diff options
| author | Florian Westphal <fw@strlen.de> | 2008-09-13 15:10:08 +0200 |
|---|---|---|
| committer | Florian Westphal <fw@strlen.de> | 2008-09-13 15:10:08 +0200 |
| commit | ebf5edfd8788037c39818461d09874a851b845fc (patch) | |
| tree | 98f20ab2ed0c013c530437352adab4cd8e1d2bb1 /doc/SSL.txt | |
| parent | bdd44eb0ab7e6ee080989c672ce6deeffae987c2 (diff) | |
| download | ngircd-ebf5edfd8788037c39818461d09874a851b845fc.tar.gz ngircd-ebf5edfd8788037c39818461d09874a851b845fc.zip | |
TLS/SSL support: documentation.
Diffstat (limited to 'doc/SSL.txt')
| -rw-r--r-- | doc/SSL.txt | 29 |
1 files changed, 25 insertions, 4 deletions
diff --git a/doc/SSL.txt b/doc/SSL.txt index 7578ad80..6ea207e6 100644 --- a/doc/SSL.txt +++ b/doc/SSL.txt @@ -10,9 +10,31 @@ -- SSL.txt -- -ngIRCd actually doesn't support secure connections for client-server or -server-server links using SSL, the Secure Socket Layer, by itself. But you can -use the stunnel(8) command to make this work. +ngIRCd supports SSL/TLSv1 encrypted connections using the +OpenSSL or gnutls library. +Both encryped server <-> client and server <-> server links should work. + +BEWARE! The Code is mostly untested, use at your own risk! + +Example that creates a self-signed certificate and key (using OpenSSL): +openssl req -newkey rsa:2048 -x509 -keyout server-key.pem \ + -out server-cert.pem -days 1461 + +Example that creates DH parameters (optional): +openssl dhparam -2 -out dhparams.pem 2048 + +Example that creates a self-signed certificate +and key (using gnutls): + +certtool --generate-privkey --bits 2048 --outfile server-key.pem +certtool --generate-self-signed --load-privkey server-key.pem \ + --outfile server-cert.pem + +Example that creates DH parameters (optional): +certtool --generate-dh-params --bits 2048 --outfile dhparams.pem + +Alternatively, you may use external programs/tools like stunnel to +make it work: <http://stunnel.mirt.net/> <http://www.stunnel.org/> @@ -51,7 +73,6 @@ short "how-to", thanks Stefan! === snip === -Probably ngIRCd will include support for SSL in the future ... -- |