summaryrefslogtreecommitdiffstats
path: root/sample/sample-keys/README
diff options
context:
space:
mode:
authorSteffan Karger <steffan@karger.me>2014-10-23 00:14:29 +0200
committerGert Doering <gert@greenie.muc.de>2014-11-15 17:45:10 +0100
commit13b2313ace9797fc6b6ba8980ae592c930e16ee9 (patch)
treefc35814d9385f4cef227489e3bb0c9de69ad3677 /sample/sample-keys/README
parent6cb15b908a64b69b715fa8b2d60c71c6d9d3f9fc (diff)
downloadopenvpn-13b2313ace9797fc6b6ba8980ae592c930e16ee9.tar.gz
openvpn-13b2313ace9797fc6b6ba8980ae592c930e16ee9.tar.xz
openvpn-13b2313ace9797fc6b6ba8980ae592c930e16ee9.zip
Modernize sample keys and sample configs
I kept most of the certificate properties equal to the old certs, since some people's test scripts might rely on them (and it does not require any creativity from my part). Changes: * Add script to generate fresh test/sample keys (but keep sample keys in git for simple testing) * Switch from 1024 to 4096 bits RSA CA * Switch from 1024 to 2048 bits client/server RSA keys * Switch from 1024 to 2048 bits Diffie-Hellman parameters * Generate EC client and server cert, but sign with RSA CA (lets us test EC <-> RSA interoperability) * Remove 3DES cipher from 'sample' config * Add 'remote-cert-tls server' to client config * Update config files to deprecate nsCertType in favour of the keyUsage and extendedKeyUsage extensions. * Make naming more consistent Signed-off-by: Steffan Karger <steffan@karger.me> Acked-by: Samuli Seppänen <samuli@openvpn.net> Message-Id: <CAA1AbxKZr_E6Wk9GBbB3xpLyJzyBxSa1k21UDXnC90d8refUzw@mail.gmail.com> URL: http://article.gmane.org/gmane.network.openvpn.devel/9226 Signed-off-by: Gert Doering <gert@greenie.muc.de>
Diffstat (limited to 'sample/sample-keys/README')
-rw-r--r--sample/sample-keys/README17
1 files changed, 11 insertions, 6 deletions
diff --git a/sample/sample-keys/README b/sample/sample-keys/README
index 9f4f918..66dd945 100644
--- a/sample/sample-keys/README
+++ b/sample/sample-keys/README
@@ -1,14 +1,19 @@
Sample RSA and EC keys.
+Run ./gen-sample-keys.sh to generate fresh test keys.
+
See the examples section of the man page for usage examples.
NOTE: THESE KEYS ARE FOR TESTING PURPOSES ONLY.
DON'T USE THEM FOR ANY REAL WORK BECAUSE
THEY ARE TOTALLY INSECURE!
-ca.{crt,key} -- sample CA key/cert
-client.{crt,key} -- sample client key/cert
-server.{crt,key} -- sample server key/cert (nsCertType=server)
-pass.{crt,key} -- sample client key/cert with password-encrypted key
- password = "password"
-ec-*.{crt,key} -- sample elliptic curve variants of the above
+ca.{crt,key} -- sample CA key/cert
+server.{crt,key} -- sample server key/cert
+client.{crt,key} -- sample client key/cert
+client-pass.key -- sample client key with password-encrypted key
+ password = "password"
+client.p12 -- sample client pkcs12 bundle
+ password = "password"
+client-ec.{crt,key} -- sample elliptic curve client key/cert
+server-ec.{crt,key} -- sample elliptic curve server key/cert