{"id":7992,"date":"2024-09-14T00:00:13","date_gmt":"2024-09-14T00:00:13","guid":{"rendered":"https:\/\/www.use-snip.com\/kb\/?post_type=ht_kb&#038;p=7992"},"modified":"2024-09-14T17:49:38","modified_gmt":"2024-09-14T17:49:38","slug":"secure-caster-connections","status":"publish","type":"ht_kb","link":"https:\/\/www.use-snip.com\/kb\/knowledge-base\/secure-caster-connections\/","title":{"rendered":"Secure Caster Connections"},"content":{"rendered":"<p>This article covers how to setup and use <strong>Remote-Relay<\/strong> secure Caster connections in <span style=\"color: #0000ff;\"><strong>SNIP<\/strong><\/span>.\u00a0 Secure connections use <strong>https<\/strong> encryption over the TCP\/IP connection (rather than http) to protect the GNSS data from being compromised (intercepted or tampered with), and to allow the validation of the identity of the remote Caster machine.\u00a0\u00a0 This is a feature which was defined in <a href=\"https:\/\/www.use-snip.com\/kb\/knowledge-base\/ntrip-rev2-uses-in-snip\/\" target=\"_blank\" rel=\"noopener\">NTRIP Rev2<\/a> some time ago and which is now gaining greater deployment as more NTRIP Client software adopts its use.<\/p>\n<h2>Background<\/h2>\n<p>Secure NTRIP Caster connections using http<strong>s<\/strong> use TLS\/SSL\u00a0 (Transport Layer Security \/ Secure Sockets Layer) and a system of exchanged security certificates (or CERTs for short) to establish a secure connection. \u00a0 [Transport Layer Security (TLS), is the successor of the Secure Sockets Layer (SSL), which is no longer used but often seen in terminology.\u00a0 The terms &#8220;secure socket&#8221; or &#8220;secure connection&#8221; imply its use.]\u00a0\u00a0 The mechanism used is the same as what your browser is now doing as you read this web page over a secure link.\u00a0 The security layer can be viewed as residing between the NTRIP protocol and the TCP\/IP connection, just as the the security layer for html pages can be viewed as residing between the http protocol and the TCP\/IP connection.\u00a0 The CERTs used are the same as found on any server.\u00a0 You do not need an understanding of how the security system works to use it.\u00a0 But in the text below we explain a few key concepts; much more detail can be found on-line.<\/p>\n<h2>Setup for Remote-Relay Connections<\/h2>\n<p>Setting up a secure connection involves simply checking the <strong>Use TSL\/SSL Connection<\/strong> check box shown below.\u00a0\u00a0 [Use of the other controls in this dialog are covered in the <a href=\"https:\/\/www.use-snip.com\/kb\/knowledge-base\/adding-remote-relayed-data-streams\/\" target=\"_blank\" rel=\"noopener\">setup a remote relay connection<\/a> article.]\u00a0 When this is checked, two changes are also made in the dialog.\u00a0 The check box <strong>Use NTRIP Rev2<\/strong> is also automatically checked (because NTRIP Rev1 does not support secure connections).\u00a0 And the remote connection port is set to <strong>443<\/strong> &#8211; if that field was previously empty or was set to 2101.<\/p>\n<p style=\"text-align: center;\"><a href=\"https:\/\/www.use-snip.com\/kb\/wp-content\/uploads\/2021\/11\/SSLusage.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-8012 size-full\" src=\"https:\/\/www.use-snip.com\/kb\/wp-content\/uploads\/2021\/11\/SSLusage.png?