<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Recent changes to TTT-Configuration</title><link>https://sourceforge.net/p/iheos/wiki/TTT-Configuration/</link><description>Recent changes to TTT-Configuration</description><atom:link href="https://sourceforge.net/p/iheos/wiki/TTT-Configuration/feed" rel="self"/><language>en</language><lastBuildDate>Wed, 31 Jul 2013 17:42:36 -0000</lastBuildDate><atom:link href="https://sourceforge.net/p/iheos/wiki/TTT-Configuration/feed" rel="self" type="application/rss+xml"/><item><title>TTT-Configuration modified by Alan Viars</title><link>https://sourceforge.net/p/iheos/wiki/TTT-Configuration/</link><description>&lt;div class="markdown_content"&gt;&lt;pre&gt;--- v13
+++ v14
@@ -1,10 +1,11 @@
 Transport Testing Tool Configuration
 ====================================

-This document describes how to get the Trandport Testing Tool (TTT) configured
+Last updated: July 31, 2013 by Alan Viars
+
+This document describes how to get the Transport Testing Tool (TTT) configured
 on your own hardware or instance.

-Last updated: March 8, 2013 by Alan Viars

 Overview:
 ---------
@@ -80,8 +81,8 @@

 Create the following directory and subdirectories from your home directory:

-    wget http://sourceforge.net/projects/iheos/files/TransportTestingTool/version-161/tttdir-2013-03-01.tar.gz/download -O tttdir-2013-03-01.tar.gz
-    tar zxvf tttdir-2013-03-01.tar.gz
+    wget http://sourceforge.net/projects/iheos/files/TransportTestingTool/version-166/tttdir-2013-07-31.tar.gz/download -O tttdir-2013-07-31.tar.gz
+    tar zxvf tttdir-2013-07-31.tar.gz

 4.  Setup a Tomcat Connector for port 8443
@@ -142,7 +143,7 @@
 Download the ttt war and the listner scripts:

-    wget http://sourceforge.net/projects/iheos/files/TransportTestingTool/version-161/ttt.war/download -O ttt.war
+    wget http://sourceforge.net/projects/iheos/files/TransportTestingTool/version-166/ttt.166.war/download -O ttt.war

 Install the ttt war file:
@@ -172,31 +173,33 @@
 7. Create/Obtain certificates for your Domain 
 ---------------------------------------------

+See
+https://github.com/meaningfuluse/mu2/blob/master/transport/creating-certificates-for-ttt.md
+for how to complete this step.
+
 You will need to create:

 *Good Certificates-*

-   1. a Trust anchor, we will name "root". You will need the file "roo.der".
-   2. A domain-bound certificates, buit from the aformentioned "root.", for
-   "ttt.your-domain.com". You will need the files "ttt.your-domain.com.p12" and
-   "ttt.your-domain.com.der".
+   1. a Trust anchor, we will name "example.com". You will need the file "example.com.der".
+   2. A domain-bound certificate, buit from the aformentioned "example.com", for
+   "ttt.example.com". You will need the files generated from this step called
+   "ttt.example.com.p12" and "ttt.example.com.der".

 *Negative Certificates-*

    1. An expired certificate
-   2. An invalid certificate whereby the email subject name is bogus.
-   3. An invalid trurst relationship. We will call this
-   "invalid-trust-relationship"  in these instructions. This anchor is valid,
+   2. An invalid certificate whereby the email subject name do not match. (Not possible with certGen)
+   3. An invalid trust relationship. We will call this
+   "invalid-trust-relationship" in these instructions. This anchor is valid,
    but if you use it in conjunction with "ttt.your-domain.com" from #2, in Good
-   Certificates then it would be invalis because the domain-bound certifcate was
+   Certificates then it would be invalid because the domain-bound certifcate was
    not created with this trust anchor.

 To generate these files, we will use the tool "certGen.sh" that is bundled with
-the Java Direct RI.  There is a directThe following link describes how you can
+the Java Direct RI.  The following link describes how you can
 go about doing this using the certGen tool that comes bundled with Java Direct
-Reference Implementation (RI). See
-https://github.com/meaningfuluse/mu2/blob/master/transport/creating-certificates-for-ttt.md
-for how to complete this step.
+Reference Implementation (RI). 

