Skip to main content

This article applies to version 6.

Available in:

StandardPremiumEnterprise
Small Business
Code42 Support

Web restores from the Code42 cloud fail without SSL

This article applies to version 6.

Available in:

StandardPremiumEnterprise
Small Business

Overview

Web restores initiated from an on-premises authority server for an archive stored in the Code42 cloud require SSL for all connections. Web restores fail if SSL is not configured. Specifically, instead showing a list of the backed up files, the operating system progress indicator stops responding and may appear stuck.

Server security requires a CA-signed certificate and the TLS protocol
Reliable security of any production web server requires an SSL certificate signed by a trusted certificate authority (CA) and enforced use of the TLS protocol (i.e. HTTPS, not HTTP).

Your on-premises Code42 authority server is no exception. A Code42 server that is configured to use a signed certificate, strict TLS validation, and strict security headers protects server communications with browsers, your Code42 apps, and other servers.

  • By default, your authority server uses a self-signed certificate and TLS. That provides for encrypting client-server traffic.
  • Adding a CA-signed certificate provides further security by confirming your server's identity to clients. It prevents attackers from acquiring client data through counterfeit servers and encryption keys.
  • Never reconfigure a production server to use HTTP, rather than TLS and HTTPS.
  • Configuring Code42 servers and apps to use strict TLS validation further ensures the security of client-server connections.
  • Configuring Code42 servers to use an HTTPS Strict Transport Security (HSTS) response header further prevents unencrypted browser access to administration consoles.

Affects

Code42 environments with an on-premises authority server also using Code42 cloud storage that do not have a browser connection established on TCP 4285 (HTTPS).

Recommended solution

We strongly recommend configuring your administration console to use HTTPS on port 4285 (not HTTP on port 4280):

  • Correct example: https://localhost:4285/console/login.html
  • Incorrect example: http://localhost:4280/console/login.html

Using HTTPS allows you to perform web restores as well as strengthen the overall security of your Code42 environment. We also recommend you import a CA-signed SSL certificate to give your users additional verification that the administration console is secure and is controlled by your organization. 

If your web restore is failing even though you have HTTPS configured correctly, see our web restore troubleshooting tips.

Technical details

HTTPS is required to connect to storage hosted by Code42 because it ensures the information sent between your administration console and Code42 is encrypted in transit. When a POST HTTP request is made to the authority server on HTTP, it must attempt a redirect to the more secure HTTPS. Since POST doesn't support redirection, the session cannot redirect and the web restore stalls.

  • Was this article helpful?