Using SSL D1233178729 Aglenda #Programs that use ssl (i was setting this up for tlssrv) need a #certificate and a corresponding key to be able to encrypt their #connections. The key is secret, and should only be stored in bootes' #secstore, loaded at boot into his factotum. # #1, FIRST, TO GENERATE AN SSL KEY, DO THESE STEPS AS BOOTES: # #! ramfs #! cd /tmp #! auth/rsagen -t 'service=tls role=client owner=*' > key #Then from this key, we generate a certificate, that's public: #! auth/rsa2x509 'C=FR CN=*.fakedom.dom' key | auth/pemencode CERTIFICATE > /sys/lib/tls/cert #Where FR is a two-digit country code, and fakedom.dom is your domain. #! auth/secstore -g factotum #To get bootes' factotum file from the secstore #! cat key >> factotum #To add the ssl key to the factotum, optionally, you can also add it #to his running factotum: #! cat key >> /mnt/factotum/ctl #Then store the modified factotum file in the secstore: #! auth/secstore -p factotum # #2, TO BE SURE THE KEY GETS LOADED AT BOOT TIME # #you should be sure to start a factotum before the listen process is #started in /rc/bin/cpurc ot termrc, and that the keys do get loaded #from the secstore. If you are not sure, you can check by rebooting, #then, as hostowner, from the phisical machine do: #! cat /mnt/factotum/ctl #Should show a key with proto=rsa service=tls role=client. # #3, TO LOAD THE KEY AT BOOT FROM BOOTES' SECSTORE # #with the secstore key in the nvram, you can do this: # #If you are not sure bootes' secstore key is in nvram, you can make #sure by doing #! auth/wrkey #This will prompt for authid (usually bootes), authdom, secstore key #and bootes' password. # #Then, to load the factotum file from secstore to the running #factotum, add this to /rc/bin/cpurc or termrc: #! auth/secstore -n -G factotum >> /mnt/factotum/ctl #Then, to check whether it's loaded retry step 2. #