File: README

package info (click to toggle)
libest 3.2.0%2Bds-1.1
  • links: PTS
  • area: main
  • in suites: forky, sid, trixie
  • size: 11,792 kB
  • sloc: ansic: 60,980; java: 12,082; sh: 4,956; python: 4,474; xml: 385; makefile: 290
file content (58 lines) | stat: -rw-r--r-- 2,053 bytes parent folder | download
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
This directory contains a sample EST server application.  It utilizes
Mongoose for the web server, OpenSSL for the SSL stack to be used
with Mongoose, libest for the EST stack, and OpenSSL for basic CA
services. 


DISCLAIMER:  This example code should not be used "as is" in a Cisco
             product.  The CA server used by the example was taken
	     from the OpenSSL example code.  It has not been tested 
	     to comply with X509 requirements for operating as a 
	     certificate authority.  There are known issues with the
	     OpenSSL CA, such as the basic constraints are not checked
	     when signing a certificate request.  Additionally, the  
	     OpenSSL CA implementation is not thread safe.
 


To run the example:

1.  Ensure libcrypto.so and libest.so are in the LD_LIBRARY_PATH.
    Here's an example:

    export LD_LIBRARY_PATH=/usr/local/ssl/lib:/usr/local/est/lib

2.  Run the createCA.sh script to create the sample CA database.
    This only needs to be done once.  This will create the estCA
    directory, which contains the CA database.

3.  Run the runserver.sh script to start the server.  The server
    will listen on port 8085.

4.  Use an EST client to exercise the server.



Certificate Revocation
----------------------
libest supports CRL checks when verifying the client certificate.
To use this, the CA cert chain file, which is a PEM file, should have
the CRL records appended to it.  To generate the CRL, follow
this example:

    # revoke a certificate, repeat as needed
    openssl ca -config ./estExampleCA.cnf  -revoke certtorevoke.pem 
    # generate the CRL
    openssl ca -config ./estExampleCA.cnf  -gencrl -out crl.pem
    # append the CRL to the CA certs
    cat crl.pem >> estCA/cacert.crt 


TLS-SRP support
---------------------
To enable TLS-SRP use the --srp switch when starting estserver.  You'll
need to provide the SRP verifier file to be used.  This can be generated
using OpenSSL.  An example follows:

    touch passwd.srpv
    openssl srp -srpvfile passwd.srpv -gn 1536 -add jsmith