 8. Install Certificates in the TTT
 ----------------------------------
@@ -316,3 +319,31 @@

 Alan Viars
 @aviars
+
+
+Appendix I - How to update the TTT release on a server
+------------------------------------------------------------------------
+The steps above that are involved in updating a release of the TTT on a server are:
+
+* Step 6 -  Download and Install the ttt war
+* Step 8 -  Install Certificates in the TTT
+* Step 11 - Restart and Test the Server
+
+
+Here is a quick summary of these steps in case you only want to UPDATE the tool.
+
+1. Replace the old TTT .war file with the new one.
+2. Restart the server in order to install the file that you just copied. This will regenerate the WEB-INF directory for the web application.
+3. Re-installing certificates in the TTT webapp directory can be done easily by using the script install-certs-from-default. The script is configured to be used only on transparenthealth.com.
+
+    sudo bash /home/ubuntu/install-certs-from-default.sh
+    
+4. Copy file toolkit.properties to the WEB-INF directory. The default toolkit.properties file is stored under /home/ubuntu. 
+
+    sudo cp /home/ubuntu/toolkit.properties /var/lib/tomcat7/webapps/ttt/WEB-INF/toolkit.properties
+    
+5. Restart and test the server as described in step 11 above:
+
+    sudo service tomcat7 restart
+    nmap 127.0.0.1
+
&lt;/pre&gt;
&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Alan Viars</dc:creator><pubDate>Wed, 31 Jul 2013 17:42:36 -0000</pubDate><guid>https://sourceforge.net687b5fc0a1df6c620eda0e3a1c2e671d92c4ef8e</guid></item><item><title>WikiPage TTT-Configuration modified by Alan Viars</title><link>https://sourceforge.net/p/iheos/wiki/TTT-Configuration/</link><description>&lt;div class="markdown_content"&gt;&lt;pre&gt;--- v12
+++ v13
@@ -316,30 +316,3 @@

 Alan Viars
 @aviars
-
-
-Appendix I - How to Update the TTT release on a Derver -  by Dians Azais
-------------------------------------------------------------------------
-The steps above that are involved in updating a release of the TTT on a server are:
-
-* Step 6 -  Download and Install the ttt war
-* Step 8 -  Install Certificates in the TTT
-* Step 11 - Restart and Test the Server
-
-
-Here is a quick summary of these steps in case you only want to UPDATE the tool.
-
-1. Replace the old TTT .war file with the new one.
-2. Restart the server in order to install the file that you just copied. This will regenerate the WEB-INF directory for the web application.
-3. Re-installing certificates in the TTT webapp directory can be done easily by using the script install-certs-from-default. The script is configured to be used only on transparenthealth.com.
-
-    sudo bash /home/ubuntu/install-certs-from-default.sh
-    
-4. Copy file toolkit.properties to the WEB-INF directory. The default toolkit.properties file is stored under /home/ubuntu. 
-
-    sudo cp /home/ubuntu/toolkit.properties /var/lib/tomcat7/webapps/ttt/WEB-INF/toolkit.properties
-    
-5. Restart and test the server as described in step 11 above:
-
-    sudo service tomcat7 restart
-    nmap 127.0.0.1
&lt;/pre&gt;
&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Alan Viars</dc:creator><pubDate>Fri, 08 Mar 2013 22:03:19 -0000</pubDate><guid>https://sourceforge.net5c4cca845009d9091d2c0c788f7a42723176e46a</guid></item><item><title>WikiPage TTT-Configuration modified by Alan Viars</title><link>https://sourceforge.net/p/iheos/wiki/TTT-Configuration/</link><description>&lt;div class="markdown_content"&gt;&lt;pre&gt;--- v11
+++ v12
@@ -4,7 +4,7 @@
 This document describes how to get the Trandport Testing Tool (TTT) configured
 on your own hardware or instance.

-Last updated: February 22, 2013 by Alan Viars
+Last updated: March 8, 2013 by Alan Viars

 Overview:
 ---------
@@ -19,7 +19,7 @@
 5. Adjust the settings in the "tk_props.txt" file.
 6. Download and Install the ttt war.
 7. Create/Obtain certificates for your domain
-8. Install certificatse in the TTT
+8. Install certificates in the TTT
 9. Start the SMTP daemon.
 10. Create the output folder for Direct validation messages.
 11. Test the server.
@@ -80,8 +80,8 @@

 Create the following directory and subdirectories from your home directory:

-    wget http://sourceforge.net/projects/iheos/files/TransportTestingTool/version-160/tttdir-2013-02-15.tar.gz/download -O tttdir-2013-02-12.tar.gz
-    tar zxvf tttdir-2013-02-15.tar.gz
+    wget http://sourceforge.net/projects/iheos/files/TransportTestingTool/version-161/tttdir-2013-03-01.tar.gz/download -O tttdir-2013-03-01.tar.gz
+    tar zxvf tttdir-2013-03-01.tar.gz

 4.  Setup a Tomcat Connector for port 8443
@@ -101,16 +101,14 @@

 Replace it with the following text:

-    
-
-Press Ctrl-x, and then "Y", to exit and sabve the changes.
+    
+
+Press Ctrl-x, and then "Y", to exit and save the changes.

