Documentation
6.10. AS2¶
An as2 location allows sending files to a remote AS2 server.
The AS2 protocol can use HTTP or HTTPS (secure) connections.
Note
The as2 location can only be used as the destination for a transfer, only for sending files over AS2. If you need to receive files over the AS2 protocol, you will need to configure the HTTP file transfer service.
Unlike a typical web browser connection, to protect an AS2 HTTPS connection you will have to explicitly configure the list of trusted CAs and the location of the CRLs.
6.10.1. name¶
- Default value:
Empty
- Optional:
No
- From version:
2.8.0
- Values:
Any text.
- Description:
Human-readable short text used to identify this location.
6.10.2. description¶
- Default value:
Empty
- Optional:
Yes
- From version:
2.8.0
- Values:
Any text.
- Description:
Human-readable text that describes the purpose of this location.
6.10.3. type¶
- Default value:
''
- Optional:
No
- From version:
2.6.0
- Values:
filesystem - Local file system.
sftp - SFTP protocol v3 over SSH v2.
ftp - FTP protocol without any encryption.
ftpse - Explicit FTPS protocol.
ftpsi - Implicit FTPS protocol.
webdavs - WebDAV over HTTPS.
as2 - AS2 over HTTP or HTTPS
azure-file - Azure File Service.
smb - SMB / Windows Share
- Description:
This option specifies the type of the location. Each type has a set of specific configuration options
6.10.4. idle_connection_timeout¶
- Default value:
300
- Optional:
Yes
- From version:
3.0.0
- Values:
Number of seconds
0
- Description:
This controls the automatic disconnection from the remote server after the location has not received any file transfer operation requests for the configured number of seconds.
Keep-alive command requests are not counted as file transfer operations. The connection gets automatically disconnected if keep-alive is the only command requested in the configured interval.
Disconnected locations automatically reconnect when a new file transfer operation request is made. For example, when a new file needs to be transferred to the remote server.
If the remote peer closes the connection before the configured timeout, the connection is left closed. It gets automatically reconnected when a new file transfer operation is requested.
Set to 0 to always keep the connection active, by forcing re-connection when the remote server closes the connection.
Note
The idle_connection_timeout is the maximum number of seconds before closing an idle connection to the server. If the remote server decides that the connection is idle and closes the connection, SFTPPlus doesn't try to "challenge" the server, leaving the connection closed. The connection is automatically reopened next time a file needs to be transferred.
6.10.5. idle_connection_keepalive_interval¶
- Default value:
0
- Optional:
Yes
- From version:
3.0.0
- Values:
Number of seconds
- Description:
Send a keep-alive command every N seconds to avoid having the connection disconnected by the other peer due to inactivity.
Set to 0 to disable keep-alive commands.
The keep-alive command does not reset the idle connection timeout,
6.10.6. connection_retry_count¶
- Default value:
12
- Optional:
Yes
- From version:
3.9.0
- Values:
Number of retries
- Description:
Number of times to retry connection to the location, when the initial connection fails.
Set to 0 to not retry.
6.10.7. connection_retry_interval¶
- Default value:
300
- Optional:
Yes
- From version:
3.9.0
- Values:
Number of seconds
- Description:
Number of seconds to wait between connection attempts.
Set to 0 to retry right away without any delay.
6.10.8. url¶
- Default value:
Empty
- Optional:
No
- Values:
text
- From version:
4.5.0
- Description:
Receiving URL for your partner.
SFTPPlus will use this URL to send files to your AS2 partner.
When this is defined as an http:// URL, the SSL configuration options are ignored.
6.10.9. username¶
- Default value:
Empty
- Optional:
Yes
- From version:
4.5.0
- Values:
Text.
- Description:
Username used to authenticate to the remote AS2 partner server.
Leave it empty when the remote AS2 partner doesn't require authentication.
6.10.10. password¶
- Default value:
Empty
- Optional:
Yes
- From version:
4.5.0
- Values:
Plain text password.
Empty.
- Description:
This option specifies the password used to connect to the remote AS2 partner server.
It is ignored when username is empty.
6.10.11. as2_own_identifier¶
- Default value:
Empty
- Optional:
No
- From version:
4.5.0
- Values:
Text.
- Description:
Identifier for your own local AS2 organization sending the files.
6.10.12. as2_own_certificate¶
- Default value:
'General server SSL certificate'
- Optional:
No
- From version:
4.5.0
- Values:
PEM certificate.
PEM certificate and PEM private key.
- Description:
Certificate for your own local AS2 organization used when signing files sent to a remote AS2 partner.
The certificate should be configured in PEM format.
This configuration can also contain the private key associated to the certificate.
This can be empty when sending unsigned files.
