myserver-commit
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[myserver-commit] [3005] Added note in the manual about GNU TLS to creat


From: Giuseppe Scrivano
Subject: [myserver-commit] [3005] Added note in the manual about GNU TLS to create new certificates.
Date: Thu, 19 Feb 2009 21:42:14 +0000

Revision: 3005
          http://svn.sv.gnu.org/viewvc/?view=rev&root=myserver&revision=3005
Author:   gscrivano
Date:     2009-02-19 21:42:13 +0000 (Thu, 19 Feb 2009)

Log Message:
-----------
Added note in the manual about GNU TLS to create new certificates.

Modified Paths:
--------------
    trunk/myserver/binaries/certificates/how_create_certificates.txt
    trunk/myserver/documentation/ssl_certificates.texi

Modified: trunk/myserver/binaries/certificates/how_create_certificates.txt
===================================================================
--- trunk/myserver/binaries/certificates/how_create_certificates.txt    
2009-02-18 11:06:56 UTC (rev 3004)
+++ trunk/myserver/binaries/certificates/how_create_certificates.txt    
2009-02-19 21:42:13 UTC (rev 3005)
@@ -1,14 +1,3 @@
-In order to generate a certificate you need the certtool utility
-provided by GNU TLS.
-Look here for more information: http://www.gnu.org/software/gnutls/.
-
-certtool --generate-privkey --outfile cert.key
-certtool --generate-self-signed --load-privkey privkey.key --outfile cert.pem
-
-These commands will create two files server.key and server.pem. Put
-them in this directory and configure your virtual host file to use these
-files adding the following lines under the <VHOST> section:
-
-<SSL_PRIVATEKEY>certificates/cert.key</SSL_PRIVATEKEY>
-<SSL_CERTIFICATE>certificates/privkey.pem</SSL_CERTIFICATE>
-<SSL_PASSWORD></SSL_PASSWORD>
+Take a look at the "How create SSL certificates with GNU TLS" section
+in the MyServer manual for a guide about how certificates should be
+created and used.

Modified: trunk/myserver/documentation/ssl_certificates.texi
===================================================================
--- trunk/myserver/documentation/ssl_certificates.texi  2009-02-18 11:06:56 UTC 
(rev 3004)
+++ trunk/myserver/documentation/ssl_certificates.texi  2009-02-19 21:42:13 UTC 
(rev 3005)
@@ -16,24 +16,26 @@
 In this way the key owner do not have to distribute the key only to
 know clients but he can distributes it to a large scale network.
 
address@hidden How create SSL certificates with OpenSSL
address@hidden How create SSL certificates with GNU TLS
 A certificate is needed to certify your identity through a
 CA (Certification Authority).  You can use a certificate without
 register it to third party CA, it is called self-signed certificate.
-You can find all the necessary tools to create certificates in  the
-library OpenSSL at: www.openssl.org.
+You can find all the necessary tools to create certificates in the
+GNU TLS command line tools.  Look here for more information:
address@hidden://www.gnu.org/software/gnutls/}.
 
-After OpenSSL is installed correctly, type the following commands:
+To generate a private key/self signed certificate couple you will need
+to execute these two commands:
 
 @example
-openssl genrsa -out server.key
-openssl req -new -x509 -days 730 -config openssl.cnf \
-        -key server.key -out server.pem
+certtool --generate-privkey --outfile cert.key
+certtool --generate-self-signed --load-privkey cert.key \
+         --outfile cert.pem
 @end example
 
 @section How use certificates in MyServer
 To configure certificates in MyServer you have to put the two files:
address@hidden, @code{server.pem} in the MyServer certificates
address@hidden, @code{cert.pem} in the MyServer certificates
 directory.
 
 To configure a HTTPS host that will use the created certificate, add
@@ -43,8 +45,8 @@
 <VHOST>
   <NAME>Every connection</NAME>
   <PORT>443</PORT>
-  <SSL_PRIVATEKEY>certificates/server.key</SSL_PRIVATEKEY>
-  <SSL_CERTIFICATE>certificates/server.pem</SSL_CERTIFICATE>
+  <SSL_PRIVATEKEY>certificates/cert.key</SSL_PRIVATEKEY>
+  <SSL_CERTIFICATE>certificates/cert.pem</SSL_CERTIFICATE>
   <PROTOCOL>HTTPS</PROTOCOL>
   <DOCROOT>web</DOCROOT>
   <SYSFOLDER>system</SYSFOLDER>






reply via email to

[Prev in Thread] Current Thread [Next in Thread]