national and international projects. He worked in over 15 countries.

A CTS Solutions IT-Pro Book

E-Book: FREE SSL CERTIFICATES

Some of my books i wrote for CTS GMBH (http://CTS.at) are published by them at Amazon. The full list of published books is available here.

FREE SSL CERTIFICATES

ASIN: B01N7RZ9XC
Available at Amazon here

E-Book: FREE SSL CERTIFICATES

FREE SSL CERTIFICATES

Secure your Web server with free Let’s Encrypt Certificates

Guide to fully automate the process of creating and renewing certificates without the need of installing extra software.

Script based copy & paste solution for Linux, FreeBSD and Plesk.

Introduction SSL Certificates

In the past services offered on the Internet mostly was unencrypted and traffic was sent in clear text between server and user.

Times has changed now, spying on traffic and hacking is all around. Actually it needs less than a few minutes to have the first bots trying all of their exploit scripts against your IP address. Never think you are not important enough for hackers because in the first step bots operates on IP addresses without knowing who is behind this IP address. Things will be exploited pretty fast.

Traffic sniffing exploits usernames, passwords and sensitive data, making follow up attacks very easy and successful.

Traffic encryption with SSL certificates, combined with other prevention methods, using modern and state-of-the-art server technologies is a must for all servers providing services like web access.

To validate a certificate, they are signed by a Certificate Authority. Browsers like Firefox e.g. includes certificates of commercial authorities to be able to check the validity of the certificate. Without these certificates browsers would give a warning that they cannot identify the certificate of your server. This happens with so named self signed certificates too.

A warning like this is unacceptable for people visiting a website or any other service.

To operate publicly available services you need certificates signed by a known authority. You can buy them at different companies. Only those ones will let the browser show your URL in green without importing any additional CA root certificate.

For web servers accessible from the Internet “Let’s Encrypt” Authority offers free, if installed as intended, fully automated, certificates. These certificates are valid for 3 months. Receiving and renewing them can be done script based and fully automated.

Free, no paper work and fully automated if professional installed.

A lot of Let’s Encrypt client software is available making the use of Let’s Encrypt certificates very easy and straightforward.

Paranoid as I am, I don’t want to install extra software on any server just for updating certificates. Every added software package can be a security risk on a publicly available server especially if additional programming languages or interpreters are added.

After searching for a great solution a long time, I was able to handle everything only adding a shell script solution and finally wrote this e-book for you.

Table of Contents

Introduction

Table of Contents

Legal Notes

Introduction SSL Certificates

Firewall Setup (Optional)

Description of firewall ports 8

Setup of this guide – Our Goal

Network setup 9

Our final setup 9

Prepare your operating system

FreeBSD 10

Linux 10

Linux & FreeBSD 11

Building Run_Certs.sh

Run_Certs.sh in detail (copy & paste it) 13

Creating our config file 14

Creating our domains.txt file 14

Prepare the web server

Preparing Apache for Run_Certs.sh 15

Create .well-known in document root 15

Create hook.sh

hook.sh for FreeBSD or Linux 17

hook.sh for Plesk servers 18

Plesk automation explained: 18

Create the first certificate

Configure Apache to use certificates

Checking Plesk servers

Automate the process of renewing

More Features

About The Author

Other Books By (Author)

Link List for this e-book

Let’s Encrypt – Project 28

Dehydrated Project 28

FreeBSD Project Page 28

Can I Ask A Favour ?

About The Author

Karl M. Joch is founder of CTS GMBH with more than 30 years experience in national and international projects. He worked in over 15 countries.

A CTS Solutions IT-Pro Book

E-Book: My own Certificate Authority

Some of my books i wrote for CTS GMBH (http://CTS.at) are published by them at Amazon. The full list of published books is available here.

My own Certificate Authority

ASIN: B01N31I9PQ

Available at Amazon here

My own Certificate Authority

Easy step by step guide with over 20 images to create your own graphical CA (Certificate Authority) for Intranets with free Open Source Software available for Windows, Linux and MAC.

You can use the software introduced in this e-book to operate your own CA. Well organized you are able to create a master root certificate for your CA to sign your certificates. Furthermore, you are able to create a sub CA certificate for a department and they can handle their Intranet SSL certificates by themselves.

Introducing a fully featured Open Source Software, available as source code and binary version for Windows, Linux and MAC, able to handle X.509 certificates, certificate requests, RSA, DSA and EC private keys, Smartcards and CRLs.

Table of Contents

Introduction

Table of Contents

Legal Notes

The Problem of IT-Admins

Types of Certificates needed  8

Certificates signed by a known Authority 9

Certificates signed by your own Authority 9

Ways to create or receive Certificates 10

Buying Certificates 11

Using Let’s Encrypt Web Server Certificates 11

Your own Certificate Authority 12

Introducing the CA software

Features 14

Download & Installation 15

First Start 16

Creating your first database 17

Using Templates

Create your CA Template 19

Create your Server Template 21

Create your Client Template 22

Template Overview 22

Your Master CA Certificate

Create certificate from template 23

Check your Certificate 25

Export the public key for distribution 26

Creating the CA structure

Create the first sub CA 27

Creating Server Certificates

Create server certificate from template 30

Preparing your Apache https server 32

Sample Apache SSL config 33

More Features

Creating signing requests 34

Importing bought certificates 34

Revocation management 34

Delegating CA’s

After adding more data

About The Author

Karl M. Joch is founder of CTS GMBH with more than 30 years experience in national and international projects. He worked in over 15 countries.

A CTS Solutions IT-Pro Book