summaryrefslogtreecommitdiff
path: root/sbin/isakmpd/isakmpd.8
diff options
context:
space:
mode:
authorNiels Provos <provos@cvs.openbsd.org>2001-04-30 12:51:14 +0000
committerNiels Provos <provos@cvs.openbsd.org>2001-04-30 12:51:14 +0000
commitf0a91721bc41ade1f0af77e3ef582d498a527ff3 (patch)
tree6c4fd2d9238dcc74ec709fb4ceed05ae4a088cf9 /sbin/isakmpd/isakmpd.8
parent6cb4a7962712dd88dc069ac3a9c66c2ba897baee (diff)
mention how to generate extended attributes for certs with openssl;
from tim newsham; okay niklas@ ho@
Diffstat (limited to 'sbin/isakmpd/isakmpd.8')
-rw-r--r--sbin/isakmpd/isakmpd.824
1 files changed, 20 insertions, 4 deletions
diff --git a/sbin/isakmpd/isakmpd.8 b/sbin/isakmpd/isakmpd.8
index bc41ed87a78..b6f2a894f08 100644
--- a/sbin/isakmpd/isakmpd.8
+++ b/sbin/isakmpd/isakmpd.8
@@ -1,4 +1,4 @@
-.\" $OpenBSD: isakmpd.8,v 1.24 2001/04/09 21:21:57 ho Exp $
+.\" $OpenBSD: isakmpd.8,v 1.25 2001/04/30 12:51:13 provos Exp $
.\" $EOM: isakmpd.8,v 1.23 2000/05/02 00:30:23 niklas Exp $
.\"
.\" Copyright (c) 1998, 1999 Niklas Hallqvist. All rights reserved.
@@ -243,6 +243,7 @@ value, if you enter '.', the field will be left blank.
.Bd -literal
# openssl x509 -req -days 365 -in /etc/ssl/private/ca.csr \\
-signkey /etc/ssl/private/ca.key \\
+ -extfile /etc/ssl/x509v3.cnf -extensions x509v3_CA \\
-out /etc/ssl/ca.crt
.Ed
.Pp
@@ -263,13 +264,19 @@ unique.
.Pp
Now take these certificate signing requests to your CA and process
them like below. You have to add some extensions to the certificate
-in order to make it usable for isakmpd, which is why you will need
-to run
-.Xr certpatch 8 .
+in order to make it usable for isakmpd. There are two
+possible ways to add the extensions to the certificate.
+Either you have to to run
+.Xr certpatch 8
+or you have to make use of an OpenSSL configuration file, for example
+.Pa /etc/ssl/x509v3.cnf .
Replace 10.0.0.1 with the IP-address which
.Nm
will be using for identity.
.Pp
+For using
+.Xr certpach 8 ,
+do the following
.Bd -literal
# openssl x509 -req -days 365 -in 10.0.0.1.csr -CA /etc/ssl/ca.crt \\
-CAkey /etc/ssl/private/ca.key -CAcreateserial \\
@@ -278,6 +285,15 @@ will be using for identity.
10.0.0.1.crt 10.0.0.1.crt
.Ed
.Pp
+Otherwise do
+.Bd -literal
+# setenv CERTIP 10.0.0.1
+# openssl x509 -req -days 365 -in 10.0.0.1.csr -CA /etc/ssl/ca.crt \\
+ -CAkey /etc/ssl/private/ca.key -CAcreateserial \\
+ -extfile /etc/ssl/x509v3.cnf -extensions x509v3_IPAddr \\
+ -out 10.0.0.1.crt
+.Ed
+.Pp
Put the certificate (the file ending in .crt) in
.Pa /etc/isakmpd/certs/
on your local system. Also carry over the CA cert