 Restart Tomcat7.
@@ -144,7 +142,7 @@
 Download the ttt war and the listner scripts:

-    wget http://sourceforge.net/projects/iheos/files/TransportTestingTool/version-160/ttt.war/download -O ttt.war
+    wget http://sourceforge.net/projects/iheos/files/TransportTestingTool/version-161/ttt.war/download -O ttt.war

 Install the ttt war file:
@@ -175,56 +173,80 @@
 ---------------------------------------------

 You will need to create:
-   1. a Trust anchor CA, we will name "root". You will need the file "roo.der".
+
+*Good Certificates-*
+
+   1. a Trust anchor, we will name "root". You will need the file "roo.der".
    2. A domain-bound certificates, buit from the aformentioned "root.", for
    "ttt.your-domain.com". You will need the files "ttt.your-domain.com.p12" and
    "ttt.your-domain.com.der".
-   3.  Another trust anchor to serve as an untrusted anchor. We will call this
-   "invalid-trust-relationship", and you will need the file
-   "invalid-trust-relationship.der". This anchor is valid, but if you use it in
-   conjunction with "ttt.your-domain.com" from #2, then it would be invalis because
-   the domain-bound certifcate was not created with this trust anchor.
+
+*Negative Certificates-*
+
+   1. An expired certificate
+   2. An invalid certificate whereby the email subject name is bogus.
+   3. An invalid trurst relationship. We will call this
+   "invalid-trust-relationship"  in these instructions. This anchor is valid,
+   but if you use it in conjunction with "ttt.your-domain.com" from #2, in Good
+   Certificates then it would be invalis because the domain-bound certifcate was
+   not created with this trust anchor.

 To generate these files, we will use the tool "certGen.sh" that is bundled with
-the Java Direct RI.  There is a direct
-
-The following link describes how you can go about doing this using the certGen
-tool that comes bundled with Java Direct Reference Implementation (RI)
-
-See https://github.com/meaningfuluse/mu2/blob/master/transport/creating-certificates-for-ttt.md
-
+the Java Direct RI.  There is a directThe following link describes how you can
+go about doing this using the certGen tool that comes bundled with Java Direct
+Reference Implementation (RI). See
+https://github.com/meaningfuluse/mu2/blob/master/transport/creating-certificates-for-ttt.md
 for how to complete this step.

 8. Install Certificates in the TTT
 ----------------------------------

 After these files are created and transfered to the server, you will want to
-place them in the correct location. Assuming that your trust anchor is "root.der",
+place them in the correct location. Assuming that your trust anchor is "example.com.der",
 your public certificate is "ttt.your-domain.com.der", and your domain level signing
 certificate is "ttt.your-domain.com.p12", the copy these files to their required
 location. assuming these files are your current directory, then execute the
 following commands.

-    sudo cp root.der /var/lib/tomcat7/webapps/ttt/pubcert/
+    sudo cp example.com.der /var/lib/tomcat7/webapps/ttt/pubcert/
     sudo cp ttt.your-domain.com.der /var/lib/tomcat7/webapps/ttt/pubcert/
-    sudo cp invalid-trust-relationship.der /var/lib/tomcat7/webapps/ttt/pubcert/
     cp ttt.your-domain.com.der  ~/tttdir/external_cache/direct/encrypt_certs
     sudo cp ttt.your-domain.com.p12 /var/lib/tomcat7/webapps/ttt/WEB-INF/privcert/
     cp ttt.your-domain.com.p12 ~/tttdir/external_cache/direct/signing_cert/
     touch ~/tttdir/external_cache/direct/signing_cert/password.txt
     cd /var/lib/tomcat7/webapps/ttt/WEB-INF/privcert/
     sudo rm mykeystore.p12
-    sudo chown tomcat7 *; sudo chgrp tomcat7 *
+

 Set the file names in tk_props to the filenames used above. We are assuming that
 your public cert is named "ttt.your-domain.com.der" and your trust anchor is
-"root.der".  Change these to match the name of your files.
+"example.com.der".  Change these to match the name of your files.

     cd ~/tttdir/external_cache
     sed -i -e 's/my-public-cert.der/ttt.your-domain.com.der/g' tk_props.txt
-    sed -i -e 's/my-trust-anchor.der/root.der/g' tk_props.txt
+    sed -i -e 's/my-trust-anchor.der/example.com.der/g' tk_props.txt
     sed -i -e 's/my-invtrustrel.der/invalid-trust-relationship.der/g' tk_props.txt
+
+Install the certificates for negative testing in subfolders within the
+~/tttdir/external_cached/direct and for download in
+/var/lib/tomcat7/webapps/ttt/pubcert/.  These include an invalid trust relationship,
+an expired certificate, and an invalid certificate. 
+
+
+    cp expired-ttt.your-domain.com.p12 ~/tttdir/external_cache/direct/exp_signing_cert/ttt.your-domain.com.p12
+    cp invalid-ttt.your-domain.com.p12 ~/tttdir/external_cache/direct/inv_signing_cert/ttt.your-domain.com.p12
+    cp cert-from-other-trust-anchor.p12 ~/tttdir/external_cache/direct/diff_trust_anchor/ttt.your-domain.com.p12
+    cp other.der ~/tttdir/external_cache/direct/diff_trust_anchor/
+    sudo cp invalid-trust-relationship.der /var/lib/tomcat7/webapps/ttt/pubcert/invalid-trust-relationship.der
+
+
+Set the file names in tk_props to the filenames used above. Change these to
+match the name of your files.
+
+    cd ~/tttdir/external_cache
+    sed -i -e 's/my-invtrustrel.der/invalid-trust-relationship.der/g' tk_props.txt
+