6.10.13. as2_own_private_key¶
- Default value:
'General server SSL private key'
- Optional:
No
- From version:
4.5.0
- Values:
PEM private key.
- Description:
Certificate for your own local AS2 organization used when signing files sent to a remote AS2 partner.
The certificate should be configured in PEM format.
This configuration can also contain the private key associated to the certificate.
6.10.14. as2_partner_identifier¶
- Default value:
Empty
- Optional:
No
- From version:
4.5.0
- Values:
Text.
- Description:
Identifier for the remote AS2 partner receiving the files.
6.10.15. as2_partner_certificates¶
- Default value:
Empty
- Optional:
No
- From version:
4.5.0
- Values:
PEM certificate
Multiple PEM certificates
- Description:
Certificate in PEM format used to encrypt files sent to the AS2 partner and to validate the received signed MDN.
You can define multiple PEM certificates for the case in which the partner uses different certificates for signing and encryption.
Old and new PEM certificates can be defined at the same time for a partner's certificate rollover.
When sending encrypted files, the first configured PEM certificate will be used for the encryption operation.
6.10.16. as2_send_security¶
- Default value:
'signed-and-encrypted'
- Optional:
yes
- From version:
4.5.0
- Values:
signed-and-encrypted
signed
encrypted
disabled
- Description:
This defines the method used to secure the file transfers on top of the standard security provided by the HTTPS protocol.
When encrypting file content, the first certificate defined at as2_partner_certificates is used.
When signing file content, the digest/hashing algorithm defined in as2_signature_algorithm is used.
When defined as disabled, files are sent unsigned and unencrypted.
6.10.17. as2_mdn_receipt¶
- Default value:
'sync-signed'
- Optional:
yes
- From version:
4.5.0
- Values:
sync-signed
sync-unsigned
async-signed
async-unsigned
disabled
- Description:
This defines the method used to request the message disposition notifications (MDN) receipt.
When requesting a signed MDN, it will make the request using the digest/hashing algorithm defined in as2_signature_algorithm.
When asynchronous MDN is enabled, you will need to set the as2_async_mdn_url and as2_async_mdn_server_uuid configuration options.
When defined as disabled, it will not request an MDN receipt.
6.10.18. as2_encryption_algorithm¶
- Default value:
'aes256'
- Optional:
yes
- From version:
4.5.0
- Values:
3des
aes128
aes192
aes256
- Description:
Symmetric encryption algorithm used to encrypt sent files.
All algorithms use the Cipher Block Chaining (CBC) mode and PKCS#1 v1.5 padding.
6.10.19. as2_signature_algorithm¶
- Default value:
'sha256'
- Optional:
yes
- From version:
4.5.0
- Values:
md5
sha1
sha224
sha256
sha348
sha512
- Description:
Digest / Hashing algorithm used when signing sent files and requesting the MDN receipt.
6.10.20. as2_compressed¶
- Default value:
no
- Optional:
Yes
- From version:
5.6.0
- Values:
yes
no
- Description:
Whether the file to be sent is automatically compressed during the transfer.
Enabling the compression will increase CPU usage, while it might reduce the size of the data that is transferred over the network.
6.10.21. as2_content_type¶
- Default value:
'application/octet-stream'
- Optional:
Yes
- From version:
4.5.0
- Values:
MIME content type
- Description:
MIME content type used when sending AS2 files.
6.10.22. as2_async_mdn_server_uuid¶
- Default value:
Empty
- Optional:
Yes
- From version:
5.6.0
- Values:
service UUID
empty
- Description:
The UUID of the HTTP/HTTPS server that will receive the asynchronous MDN messages, on behalf of this AS2 client location.
Leave it empty, if your transfers are using synchronous MDN.
6.10.23. as2_async_mdn_url¶
- Default value:
Empty
- Optional:
Yes
- From version:
5.6.0
- Values:
text
empty
- Description:
The public URL where the remote AS2 server should send back the asynchronous MDN message.
Leave it empty, if your transfers are using synchronous MDN.
6.10.24. as2_async_mdn_timeout¶
- Default value:
600
- Optional:
Yes
- From version:
5.6.0
- Values:
Number of seconds
- Description:
Number of seconds to wait for receiving the asynchronous MDN message.
The value must be greater than 0.
The maximum allowed value is 604800 seconds, or one week.
6.10.25. as2_check_method¶
- Default value:
head
- Optional:
Yes
- From version:
5.6.0
- Values:
head
get
- Description:
The HTTP method used to validate the configuration for the remote AS2 server.
6.10.27. ssl_domains¶
- Default value:
Empty
- Optional:
Yes
- Values:
Fully qualified domain name (FQDN)
Comma separated list of fully qualified domain names
Empty
- From version:
3.42.0 This configuration option defines the domain for which SFTPPlus will request certificates from the Let's Encrypt server.
