Hi Mario,
sorry for my late answer. In our ubuntu packages repository we have
package fred-server separated into four packages (fred-common,
fred-rifd, fred-pifd, fred-adifd). All this binary packages are build
from fred-server source package. Those fred-*ifd packages contain
servers for registrar interface, public interface and administration
inteface. We separated them just because different importance of these,
for example we upgrade and restart administration interface very often
and on the contrary - registrar interface must be restarted only when we
inform registrars. This is just our policy.
From your email it looks like you forgot to sign your eppclient.pem
certificate with ubuntu CA certificate. Client certificate cannot be
self signed (of course except of situation when the same certificate is
configured as CA certificate)
Hope It will help.
Regards,
Jaromir
On Wed, 2008-09-24 at 12:03 -0600, Mario Guerra wrote:
Jatomir and all:
Thanks. I've tested the Live CD with the 01/01/2008 date. It works
perfectly. The net effect is that it create zones so easily and, at the
same time, stores in a database the administrative data using EPP.
Moreover it keeps it simple.
The disk installation:
In our case my approach has been installing the Ubuntu hardy (8.04)
.deb packages, fred-*.deb, which install dome dependencies too. I see
that there are no .dev for fred-server (including the Python parts), so
I installed these by hand (in /usr/.local) . Is that correct?. What
about generating .deb packages for these, too?.
For installing the certificates I do this:
1. I use the CA included in the ca-certificates Debian package which, in
my opinion, is adequate (I don't have to generate a CA certificate myself.
2. For the mod-eppd Apache module, I generate the self-signed
certificates using the usual procedures for generating them for
encrypted HTML:
openssl genrsa -des3 -out eppd.key 4096
openssl req -new -key eppd.key -out eppd.csr
openssl x509 -req -days 3650 -in eppd.csr -signkey eppd.key -out eppd.crt
openssl rsa -in eppd.key -out eppd.key.insecure
mv eppd.key eppd.key.secure;mv eppd.key.insecure eppd.key
chmod 600 *.key
/etc/init.d/apache2 force-reload
3. For the fred-client certificate configuration I rather use a method I
prefer, say,, for dovecot SSL configuration:
openssl req -new -x509 -nodes -out eppclient.pem -keyout eppclient.pem
4. After generating both certificates I first configure the mod-eppd
virtualhost:
Listen *:700
<VirtualHost *:700>
CorbaEnable On
CorbaNameservice "localhost"
CorbaObject "EPP" "EPP_alias"
EPPprotocol On
EPPObject "EPP_alias"
EPPschema "/usr/share/fred-mod-eppd/schemas/all-1.4.xsd"
EPPservername "CR.NIC's EPP server"
EPPlog "/var/log/apache2/eppd.log"
EPPloglevel error
EPPvalidResponse Off
SSLEngine off
SSLCipherSuite
ALL:!ADH:!EXPORT56:RC4+RSA:+HIGH:+MEDIUM:+LOW:+SSLv2:+
EXP:+eNULL
SSLVerifyClient require
SSLCertificateFile /etc/ssl/fred/eppd.crt
SSLCertificateKeyFile /etc/ssl/fred/eppd.key
SSLCACertificateFile /etc/ssl/certs/ca.pem
SSLVerifyDepth 1
</VirtualHost>
Notice the /etc/ssl/certs/ca.pem CA certificate, which is the standard
Ubuntu CA certificate. This should be adequate, because it expires much
later.
5. /etc/init.d/apache2 force-reload
6. For the epp-client configuration file I have this in
/usr/local/etc/fred/fred-client.conf:
[connect]
;; dir=/usr/local/share/fred-client/ssl
host = localhost
port = 700
ssl_cert = /etc/ssl/fred/eppclient.pem
ssl_key = /etc/ssl/fred/eppclient.pem
username = REG-FRED_A
password = passwd
username2 = REG-FRED_B
password2 = passwd
etc.....
7. When I run fred-client I get this:
root@mguerra:/etc/fred# fred-client
FredClient 1.6.1
Type "help", "license" or "credits" for more information.
Using configuration from /usr/local/etc/fred/fred-client.conf
Connecting to localhost, port 700 ...
ERROR: socket.sslerror: (1, 'error:140770FC:SSL
routines:SSL23_GET_SERVER_HELLO:unknown protocol') (localhost:700)
Certificate not signed by verified certificate authority.
The date gives this:
mié sep 24 11:33:57 CST 2008 (mié means Wednesday).
What can be the reason for this?. Should I use other CA certificate?. Or
perhaps I should use a certificate in ~/fredclient.pem?.
Thank you in advance.
Mario
_______________________________________________
Fred-users mailing list
Fred-users(a)lists.nic.cz
https://lists.nic.cz/mailman/listinfo/fred-users