_t=1636817999\" alt=\"\" width=\"645\" height=\"600\" srcset=\"https:\/\/www.use-snip.com\/kb\/wp-content\/uploads\/2021\/11\/SSLusage.png 645w, https:\/\/www.use-snip.com\/kb\/wp-content\/uploads\/2021\/11\/SSLusage-300x279.png 300w, https:\/\/www.use-snip.com\/kb\/wp-content\/uploads\/2021\/11\/SSLusage-50x47.png 50w, https:\/\/www.use-snip.com\/kb\/wp-content\/uploads\/2021\/11\/SSLusage-600x558.png 600w, https:\/\/www.use-snip.com\/kb\/wp-content\/uploads\/2021\/11\/SSLusage-320x298.png 320w\" sizes=\"auto, (max-width: 645px) 100vw, 645px\" \/><\/a><\/p>\n<p>Just like the default caster port of 2101 may vary, the secure caster port can vary between Casters. The remote Caster operator can select any port he wishes, but 443 is most common.\u00a0 Consult the documentation for the Caster you will connect to for specific details.<\/p>\n<p style=\"padding-left: 80px;\"><span style=\"color: #008000;\"><strong>On what port to use:<\/strong><\/span> At this time NTRIP does not have a formal recommendation regarding port to use for secure use. If your NTRIP Caster is the <em>only<\/em> server\/service running on the host machine, go ahead and use port 443.\u00a0 But if you are also running web pages, you will want to use that port for https traffic on your web server.\u00a0 In that case, use port 2102.<\/p>\n<p><span style=\"color: #008000;\"><strong>That is all there is to it.<\/strong><\/span>\u00a0 When you accept the setup dialog (press the <strong>Ok<\/strong> button) <span style=\"color: #0000ff;\"><strong>SNIP<\/strong><\/span> will connect to the remote Caster using the NTRIP User Account credentials the remote Caster provided.\u00a0 The secure connection negotiation takes place first, and if the certificate presented by the remote Caster is determined to be fully valid, the connection proceeds automatically in the normal way.<\/p>\n<p>If for some reason the certificate presented by the remote Caster is <em>not<\/em> valid an error dialog is shown.\u00a0 The reason(s) for this are then presented to the <span style=\"color: #0000ff;\"><strong>SNIP<\/strong><\/span> operator for review to determine if an exemption should be made (if the incorrect CERT should be accepted and used for that specific Caster).\u00a0 The next sections cover this process in greater detail.\u00a0 <span style=\"color: #0000ff;\"><strong>SNIP<\/strong><\/span> will not use an incorrect CERT in the connection process without explicit direction to do so from the operator.<\/p>\n<h2>Certificate Correctness<\/h2>\n<p>A certificate (CERT) is considered valid when all of its parameters (such as the domain name on which it can be used) match the host machine using it, when its expiration time has not past, and also when some other entity that you (your host machine) already trusts says the CERT is valid (and is not revoked).\u00a0 Each of these steps are automatically performed when the CERT is presented during an initial negotiation phase of the connection. These steps are considered further in a moment, and a dialog is shown to the operator if any problems are encountered.\u00a0 Another part of the initial negotiation is to determine how the data will be encrypted for transfer.\u00a0 The CERT lists a number of cipher suites it supports and the client selects which will be used after the negotiation completes.\u00a0 [<em>Aside<\/em>: When data is transferred from the NTRIP Caster to the NTRIP Client, each packet of data is block encrypted, typically with AES methods.\u00a0 So the size of the data sent (and therefore the bandwidth required) is not increased by using a secure connection. An important detail for wireless data connections.]<\/p>\n<p>Certificates are intended to be used <em>one<\/em> machine with <em>one<\/em> domain name, or on set of machines associated with that domain (sub domains). \u00a0\u00a0 If the NTRIP Caster operator does not ensure that the host name matches the CERT, it will cause an error.