stunnel/Certificate-Creation
cvsdist 163887dc3d auto-import changelog data from stunnel-3.8-4.src.rpm
Fri Aug 18 2000 Nalin Dahyabhai <nalin@redhat.com>
- make stunnel.pem also be (missingok)
Thu Jun 29 2000 Nalin Dahyabhai <nalin@redhat.com>
- move to Applications/Internet group
- clean up %post script
- make stunnel.pem %ghost %config(noreplace)
- provide a sample file for use with xinetd
Thu Jun 08 2000 Nalin Dahyabhai <nalin@redhat.com>
- FHS compliance fixes
- modify defaults
Tue Mar 14 2000 Florian La Roche <Florian.LaRoche@redhat.com>
- update to 3.8
- do not create certificate if one already exists
Mon Feb 21 2000 Florian La Roche <Florian.LaRoche@redhat.com>
- update to 3.7
- add patch to find /usr/share/ssl
- change some perms
Sat Oct 30 1999 Bernhard Rosenkraenzer <bero@redhat.com>
- Modify spec file to match Red Hat standards
Thu Aug 12 1999 Damien Miller <damien@ibs.com.au>
- Updated to 3.4a
- Patched for OpenSSL 0.9.4
- Cleaned up files section
Sun Jul 11 1999 Damien Miller <dmiller@ilogic.com.au>
- Updated to 3.3
Sat Nov 28 1998 Damien Miller <dmiller@ilogic.com.au>
- Initial RPMification
2004-09-09 12:45:04 +00:00

10 lines
387 B
Plaintext

To generate a key and self signed certificate, execute the following commands:
cd /usr/share/ssl/certs
make stunnel.pem
Note that by default, the file containing the key and certificate has its
permissions set to 0600, which means that any service using it needs to be
started as root in order to read it. Such a service should be configured
to switch UIDs using stunnel's "-s" flag.