 Change the owndership and permissions on the external_cache and logs directory

@@ -295,3 +317,29 @@
 Alan Viars
 @aviars

+
+Appendix I - How to Update the TTT release on a Derver -  by Dians Azais
+------------------------------------------------------------------------
+The steps above that are involved in updating a release of the TTT on a server are:
+
+* Step 6 -  Download and Install the ttt war
+* Step 8 -  Install Certificates in the TTT
+* Step 11 - Restart and Test the Server
+
+
+Here is a quick summary of these steps in case you only want to UPDATE the tool.
+
+1. Replace the old TTT .war file with the new one.
+2. Restart the server in order to install the file that you just copied. This will regenerate the WEB-INF directory for the web application.
+3. Re-installing certificates in the TTT webapp directory can be done easily by using the script install-certs-from-default. The script is configured to be used only on transparenthealth.com.
+
+    sudo bash /home/ubuntu/install-certs-from-default.sh
+    
+4. Copy file toolkit.properties to the WEB-INF directory. The default toolkit.properties file is stored under /home/ubuntu. 
+
+    sudo cp /home/ubuntu/toolkit.properties /var/lib/tomcat7/webapps/ttt/WEB-INF/toolkit.properties
+    
+5. Restart and test the server as described in step 11 above:
+
+    sudo service tomcat7 restart
+    nmap 127.0.0.1
&lt;/pre&gt;
&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Alan Viars</dc:creator><pubDate>Fri, 08 Mar 2013 22:02:53 -0000</pubDate><guid>https://sourceforge.netfdb4d47cf8ae92b06033c077821dac2579198d0b</guid></item><item><title>WikiPage TTT-Configuration modified by Alan Viars</title><link>https://sourceforge.net/p/iheos/wiki/TTT-Configuration/</link><description>&lt;div class="markdown_content"&gt;&lt;pre&gt;--- v10
+++ v11
@@ -4,7 +4,7 @@
 This document describes how to get the Trandport Testing Tool (TTT) configured
 on your own hardware or instance.

-Last updated: February 15, 2013 by Alan Viars
+Last updated: February 22, 2013 by Alan Viars

 Overview:
 ---------
@@ -79,6 +79,7 @@
     ssh -i .ec2/ttt.pem ubuntu@ttt.your-domain.com

 Create the following directory and subdirectories from your home directory:
+
     wget http://sourceforge.net/projects/iheos/files/TransportTestingTool/version-160/tttdir-2013-02-15.tar.gz/download -O tttdir-2013-02-12.tar.gz
     tar zxvf tttdir-2013-02-15.tar.gz

@@ -166,7 +167,9 @@

     sudo sed -i -e 's/easy/your-password/g' toolkit.properties

-
+Now restart Tomcat
+
+    sudo service tomcat7 restart

 7. Create/Obtain certificates for your Domain 
 ---------------------------------------------
@@ -207,7 +210,7 @@
     sudo cp invalid-trust-relationship.der /var/lib/tomcat7/webapps/ttt/pubcert/
     cp ttt.your-domain.com.der  ~/tttdir/external_cache/direct/encrypt_certs
     sudo cp ttt.your-domain.com.p12 /var/lib/tomcat7/webapps/ttt/WEB-INF/privcert/
-    sudo cp ttt.your-domain.com.p12 ~/tttdir/external_cache/direct/signing_cert/
+    cp ttt.your-domain.com.p12 ~/tttdir/external_cache/direct/signing_cert/
     touch ~/tttdir/external_cache/direct/signing_cert/password.txt
     cd /var/lib/tomcat7/webapps/ttt/WEB-INF/privcert/
     sudo rm mykeystore.p12
@@ -291,3 +294,4 @@