\u00a0\u00a0 Various wild cards can also be used in the CERT name process to expand the use of the CERT and ensure a correct match.\u00a0 Note that CERTs are normally associated with domain names, not IP values (although it is possible to do so).\u00a0 A trivial way to create a &#8220;bad&#8221; CERT is simply to connect to a Caster using its IP address.<\/p>\n<p style=\"padding-left: 40px;\">To illustrate this further, consider the popular NTRIP Caster run by the International GNSS Service (<a href=\"http:\/\/IGS.org\" target=\"_blank\" rel=\"noopener\">IGS.org<\/a>)\u00a0 found at igs-ip.net on port 2101 (the traditional non-secure connection) and port 443 (the secure connection).\u00a0\u00a0 If you connect to &#8220;<strong>ips-ip.net:443<\/strong>&#8221; the returned CERT is considered valid because the name and other details all match.\u00a0 Your NTRIP Client DNS service will match &#8220;ips-ip.net&#8221; to the IP 159.69.124.205 and compare that with the &#8220;common name&#8221; found in the returned CERT.\u00a0 If however you connect to &#8220;<strong>www<\/strong>.ips-ip.net:443&#8243; the returned CERT is considered <strong>NOT<\/strong> valid because the the &#8220;common name&#8221; found in the returned CERT no longer matches.\u00a0\u00a0 In the error dialog (discussed below) you see &#8220;The host name did not match any of the valid hosts for this certificate&#8221; displayed.\u00a0 This is a good example of a minor certificate issue that should be corrected or can be ignored.\u00a0 If you were to enter the IP (rather than the domain name), a similar error would be returned.<\/p>\n<p>Almost all CERTs have an expiration time, typically one year from the time of issue. In the past, longer periods were commonly used, but this is being curtailed.\u00a0 If the NTRIP Caster operator fails to renew the CERT in a timely way, the expired CERT will cause an error.<\/p>\n<p>Many of the fields in the CERT will be empty and this is normal.\u00a0 Also note that the certificate process allows adding an arbitrary number of other parameters as well, but these are not typically used. For more details, search online for &#8220;subject alternative name extension&#8221; or SAN.<\/p>\n<p>All &#8220;good&#8221; CERTs list who trusts them, pointing to another CERT (representing an organization). This is the CERT of the organization that <em>issued<\/em> the CERT you are examining. \u00a0 Trust is established and distributed in this way, creating a hierarchical &#8220;trust chain&#8221; (called CERT chaining).\u00a0\u00a0 The basic premise is that if you can trust the other CERT, you can safely trust the CERT it has issued.\u00a0 This process allows examining the CERT in question to work back to a set of &#8220;trust anchors&#8221; which is a set of CERTs (root anchors, all pre loaded) which your machine already knows about.\u00a0 [<em>Aside<\/em>: You can see the chain of CERTs involved along with each issuer with the dialog below.] \u00a0 In summary, a CERT which is otherwise valid and which has a valid trust chain is accepted by <span style=\"color: #0000ff;\"><strong>SNIP<\/strong><\/span> without the need for operator approval.<\/p>\n<p>Some CERTs do not use a chaining process back to a root anchor.\u00a0 These are called &#8220;self-signed&#8221; CERTs because the issuer is simply stating &#8220;I am and I have issued this CERT&#8221; without regard to others confirming this.\u00a0 This is fairly common and is not necessarily bad in any way.\u00a0 Various public tools allow anyone to issue such CERTs.\u00a0 After a review of the CERT details, you may choose to accept such a CERT. While one is advised not to engage in web or financial transactions with such a host, the risks for NTRIP data are fairly modest.