File: README

package info (click to toggle)
openser 1.1.0-9etch1
  • links: PTS
  • area: main
  • in suites: etch, etch-m68k
  • size: 9,828 kB
  • ctags: 11,809
  • sloc: ansic: 120,528; sh: 5,249; yacc: 1,716; makefile: 1,261; php: 656; perl: 205; sql: 190
file content (24 lines) | stat: -rw-r--r-- 1,181 bytes parent folder | download
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24


This directory contains an already generated TLS certificate that can be
used in your OpenSER configuration. It's a generic certificate with the 
main purpose of serving as example and for testings.

IMPORTANT: it's not a trustable certificate - the CA is also an example.

All TLS configuration file may be found in "user" directory. If you want to
generate your own certificate, you may find in the "rootCA" directory the 
root CA to sign your request with. For how to do it, please see the README
file from the tls/tools directory (for "gen_usercert.sh" script) - basically
you have to copy this "rootCA" directory into the "tls/tools" one, update the 
user.conf with your data and run "gen_usercert.sh" - the password is "openser".

What is the purpose of these default CA and certificate? First to make an 
out-of-the box TLS configuration for users not so familiar with SSL/TLS.
Second, to give access to the same CA root to a large community in order to
encourage testings and interconnections via TLS with minimum of troubles.

For any questions, please address to :
	team@openser.org (if you want to keep your question private)
	users@openser.org (public mailing list)