 Alan Viars
 @aviars
+
&lt;/pre&gt;
&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Alan Viars</dc:creator><pubDate>Fri, 22 Feb 2013 16:13:37 -0000</pubDate><guid>https://sourceforge.netebbbd527fa293fd586782f57ce09b0bc87bcd515</guid></item><item><title>WikiPage TTT-Configuration modified by Alan Viars</title><link>https://sourceforge.net/p/iheos/wiki/TTT-Configuration/</link><description>&lt;div class="markdown_content"&gt;&lt;pre&gt;&lt;/pre&gt;
&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Alan Viars</dc:creator><pubDate>Fri, 15 Feb 2013 22:10:39 -0000</pubDate><guid>https://sourceforge.net867055f9d670bfb4a04f81ac329087cadb4dad9e</guid></item><item><title>WikiPage TTT-Configuration modified by Alan Viars</title><link>https://sourceforge.net/p/iheos/wiki/TTT-Configuration/</link><description>&lt;div class="markdown_content"&gt;&lt;pre&gt;&lt;/pre&gt;
&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Alan Viars</dc:creator><pubDate>Fri, 15 Feb 2013 22:10:35 -0000</pubDate><guid>https://sourceforge.net58c1877387821d11b9c3ce84d9882dc9f906f802</guid></item><item><title>WikiPage TTT-Configuration modified by Alan Viars</title><link>https://sourceforge.net/p/iheos/wiki/TTT-Configuration/</link><description>&lt;div class="markdown_content"&gt;&lt;pre&gt;--- v7
+++ v8
@@ -44,7 +44,7 @@
 After the server is setup, log into the server and install Tomcat7. This will
 also install OpenJDK. We assume the user you are going to use to login is
 "ubuntu" and this user has sudo privileges. This is consistent with Canonical's
-Ubuntu AWS EC2 instances. Throughout this documement replace "your-domain.com"
+Ubuntu AWS EC2 instances. Throughout this document replace "your-domain.com"
 with your actual domain name.