\u00a0 For example, the NTRIP Client could get malicious data and be spoofed from such a connection.\u00a0 Better NTRIP Caster deployments will not use self-signed CERTs.\u00a0\u00a0 In summary, any self-signed CERT is considered incorrect and requires the <span style=\"color: #0000ff;\"><strong>SNIP<\/strong><\/span> operator to approve of its use.<\/p>\n<h2>Dealing with Incorrect Certificates<\/h2>\n<p>Certificates (CERTs) can be incorrect for a number of reasons, see the prior section.\u00a0 Some of these are of grave concern but many are not, especially in the specialized use case of GNSS corrections.\u00a0 [Unlike a web site doing financial transactions, the relative risk involved is usually much less.]\u00a0 It is up to you, as the <span style=\"color: #0000ff;\"><strong>SNIP<\/strong><\/span> operator, to allow or deny any incorrect certificates from being used.\u00a0 And you must repeat this process for every Caster that presents an incorrect CERT.\u00a0 For multiple mountPts from the same Caster you need to do this only once (as the Caster uses the same CERT for each connection).\u00a0 A list of your prior approved exceptions is kept and reused each time <strong><span style=\"color: #0000ff;\">SNIP<\/span><\/strong> starts.\u00a0 Due to the nature of how CERTS work, if any detail of the presented CERT were to ever change, the prior approval would be void and the new certificate (and its chain) would be reevaluated at that time.<\/p>\n<p>Managing incorrect CERTs falls into two general tasks:<\/p>\n<ul>\n<li>Looking at the error (or errors) from the CERT<\/li>\n<li>Looking at that the CERT itself, and any related CERTs that make up its validation chain.<\/li>\n<\/ul>\n<p><span style=\"color: #0000ff;\"><strong>SNIP<\/strong><\/span> provides two dialogs or order to handle these.\u00a0 Based on the data in these dialogs, the operator either accepts or rejects the presented CERT.\u00a0 When a CERT is rejected, <span style=\"color: #0000ff;\"><strong>SNIP <\/strong><\/span>will no longer attempt to reconnect to the Caster until manually told to reconnect (right-click the context menu in the slot and select <strong>Connect<\/strong>).<\/p>\n<h3>Viewing the CERT Errors<\/h3>\n<p>Whenever a secure connection is made, the remote Caster returns a Certificates (CERT) to establish its own validity.\u00a0 In other words the machine is who it claims to be.\u00a0 When this CERT cannot be fully validated, the error (or errors, as their can be more than one) are displayed in in a dialog box as shown in the below example.<\/p>\n<p style=\"text-align: center;\"><a href=\"https:\/\/www.use-snip.com\/kb\/wp-content\/uploads\/2021\/11\/SSLerrorDialog.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-8016 size-full\" src=\"https:\/\/www.use-snip.com\/kb\/wp-content\/uploads\/2021\/11\/SSLerrorDialog.png?_t=1636835413\" alt=\"\" width=\"430\" height=\"320\" srcset=\"https:\/\/www.use-snip.com\/kb\/wp-content\/uploads\/2021\/11\/SSLerrorDialog.png 430w, https:\/\/www.use-snip.com\/kb\/wp-content\/uploads\/2021\/11\/SSLerrorDialog-300x223.png 300w, https:\/\/www.use-snip.com\/kb\/wp-content\/uploads\/2021\/11\/SSLerrorDialog-50x37.png 50w, https:\/\/www.use-snip.com\/kb\/wp-content\/uploads\/2021\/11\/SSLerrorDialog-320x238.png 320w\" sizes=\"auto, (max-width: 430px) 100vw, 430px\" \/><\/a><\/p>\n<p>The title of the dialog shows the remote Caster (the domain name and port) to which the connection refers.\u00a0 The details of the CERT itself (and of the other CERTs in its chain) can be examined with the <strong>View Certificate Chain<\/strong> button (see next section).