actube/ssl
7u83@mail.ru 9a9c4ec4e9 Updated documentation.
FossilOrigin-Name: de2b8575d9dcc961dee75f8c9c06c6739a0f88d6e81e071534e9e5a6e0ca0817
2015-01-24 07:49:41 +00:00
..
README Updated documentation. 2015-01-24 07:49:41 +00:00
mkcert.sh Creates one certificate 2015-01-24 07:15:27 +00:00
mkcerts.sh Certificates accepted by ciscop ap. 2015-01-24 02:02:22 +00:00
mkciscoimport.sh Modyfied to match new directory structure 2015-01-24 07:49:16 +00:00
mkclean.sh Cleans directories now 2015-01-22 22:32:40 +00:00
mkrootca.sh Works without prompt 2015-01-24 07:13:26 +00:00
openssl-cisco.cnf Initial commit 2015-01-11 22:37:56 +00:00
openssl-int.cnf Put serial and dirname in authority key ident. 2015-01-24 07:20:40 +00:00
openssl.cnf Changed hash algorithm to md5 so an cisco IOS 12.3-image can import certificate. 2014-08-10 10:21:03 +00:00

README


Creating SSL certificates to test AC-Tube and it's WTP's
========================================================

1. Create a root CA by executing: 

   ./mkrootca.sh

   This creates some root CAs and intermediate CAs in the
   subdirectories ./root-ca and ./intermediate-ca to sign
   certificates.


2. Create client certificates as needed

   To create a client certificate, execute the script

   ./mkcert.sh <cert-name> [type]

   where cert-name is the name of the certificate to be created
   without extension and the optional parameter type specifies
   the type of the certificate, which could be only 'cisco'
   for now.
   The created certificatte and key is found in the 
   folder ./certs
   named cert-name.pem and cert-name.key.
   
   If you chose 'cisco' as type, the certificate will be
   accepted by a Cisco WTP when used in AC-Tube. The firmare
   on Cisco's AP must be at least 7.3.

   EXAMPLE:
     ./mkcert ac-cisco cisco
     will create the files ./certs/ac-cisco.pem and and ./certs/ac-cisco.key
    

3. Put these entries into  ac.conf  located in  the    ac directory, 
   so AC-Tube wilil use the certificates. If you have named your certificate
   just 'ac', put the following into config:

   ssl_key=../../ssl/certs/ac.key
   ssl_cert=../../ssl/certs/ac.crt


Installing your own root ca an a Cisco WTP
==========================================

If you want to connect a Cisco 1130 series LAP to  AC-Tube
using a certificate signed by a root ca of your choice, you
have to install the CA file on the WTP. Therofore you can 
create a terminal script by  executing:

./mkciscoimport.sh 	

Paste the result into a terminal session when in enabled mode. 

To ac.conf add the following entry:
   
dtls_verify_peer = no

But remember, if you reboot the WTP the installed CA will be lost.
Currently there is no way to make the installation permanent.


If you experience with other Cisco LAPs (e.g. 1141), please tell me.
7u83@mail.ru.