     ssh -i .ec2/ttt.pem ubuntu@ttt.your-domain.com
&lt;/pre&gt;
&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Alan Viars</dc:creator><pubDate>Fri, 15 Feb 2013 22:10:25 -0000</pubDate><guid>https://sourceforge.netd8abf38664454d489b7753eb875466c5908e1b8b</guid></item><item><title>WikiPage TTT-Configuration modified by Alan Viars</title><link>https://sourceforge.net/p/iheos/wiki/TTT-Configuration/</link><description>&lt;div class="markdown_content"&gt;&lt;pre&gt;--- v6
+++ v7
@@ -1,54 +1,293 @@
-TTT Configuration Guide
-=======================
-
-** Under Construction ** - this page will eventually contain all the documentation on how to configure TTT.  At the present much is missing or documented on other pages. The content currently on other pages will be moved here and referenced.
-
-This page documents the specifics of configuring toolkit for MU2 where it is known as Transport Test Tool or TTT. Details on how to set up DNS, certificates, and configurations for SMTP are discussed on [TTT-Installation].
-
-Encryption Certificates
------------------------
-
-Encryption certificates come in two forms: 
-* public key which is used for encrypting messaged being sent to TTT.  This cert is freely downloadable
-* private key used to decrypt received messages. This is actually the public/private pair.
-
-The public key is stored in the directory pubcert within the WAR file.  The filename used is taken from the tk_props.txt properties file.  The property direct.pubcert.pubcert holds the filename of the public certificate. So if this property is found in tk_props.txt:
-
-    direct.pubcert.pubcert:   hit-testing.nist.gov.der
-
-then the path (within the WAR) to the public cert for encryption is:
-
-    pubcert/hit-testing.nist.gov.der
-
-The private key for this cert (actually both the pub and private parts) is stored in the external cache in the directory
-
-    direct/encrypt_certs
-
-for example for hit-testing:
-
-    ttt@hit-testing:/var/lib/tomcat_ttt/ttt/external_cache$ ls -l direct/encrypt_certs/
-    total 4
-    -rwxr-xr-x 1 ttt ttt_users 1022 2012-12-05 14:12 hit-testing.nist.gov.der
-
-Trust Anchor
-------------
-
-The trust anchor is stored along with the public key in the same directory.  The property direct.pubcert.trustanchor holds the filename.  So with this setting in tk_props.txt:
-
-    direct.pubcert.trustanchor: hit-testing.nist.gov-RootCA.der
-
-then the path (within the WAR) to the trust anchor is:
-
-    pubcert/hit-testing.nist.gov-RootCA.der
-
-Signing Certificates
---------------------
-
-The signing cert used to send Direct messages is stored in the external cache:
-
-    ttt@hit-testing:/var/lib/tomcat_ttt/ttt/external_cache$ ls -l direct/signing_cert/
-    total 4
-    -rwxr-xr-x 1 ttt ttt_users 2156 2012-12-05 14:12 hit-testing.nist.gov.p12
-    -rw-r--r-- 1 ttt ttt_users    0 2012-12-05 14:12 password.txt
-
-
+Transport Testing Tool Configuration
+====================================
+
+This document describes how to get the Trandport Testing Tool (TTT) configured
+on your own hardware or instance.
+
+Last updated: February 15, 2013 by Alan Viars
+
+Overview:
+---------
+
+You MUST use Ubuntu 12.04 LTS 64-bit Server Edition.  No other operating systems
+are supported at this time. The high-level tasks are as follows:
+
+1. Setup a new server with Tomcat7 and a public facing IP address.
+2. Create a host name and configure DNS for your host.
+3. Download and decompress the "tttdir" package.
+4. Setup a Tomcat Connector for port 8443
+5. Adjust the settings in the "tk_props.txt" file.
+6. Download and Install the ttt war.
+7. Create/Obtain certificates for your domain
+8. Install certificatse in the TTT
+9. Start the SMTP daemon.
+10. Create the output folder for Direct validation messages.
+11. Test the server.
+
+
+1. Setup a new server with a public facing IP address:
+------------------------------------------------------
+
+Setup a new server with a public facing IP address.  We are using Ubuntu
+12.04 64-bit Server Edition.  Specifically, we are using the AWS AMI:
+ami-3d4ff254.
+
+Open the following inbound ports on your firewall.
+
+    TCP Port (Service) Source
+    22 (SSH)           0.0.0.0/0   
+    25 (SMTP)           0.0.0.0/0
+    8080 (HTTP*)        0.0.0.0/0
+    8443 (HTTPS*)       0.0.0.0/0
+
+
+After the server is setup, log into the server and install Tomcat7. This will
+also install OpenJDK. We assume the user you are going to use to login is
+"ubuntu" and this user has sudo privileges. This is consistent with Canonical's
+Ubuntu AWS EC2 instances. Throughout this documement replace "your-domain.com"
+with your actual domain name.
+
+    ssh -i .ec2/ttt.pem ubuntu@ttt.your-domain.com
+    sudo apt-get update
+    sudo apt-get -y install tomcat7 tomcat7-admin nmap
+
+
+2. Create a host name and configure DNS for your host:
+------------------------------------------------------
+
+Setup a static ip and a domain name. Create a static IP and associate  it with
+a domain name. In this example, we will use the IP  "123.123.123.123" and the
+hostnme "ttt.your-domain.com".  
+
+Setup the A, CNAME as show below.
+ 
+    Type:           Source:                       Destination:
+    -----------     ----------------              ---------------
+    A Record       ttt.your-domain.com           123.123.123.123
+    A Record       mail.ttt.your-domain.com      123.123.123.123   
+    MX Record       mail.ttt.your-domain.com      123.123.123.123
+    MX Record       smtp.ttt.your-domain.com      123.123.123.123  
+
+
+3. Download and Decompress the "tttdir" package.
+------------------------------------------------
+
+Note the following instructions may vary a bit if you are not using AWS EC2.
+
+Log into the server:
+
+    ssh -i .ec2/ttt.pem ubuntu@ttt.your-domain.com
+
+Create the following directory and subdirectories from your home directory:
+    wget http://sourceforge.net/projects/iheos/files/TransportTestingTool/version-160/tttdir-2013-02-15.tar.gz/download -O tttdir-2013-02-12.tar.gz
+    tar zxvf tttdir-2013-02-15.tar.gz
+
+
+4.  Setup a Tomcat Connector for port 8443
+------------------------------------------
+
+Open Tomcat 7's server.xml configuration file for editing.
+
+    sudo nano /etc/tomcat7/server.xml
+    
+Locate the commented out section that looks like this:
+
+    &lt;!--
+    &lt;Connector port="8443" protocol="HTTP/1.1" SSLEnabled="true"
+               maxThreads="150" scheme="https" secure="true"
+               clientAuth="false" sslProtocol="TLS" /&gt;
+    --&gt;
+
+Replace it with the following text:
+
+    
+
+Press Ctrl-x, and then "Y", to exit and sabve the changes.
+
+
+Restart Tomcat7.
+    
+    sudo service tomcat7 restart
+
+
+
+5. Adjust the settings in the "tk_props.txt" file.
+---------------------------------------------------------------
+    
+We will now adjust the values in the /home/ubuntu/tttdir/external_cache/tk_props.txt
+file for your local environment. The tool is setup to use Gmail for sending mail.
+These instructions assume this configuration. Place your hostname where you see
