File: ssl-bootstrap.xml

package info (click to toggle)
openvswitch 3.5.0-1
  • links: PTS, VCS
  • area: main
  • in suites: forky, sid, trixie
  • size: 97,848 kB
  • sloc: sh: 1,643,930; ansic: 313,386; python: 27,939; xml: 21,526; makefile: 546; javascript: 191
file content (30 lines) | stat: -rw-r--r-- 1,203 bytes parent folder | download
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
<?xml version="1.0" encoding="utf-8"?>
<dl>
  <dt><code>--bootstrap-ca-cert=</code><var>cacert.pem</var></dt>
  <dd>
    <p>
      When <var>cacert.pem</var> exists, this option has the same effect
      as <code>-C</code> or <code>--ca-cert</code>. If it does not exist,
      then the executable will attempt to obtain the CA certificate from the
      SSL/TLS peer on its first SSL/TLS connection and save it to the named
      PEM file.  If it is successful, it will immediately drop the connection
      and reconnect, and from then on all SSL/TLS connections must be
      authenticated by a certificate signed by the CA certificate thus
      obtained.
    </p>
    <p>
      This option exposes the SSL/TLS connection to a man-in-the-middle
      attack obtaining the initial CA certificate, but it may be useful
      for bootstrapping.
    </p>
    <p>
      This option is only useful if the SSL/TLS peer sends its CA certificate
      as part of the SSL/TLS certificate chain.  SSL/TLS protocols do not
      require the server to send the CA certificate.
    </p>
    <p>
      This option is mutually exclusive with <code>-C</code> and
      <code>--ca-cert</code>.
    </p>
  </dd>
</dl>