<\/p>\n<p>After considering the presented data and the relative risk, the <span style=\"color: #0000ff;\"><strong>SNIP<\/strong><\/span> operator can <strong>Accept<\/strong> the connection or <strong>Cancel<\/strong> (reject) it and hence the presented CERT.\u00a0 If Accept is not pressed, the connection attempt is stopped and the CERT will continued to be rejected.\u00a0 If Accept is pressed the CERT will be accepted, the connection process is allowed to continue, and the CERT digest value, as well as the NTRIP Caster involved, is added to the list of certificate exceptions.<\/p>\n<h3>Viewing the CERT and CERT Chain<\/h3>\n<p>The actual CERT chain can be viewed in two ways.\u00a0 From the above errors dialog (press the <strong>View Certificate Chain<\/strong> button), or from the right-click context menu of any active secure connection.\u00a0\u00a0\u00a0 The display shows various details about the CERT.\u00a0 The most useful of these is the <strong>Common Name<\/strong> field which must match the Caster domain and the end date (expiration time). Details about the issuer of the CERT are also shown.<a href=\"https:\/\/www.use-snip.com\/kb\/wp-content\/uploads\/2021\/11\/SSLcertInfo2.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-8034 size-full\" src=\"https:\/\/www.use-snip.com\/kb\/wp-content\/uploads\/2021\/11\/SSLcertInfo2.png?_t=1636903106\" alt=\"\" width=\"500\" height=\"530\" srcset=\"https:\/\/www.use-snip.com\/kb\/wp-content\/uploads\/2021\/11\/SSLcertInfo2.png 500w, https:\/\/www.use-snip.com\/kb\/wp-content\/uploads\/2021\/11\/SSLcertInfo2-283x300.png 283w, https:\/\/www.use-snip.com\/kb\/wp-content\/uploads\/2021\/11\/SSLcertInfo2-47x50.png 47w, https:\/\/www.use-snip.com\/kb\/wp-content\/uploads\/2021\/11\/SSLcertInfo2-320x339.png 320w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/a>The combo box for the Certificate Path allows selecting any of the CERTs that make up the chain. In the example below one can see that three CERTS were used.\u00a0 The the <em>igs.net<\/em> CERT was issued by &#8220;<em>Let&#8217;s Encrypt<\/em>&#8221; which was in turn issued by &#8220;<em>Internet Security Research Group<\/em>&#8221; in this example.<\/p>\n<p><a href=\"https:\/\/www.use-snip.com\/kb\/wp-content\/uploads\/2021\/11\/SSLcertExemptionsComboBox.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-8022 size-full\" src=\"https:\/\/www.use-snip.com\/kb\/wp-content\/uploads\/2021\/11\/SSLcertExemptionsComboBox.png?_t=1636836931\" alt=\"\" width=\"448\" height=\"228\" srcset=\"https:\/\/www.use-snip.com\/kb\/wp-content\/uploads\/2021\/11\/SSLcertExemptionsComboBox.png 448w, https:\/\/www.use-snip.com\/kb\/wp-content\/uploads\/2021\/11\/SSLcertExemptionsComboBox-300x153.png 300w, https:\/\/www.use-snip.com\/kb\/wp-content\/uploads\/2021\/11\/SSLcertExemptionsComboBox-50x25.png 50w, https:\/\/www.use-snip.com\/kb\/wp-content\/uploads\/2021\/11\/SSLcertExemptionsComboBox-320x163.png 320w\" sizes=\"auto, (max-width: 448px) 100vw, 448px\" \/><\/a><\/p>\n<h2>Managing the Certificates Exceptions<\/h2>\n<p>The digest values of invalid CERTs which have been approved for use are listed (along with the domain name) in a dialog for review.\u00a0 This dialog is opened with the menu command: <strong>Misc<\/strong> \u21d2 <strong>View CERT Exceptions&#8230;<\/strong> and is shown below.\u00a0\u00a0 The collection of prior approved CERTs can be managed (items can be removed) in the below dialog with a double click on any item.\u00a0 An &#8220;are you sure&#8221; dialog is then presented, and on confirmation the CERT is removed.