+"ttt.your-domain.com", your gmail password where you see "your-password", and your
+Gmail username where you see "your-email".
+    
+    cd tttdir/external_cache
+    sed -i -e 's/ttt.example.com/ttt.your-domain.com/g' tk_props.txt
+    sed -i -e 's/change-to-your-password/your-gmail-password/g' tk_props.txt
+    sed -i -e 's/change-to-your-direct-testing-email@gmail.com/your-email@gmail.com/g' tk_props.txt
+
+
+6. Download and Install the ttt war 
+-----------------------------------
+
+Log into the server:
+
+    ssh -i .ec2/ttt.pem ubuntu@ttt.your-domain.com
+    
+Download the ttt war and the listner scripts:
+
+
+    wget http://sourceforge.net/projects/iheos/files/TransportTestingTool/version-160/ttt.war/download -O ttt.war
+        
+
+Install the ttt war file:
+
+    sudo cp ttt.war /var/lib/tomcat7/webapps/
+
+Note that the TTT will not work at this point without further configuration.
+Complete all the step to get things working.
+
+Adjust the default values in /var/lib/tomcat7/webapps/ttt/WEB-INF/toolkit.properties:
+    
+    cd  /var/lib/tomcat7/webapps/ttt/WEB-INF/
+
+Change the name of the host to suit your environment, assuming yourt host name
+is ttt.your-domain.com:
+
+    sudo sed -i -e 's/example.com/ttt.your-domain.com/g' toolkit.properties
+    
+Change the default password.  Change "your-password" to your desired password.:
+
+    sudo sed -i -e 's/easy/your-password/g' toolkit.properties
+
+
+
+7. Create/Obtain certificates for your Domain 
+---------------------------------------------
+
+You will need to create:
+   1. a Trust anchor CA, we will name "root". You will need the file "roo.der".
+   2. A domain-bound certificates, buit from the aformentioned "root.", for
+   "ttt.your-domain.com". You will need the files "ttt.your-domain.com.p12" and
+   "ttt.your-domain.com.der".
+   3.  Another trust anchor to serve as an untrusted anchor. We will call this
+   "invalid-trust-relationship", and you will need the file
+   "invalid-trust-relationship.der". This anchor is valid, but if you use it in
+   conjunction with "ttt.your-domain.com" from #2, then it would be invalis because
+   the domain-bound certifcate was not created with this trust anchor.
+   
+To generate these files, we will use the tool "certGen.sh" that is bundled with
+the Java Direct RI.  There is a direct
+
+The following link describes how you can go about doing this using the certGen
+tool that comes bundled with Java Direct Reference Implementation (RI)
+
+See https://github.com/meaningfuluse/mu2/blob/master/transport/creating-certificates-for-ttt.md
+
+for how to complete this step.
+
+8. Install Certificates in the TTT
+----------------------------------
+
+After these files are created and transfered to the server, you will want to
+place them in the correct location. Assuming that your trust anchor is "root.der",
+your public certificate is "ttt.your-domain.com.der", and your domain level signing
+certificate is "ttt.your-domain.com.p12", the copy these files to their required
+location. assuming these files are your current directory, then execute the
+following commands.
+
+    sudo cp root.der /var/lib/tomcat7/webapps/ttt/pubcert/
+    sudo cp ttt.your-domain.com.der /var/lib/tomcat7/webapps/ttt/pubcert/
+    sudo cp invalid-trust-relationship.der /var/lib/tomcat7/webapps/ttt/pubcert/
+    cp ttt.your-domain.com.der  ~/tttdir/external_cache/direct/encrypt_certs
+    sudo cp ttt.your-domain.com.p12 /var/lib/tomcat7/webapps/ttt/WEB-INF/privcert/
+    sudo cp ttt.your-domain.com.p12 ~/tttdir/external_cache/direct/signing_cert/
+    touch ~/tttdir/external_cache/direct/signing_cert/password.txt
+    cd /var/lib/tomcat7/webapps/ttt/WEB-INF/privcert/
+    sudo rm mykeystore.p12
+    sudo chown tomcat7 *; sudo chgrp tomcat7 *
+    
+    
+Set the file names in tk_props to the filenames used above. We are assuming that
+your public cert is named "ttt.your-domain.com.der" and your trust anchor is
+"root.der".  Change these to match the name of your files.
+    
+    cd ~/tttdir/external_cache
+    sed -i -e 's/my-public-cert.der/ttt.your-domain.com.der/g' tk_props.txt
+    sed -i -e 's/my-trust-anchor.der/root.der/g' tk_props.txt
+    sed -i -e 's/my-invtrustrel.der/invalid-trust-relationship.der/g' tk_props.txt
+
+Change the owndership and permissions on the external_cache and logs directory
+
+    cd ~/tttdir/
+    sudo chmod -R 777 external_cache/ logs/ bin/
+    sudo chown -R tomcat7 external_cache/ logs/ bin/
+    sudo chgrp -R tomcat7 external_cache/ logs/ bin/
+    
+
+You can test this step was completed successfully by going to running a script
+that checks that all of the files are properly situated
+
+    cd /var/lib/tomcat7/webapps/ttt/scripts
+    bash cert-check.sh
+
+9. Start the SMTP Daemon
+------------------------
+
+run the script that starts the SMTP listener
+
+    cd ~/tttdir/bin
+    sudo ./listener.sh start
+    
+This will start the SMTP lister on port 25.  You must use sudo to do this
+because of the low port number.
+    
+To stop the listener, use:
+
+    sudo ./listener.sh stop
+    
+10. Create the output folder for Direct Validation Messages
+----------------------------------------------------------
+
+You need to create the folder where direct validation messages, sent by email,
+will reside.
+
+    sudo mkdir /var/lib/tomcat7/webapps/ROOT/direct/
+    sudo chown -R tomcat7 /var/lib/tomcat7/webapps/ROOT/direct/
+    sudo chgrp -R tomcat7 /var/lib/tomcat7/webapps/ROOT/direct/
+
+
+11. Restart and Test the Server
+------------------------------
+
+Restart Tomcat.
+
+    sudo service tomcat7 restart
+
+
+See if the necessary services are up and running:
+
+    nmap 127.0.0.1
+    
+You should see evidence of a running service ports 25 and 8080. You can now go
+to "http://ttt.your-domain.com:8080/ttt" and all should be working.
+
+Test the server by attempting to send and receive Direct messages to and from the
+TTT.  Please note you will need to add/enable the trust anchor AND the
+domain-bound certificate into your Direct implementation.  This will be specific to
+what Direct server you are running.  For example, you may be using the
+"Java Direct RI", the "Windows .NET RI", or your own.  For information on
+setting this up using the Java Direct RI, please visit -
+https://github.com/meaningfuluse/mu2/blob/master/transport/direct-hello-world.md
+
+Also note that if you update the war file, you will need to adjust the values
+in var/lib/tomcat7/webapps/ttt/WEB-INF/toolkit.properties again.
+
+Alan Viars
+@aviars
&lt;/pre&gt;
&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Alan Viars</dc:creator><pubDate>Fri, 15 Feb 2013 21:33:01 -0000</pubDate><guid>https://sourceforge.nete1e6d7b2e6cf32d2c619febc5ec43b2562b38773</guid></item><item><title>WikiPage TTT-Configuration modified by Bill Majurski</title><link>https://sourceforge.net/p/iheos/wiki/TTT-Configuration/</link><description>&lt;div class="markdown_content"&gt;&lt;pre&gt;--- v5
+++ v6
@@ -44,6 +44,11 @@
 Signing Certificates
 --------------------