The same domain can be shared by multiple services.
The domain name is handled as a case-insensitive lower case value.
You can generate a certificate with multiple domain names (Subject Alternative Name - SAN), by defining a comma-separated list of domain names. The first name from the list is used as the common name of the certificate, while the remaining names are used for the SAN extension.
For this option to be used, you need to define a lets-encrypt resource.
6.10.28. ssl_certificate¶
- Default value:
Empty
- Optional:
Yes
- Values:
Absolute path on the local filesystem.
Certificate in PEM text format (Since 3.40.0).
Certificate in PKCS12 / PXF binary format (Since 4.0.0).
Empty
- From version:
1.6.0
- Description:
This can be defined as an absolute path on the local filesystem to the file containing the SSL certificate or chain of certificates used by the component.
File content should be encoded in the Privacy-Enhanced Mail (PEM) or PKCS12 / PFX formats.
File extension should be .p12 or .pfx for the file to be recognized as a PCKS-12 certificate. The password for the PCKS12 / PFX certificate should be set in the ssl_key_password configuration option.
Note
The path should not be longer than 256 characters.
You can also define the content of the certificate as text in PEM format. In this case the configuration will look as in the following example. It's important to start each line with at least one space character and keep the number of leading spaces constant:
ssl_certificate = -----BEGIN CERTIFICATE----- MIICaDCCAdGgAwIBAgIBDjANBgkqhkiG9w0BAQUFADBGMQswCQYDVQQGEwJHQjEP ... MORE CERTIFICATE DATA ... JZQaMjV9XxNTFOlNUTWswff3uE677wSVDPSuNkxo2FLRcGfPUxAQGsgL5Ts= -----END CERTIFICATE-----
When the value contains both the certificate and the key, the configuration will look as in the following example:
ssl_certificate = -----BEGIN RSA PRIVATE KEY----- MIICXgIBAAKBgQDOoZUYd8KMYbre5zZIwR+V6dO2+cCYVS46BHbRbqt7gczkoIWh ... MORE KEY DATA ... Wh+QF3UArO8r8RYv3HRcnBjrGh+yEK93wIifVNGgy63FIQ== -----END RSA PRIVATE KEY----- -----BEGIN CERTIFICATE----- MIICaDCCAdGgAwIBAgIBDjANBgkqhkiG9w0BAQUFADBGMQswCQYDVQQGEwJHQjEP ... MORE CERTIFICATE DATA ... JZQaMjV9XxNTFOlNUTWswff3uE677wSVDPSuNkxo2FLRcGfPUxAQGsgL5Ts= -----END CERTIFICATE-----
This certificate is sent to the remote peer during the SSL/TLS handshake process.
The certificate file can contain both the certificate and the private key, in which case you don't need to set the path to the private key. Only supported for PEM encoding.
The certificate file can contain the full chain of certificates. The targeted certificate should be first in the file, followed by the chained certificates. It will advertise the certificate chain in the same order as listed in the file. Only supported for PEM encoding. (Since 3.22.0)
For server-side components using TLS/SSL secure communication, this configuration option is required. If no value is defined here, the global ssl_certificate value is used.
For the client-side component using TLS/SSL, you can disable sending the certificate as part of the handshake, by leaving this configuration option empty.
6.10.29. ssl_key¶
- Default value:
Empty
- Optional:
Yes
- Values:
Absolute path on the local filesystem.
Key as PEM text format (Since 3.40.0).
Empty
- From version:
1.6.0
- Description:
This can be defined as an absolute path on the local filesystem to the X.509 private key file used by this component.
File content should be encoded in the Privacy-Enhanced Mail (PEM) format.
Note
The path should not be longer than 256 characters.
When the value is defined as PEM text, the configuration will look as in the following example:
ssl_key = -----BEGIN RSA PRIVATE KEY----- MIICXgIBAAKBgQDOoZUYd8KMYbre5zZIwR+V6dO2+cCYVS46BHbRbqt7gczkoIWh ... MORE KEY DATA ... Wh+QF3UArO8r8RYv3HRcnBjrGh+yEK93wIifVNGgy63FIQ== -----END RSA PRIVATE KEY-----
If ssl_certificate is not defined, any value defined for this ssl_key configuration is ignored and the global ssl_key value is used.
If the value defined in ssl_certificate option already contains the private key, this option can be omitted by leaving it empty.
6.10.30. ssl_key_password¶
- Default value:
Empty
- Optional:
Yes
- Values:
Password as plain text.
Empty
- From version:
1.7.19
- Description:
This is used to define the password of the private key, when the private X.509 key is stored as an encrypted file.
Leave it empty to not use a password for the private key file.
