Configure your Windows Remote Desktop (RDP) to use TLS with a StartSSL certificate

I wanted to use TLS with non-self-signed certificates for RDP connections to my workstation at home and so I set out to make it happen. Since I don't have a domain with Active Directory (anymore...) the 'usual' methods found on the web don't quite apply. Here's a simple, step-by-step, guide on how to use StartSSL certificates to secure your RDP connection. This should also work fine with certificates from other CA's; step 2 and 3 (obtaining the .crt file)  can/will be different but other than that you should be fine.
  1. Create a CSR (link). I used a Debian machine for this, you may want to use a Windows port of OpenSSL.
    openssl req -out mypc.csr -new ↩
     -newkey rsa:4096 -nodes -keyout mypc.key
    OpenSSL command in Windows commandline to generate CSR

  2. Get the certificate by submitting the CSR to StartSSL and save as mypc.crt.
    1. Start the certificate wizard, select Webserver SSL certificate
    2. Skip the private key generation, another two wizards screens can be skipped / ok'ed.
    3. Paste the CSR contents
    4. Enter the hostname
  3. If all went well (and you clicked OK / next / whatever) a few times you should be presented with a textbox with gibberish; this is your certificate (.crt) copy the text (make sure you select the entire contents of the textbox). Open notepad, paste the certificate, save as mypc.crt.
  4. Now we'll create a PFX (link) file. You will want to include the StartSSL intermediate certificate (« right-click the link, select 'save as...') in the chain; save it in the same directory as where your mypc.crt and mypc.csr are stored. Then execute the following commands:
    type mypc.crt > all.pem
    echo. >> all.pem
    type sub.class1.server.sha2.ca.pem >> all.pem

    openssl pkcs12 -export -out mypc.pfx ↩
     -inkey mypc.key -in all.pem
    Create PFX file
    The first three lines create an "all.pem" file by first copying mypc.crt, then a newline and then adding StartCom's intermediate certificate to all.pem.

  5. Start the management console (WinKey + R then type mmc.exe and hit enter) and add the certificate snap-in (File menu » Add Remove Snap-in). Make sure you pick Computer Account and Local Computer when adding.

  6. Add certificate snap-in
  7. Under Certificates (Local computer) select Personal » Certificates. Right-click the certificates node, choose All tasks and then click Import. Select the PFX file you created in step 3.

    Import PFX to personal certificates
  8. Copy the freshly imported certificate (highlight it, hit CTRL + C) and open the Remote Desktop » Certificates node. Paste the certificate in the right-hand pane.
  9. Double-click the certificate and navigate to the Details tab. Scroll down until you find the Thumbprint; click it and select the value that contains a bunch of hexadecimal numbers (displayed in groups of 2 hex digits). Select and copy the thumbprint.

    Select and copy the thumbprint (25 93 ... 81 69 in this example)
  10. Open notepad or any other texteditor, paste the thumbprint and remove all spaces. Also make sure you check the first character; it may contain an invisible value or display as ? or other strange character (depending on the editor). Make sure the end result is a 40 letters (a-f) and/or digits string.
  11. Open a command prompt as Administrator and paste the following command:
    wmic /namespace:\\root\cimv2\TerminalServices ↩
     PATH Win32_TSGeneralSetting Set ↩
    Make sure you replace the "<thumbprinthere>" value with the actual thumbprint (keep the quotes in the command). With the example from step 8 the command would be:
    wmic /namespace:\\root\cimv2\TerminalServices ↩
     PATH Win32_TSGeneralSetting Set ↩
That's it. You should be done and it should work now.

The endresult. All that hard work for such a small padlock...
Oh, you might want to keep an eye on LetsEncrypt which, at the time of writing this, is close to launchdate. They should be able to provide free SSL certificates too.

References I used while figuring this out:

No comments:

Post a Comment