+The signing cert used to send Direct messages is stored in the external cache:
+
+    ttt@hit-testing:/var/lib/tomcat_ttt/ttt/external_cache$ ls -l direct/signing_cert/
+    total 4
+    -rwxr-xr-x 1 ttt ttt_users 2156 2012-12-05 14:12 hit-testing.nist.gov.p12
+    -rw-r--r-- 1 ttt ttt_users    0 2012-12-05 14:12 password.txt

-
&lt;/pre&gt;
&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Bill Majurski</dc:creator><pubDate>Mon, 14 Jan 2013 17:19:44 -0000</pubDate><guid>https://sourceforge.net73e70d7541efe4176b9651a20b70066e162e1f0a</guid></item><item><title>WikiPage TTT-Configuration modified by Bill Majurski</title><link>https://sourceforge.net/p/iheos/wiki/TTT-Configuration/</link><description>&lt;div class="markdown_content"&gt;&lt;pre&gt;--- v4
+++ v5
@@ -14,22 +14,32 @@

 The public key is stored in the directory pubcert within the WAR file.  The filename used is taken from the tk_props.txt properties file.  The property direct.pubcert.pubcert holds the filename of the public certificate. So if this property is found in tk_props.txt:

-direct.pubcert.pubcert:   hit-testing.nist.gov.der
+    direct.pubcert.pubcert:   hit-testing.nist.gov.der

 then the path (within the WAR) to the public cert for encryption is:

-pubcert/hit-testing.nist.gov.der
+    pubcert/hit-testing.nist.gov.der
+
+The private key for this cert (actually both the pub and private parts) is stored in the external cache in the directory
+
+    direct/encrypt_certs
+
+for example for hit-testing:
+
+    ttt@hit-testing:/var/lib/tomcat_ttt/ttt/external_cache$ ls -l direct/encrypt_certs/
+    total 4
+    -rwxr-xr-x 1 ttt ttt_users 1022 2012-12-05 14:12 hit-testing.nist.gov.der

 Trust Anchor
 ------------

 The trust anchor is stored along with the public key in the same directory.  The property direct.pubcert.trustanchor holds the filename.  So with this setting in tk_props.txt:

-direct.pubcert.trustanchor: hit-testing.nist.gov-RootCA.der
+    direct.pubcert.trustanchor: hit-testing.nist.gov-RootCA.der

 then the path (within the WAR) to the trust anchor is:

-pubcert/hit-testing.nist.gov-RootCA.der
+    pubcert/hit-testing.nist.gov-RootCA.der

 Signing Certificates
 --------------------
&lt;/pre&gt;
&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Bill Majurski</dc:creator><pubDate>Mon, 14 Jan 2013 17:17:59 -0000</pubDate><guid>https://sourceforge.net40a34df4053e1d6a276cd41e11e7698ae51006c1</guid></item></channel></rss>