\u00a0 Items are automatically added to this list when the <span style=\"color: #0000ff;\"><strong>SNIP<\/strong><\/span> operator confirms that an invalid CERT is to used on a given Caster domain.<\/p>\n<p style=\"text-align: center;\"><a href=\"https:\/\/www.use-snip.com\/kb\/wp-content\/uploads\/2021\/11\/SSLcertExemptions.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-8020 size-full\" src=\"https:\/\/www.use-snip.com\/kb\/wp-content\/uploads\/2021\/11\/SSLcertExemptions.png?_t=1636836319\" alt=\"\" width=\"566\" height=\"250\" srcset=\"https:\/\/www.use-snip.com\/kb\/wp-content\/uploads\/2021\/11\/SSLcertExemptions.png 566w, https:\/\/www.use-snip.com\/kb\/wp-content\/uploads\/2021\/11\/SSLcertExemptions-300x133.png 300w, https:\/\/www.use-snip.com\/kb\/wp-content\/uploads\/2021\/11\/SSLcertExemptions-50x22.png 50w, https:\/\/www.use-snip.com\/kb\/wp-content\/uploads\/2021\/11\/SSLcertExemptions-320x141.png 320w\" sizes=\"auto, (max-width: 566px) 100vw, 566px\" \/><\/a><\/p>\n<h2>Viewing the Certificate Chain<\/h2>\n<p>Whenever a secure connection is active using a CERT, the right-click context menu for that stream provides the item <strong>View Secure CERT used<\/strong> which can be used to bring up the Cert Info dialog to display the full members of the CERT chain.\u00a0 On nonsecure connections this menu item is disabled or not present.<\/p>\n<p>And the tool tip display for the connection also denotes that this is a secure connection. The letter &#8220;S&#8221; appears in various reports to denote this as well.<\/p>\n<p><a href=\"https:\/\/www.use-snip.com\/kb\/wp-content\/uploads\/2021\/11\/SSLcertMenus.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-8024 size-full\" src=\"https:\/\/www.use-snip.com\/kb\/wp-content\/uploads\/2021\/11\/SSLcertMenus.png?_t=1636837513\" alt=\"\" width=\"618\" height=\"418\" srcset=\"https:\/\/www.use-snip.com\/kb\/wp-content\/uploads\/2021\/11\/SSLcertMenus.png 618w, https:\/\/www.use-snip.com\/kb\/wp-content\/uploads\/2021\/11\/SSLcertMenus-300x203.png 300w, https:\/\/www.use-snip.com\/kb\/wp-content\/uploads\/2021\/11\/SSLcertMenus-50x34.png 50w, https:\/\/www.use-snip.com\/kb\/wp-content\/uploads\/2021\/11\/SSLcertMenus-600x406.png 600w, https:\/\/www.use-snip.com\/kb\/wp-content\/uploads\/2021\/11\/SSLcertMenus-320x216.png 320w\" sizes=\"auto, (max-width: 618px) 100vw, 618px\" \/><\/a><\/p>\n<h2>Related Topics<\/h2>\n<h3>Client CERTs<\/h3>\n<p>The above process deals with making a secure connection to a remote NTRIP Caster which will provide a suitable certificate for use during the connection negotiation phase.\u00a0 Here the NTRIP Caster (the server element) presents its CERT to the NTRIP client (the end user element) for acceptance.\u00a0 And this is the process which is defined for use in the current NTRIP Rev2 standard.\u00a0 However it represents only one of several possible ways to exchange certificates to establish trust. \u00a0 Another common connection mode found over https has the client element also present its own CERT to the server element to provide a mutual authentication process.\u00a0\u00a0 This method is not defined in the current NTRIP Rev2 standard, but its use is not prohibited either.<\/p>\n<p style=\"padding-left: 40px;\"><span style=\"color: #008000;\"><strong>Tip<\/strong><\/span>: Recall you can also use the <a href=\"https:\/\/www.use-snip.com\/kb\/knowledge-base\/user-accounts-adding-restrictions\/\" target=\"_blank\" rel=\"noopener\">User Account restriction<\/a> functions to restriction the ways in which a given user may connect. This includes <a href=\"https:\/\/www.use-snip.com\/kb\/knowledge-base\/restricting-users-by-agent\/\" target=\"_blank\" rel=\"noopener\">limiting the NTRIP agent<\/a> they are allowed to connect with.