6.10.31. ssl_certificate_revocation_list¶
- Default value:
Empty
- Optional:
Yes
- Values:
Comma separated list of CRL paths or HTTP URLs.
crl-distribution-points
${MICROSOFT_IT_CRL}
Empty
- From version:
1.6.0
- Description:
It defines the locations from where one or more CRLs will be loaded.
Multiple CRLs are defined as a comma separated list.
It supports local files with absolute paths, in either of the following formats:
file:///unix/absolute/test-ca.crl
file://c:\\windows\\absolute\\test-ca.crl
Retrieving the CRL over HTTP is also supported. The HTTP request is done using non-persistent HTTP/1.1 connections. The URL will look as follows:
http://example.com/some.crl
CRL distribution points (CDP) are supported by using the crl-distribution-points configuration value.
When CRL distribution points are configured, the local certificate defined at ssl_certificate needs to have the CDP extension. The CDP advertised in the local certificate is loaded at startup in order to validate the configuration.
The distribution points configuration is mutually exclusive with local file or HTTP url configurations. When the certificate revocation list is configured to use CDP, all other configured CRL location are ignored.
Warning
HTTP redirection is not yet supported for CRL URLs. You have to configure the exact URL for the CRL.
Leave it empty to disable certificate revocation checks.
The certificate revocation list can only be used when the component is configured with CA certificates stored in a single file in PEM format.
When multiple or chained CA certificates are configured the CRL is only checked for the peer's certificate and not for the CA certificate or for an intermediate CA.
Warning
CDP publishing Delta CRL are not supported.
Note
If the certificate defines multiple HTTP-based distribution points in the CDP extension, only the first HTTP URI is used. All non HTTP or the other HTTP URIs are ignored.
The CRL file should be stored in PEM or DER format.
Note
This option is ignored if ssl_certificate_authority is not enabled.
6.10.32. ssl_certificate_revocation_list_refresh¶
- Default value:
0
- Optional:
Yes
- Values:
Number of seconds
0
- From version:
2.8.0
- Description:
This defined the number of seconds after which a configured CRL is reloaded by this component.
When set to 0, the CRL file is initially loaded at startup and then loaded again after the Next Update field advertised in the CRL.
If the Next Publish extension is present in the CRL and this option is set to 0, the CRL will be loaded again at the date and time specified in the Next Publish extension.
If the CRL does not advertise the Next Update field you will have to configure a number of seconds after which the CRL should be reloaded, otherwise you will get a configuration error.
For example, a value of 86400 means that the CRL will be re-read after one day.
For more details about the CRL reloading see the documentation for CRL reloading rules
Note
This option is ignored if
ssl_certificate_authority
is not enabled.
6.10.33. ssl_cipher_list¶
- Default value:
secure
- Optional:
Yes
- Values:
List of SSL/TLS ciphers in OpenSSL format.
secure
- From version:
1.7.4
- Description:
This defined the list of ciphers accepted by this component while communicating over the network.
The special keyword secure contains all the algorithms that we currently consider secure.
Connections are closed if the remote peer has no common cipher in its list of configured ciphers.
When left empty, it will default to the secure configuration.
More information about the accepted values can be found at the cryptography guide
The format for this value is the same as the one used for defining the OpenSSL cipher list. More information can be found on the OpenSSL site.
6.10.34. ssl_allowed_methods¶
- Default value:
secure
- Optional:
Yes
- Values:
secure
all
tlsv1.0
tlsv1.1
tlsv1.2
tlsv1.3
- From version:
1.7.4
- Description:
This defines the comma-separated list of SSL and TLS methods that are accepted by this component during the secure communication handshake.
Set this to secure to allow only the TLS methods that are currently considered secure. For now, this is TLS 1.2 and TLS 1.3 but this might be changed in the future. Any other configured value is ignored.
Set this to all to allow any supported SSL or TLS method. Any other configured value is ignored.
Currently, the following methods are officially supported:
tlsv1 or tlsv1.0, which is TLS 1.0.
tlsv1.1, which is TLS 1.1.
tlsv1.2, which is TLS 1.2.
tlsv1.3, which is TLS 1.3.
Note
SSLv3 is still supported, but highly discouraged, due to the SSLv3 POODLE vulnerability. In the case that you need to interact with an old SSL implementation that only supports SSLv3, it is highly recommended to force the usage of the non-CBC cipher RC4-SHA by configuring as:
[services/681f5f5d-0502-4ebb-90d5-5d5c549fac6b] ssl_cipher_list = RC4-SHA
Support for SSLv3 will be removed in future versions.
SSLv2 is no longer supported since it is not secure.
In version 2.8.0, the following new methods were added: tlsv1.0 (alias for tlsv1), tlsv1.1 and tlsv1.2
Support for tlsv1.3 was added in version 3.47.0.
Prior to version 4.17.0, this was configured as a space separated value.