<\/p>\n<h3>Running <span style=\"color: #0000ff;\"><strong>SNIP<\/strong><\/span> on a Secure Port<\/h3>\n<p>From Rev 3.03 onward, all <span style=\"color: #0000ff;\"><strong>SNIP<\/strong><\/span> models (<span style=\"color: #993300;\"><em><strong>Lite<\/strong><\/em><\/span>, <span style=\"color: #993300;\"><em><strong>Basic<\/strong><\/em><\/span>, and <span style=\"color: #993300;\"><em><strong>Pro<\/strong><\/em><\/span>) could connect to remote secure Casters (the Remote-Relay tab).\u00a0 In all current releases of <span style=\"color: #0000ff;\"><strong>SNIP<\/strong><\/span> from Rev 3.15 onward (except <span style=\"color: #993300;\"><em><strong>Lite<\/strong><\/em><\/span>) the Caster can provide a secure connection port to service connecting (inbound) NTRIP Client devices (rovers) and NTRIP Server devices (base stations) as well.\u00a0 Push-Out connections to other Casters or devices can also be secure as well. This feature requires a <span style=\"color: #993300;\"><em><strong>Basic<\/strong> <\/em><\/span>or a <span style=\"color: #993300;\"><em><strong>Pro<\/strong> <\/em><\/span>model of <span style=\"color: #0000ff;\"><strong>SNIP<\/strong><\/span>.\u00a0 Note that it no longer requires a separate SSL\/TLS Plug-In module, which has now been incorporated directly into the core product.\u00a0 We can provide suitable self-signed certificates (CERTs) for use in your deployment as required as well.\u00a0 Often your ISP can also provide a suitable CERT for use as a service, whcih is a better choice as it will be issued by a recognized certificate authority (CA).<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This article covers how to setup and use Remote-Relay secure Caster connections in SNIP.\u00a0 Secure connections use https encryption over the TCP\/IP connection (rather than http) to protect the GNSS data from being compromised (intercepted or tampered with), and to allow the validation of the identity of the remote Caster [&hellip;]<\/p>\n","protected":false},"author":13,"comment_status":"open","ping_status":"closed","template":"","format":"standard","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"footnotes":""},"ht-kb-category":[285],"ht-kb-tag":[513,447,444,512,511],"class_list":["post-7992","ht_kb","type-ht_kb","status-publish","format-standard","hentry","ht_kb_category-base-station-setup","ht_kb_tag-cert","ht_kb_tag-ntrip-rev2","ht_kb_tag-port","ht_kb_tag-secure","ht_kb_tag-ssl-tls"],"_links":{"self":[{"href":"https:\/\/www.use-snip.com\/kb\/wp-json\/wp\/v2\/ht-kb\/7992","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.use-snip.com\/kb\/wp-json\/wp\/v2\/ht-kb"}],"about":[{"href":"https:\/\/www.use-snip.com\/kb\/wp-json\/wp\/v2\/types\/ht_kb"}],"author":[{"embeddable":true,"href":"https:\/\/www.use-snip.com\/kb\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/www.use-snip.com\/kb\/wp-json\/wp\/v2\/comments?post=7992"}],"version-history":[{"count":42,"href":"https:\/\/www.use-snip.com\/kb\/wp-json\/wp\/v2\/ht-kb\/7992\/revisions"}],"predecessor-version":[{"id":9165,"href":"https:\/\/www.use-snip.com\/kb\/wp-json\/wp\/v2\/ht-kb\/7992\/revisions\/9165"}],"wp:attachment":[{"href":"https:\/\/www.use-snip.com\/kb\/wp-json\/wp\/v2\/media?parent=7992"}],"wp:term":[{"taxonomy":"ht_kb_category","embeddable":true,"href":"https:\/\/www.use-snip.com\/kb\/wp-json\/wp\/v2\/ht-kb-category?post=7992"},{"taxonomy":"ht_kb_tag","embeddable":true,"href":"https:\/\/www.use-snip.com\/kb\/wp-json\/wp\/v2\/ht-kb-tag?post=7992"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}