⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 readme

📁 使用最广泛的radius的linux的源码
💻
字号:
  This directory contains scripts to create the server certificates.To make a set of default (i.e. test) certificates, simply type:$ ./bootstrap  The "openssl" command will be run against the sample configurationfiles included here, and will make a self-signed certificate authority(i.e. root CA), and a server certificate.  This "root CA" should beinstalled on any client machine needing to do EAP-TLS, PEAP, orEAP-TTLS.  The Microsoft "XP Extensions" will be automatically included in theserver certificate.  Without those extensions Windows clients willrefuse to authenticate to FreeRADIUS.  In general, you should use self-signed certificates for 802.1x (EAP)authentication.  When you list root CAs from other organizations inthe "CA_file", you permit them to masquerade as you, to authenticateyour users, and to issue client certificates for EAP-TLS.  If FreeRADIUS was configured to use OpenSSL, then simply startingthe server in root in debugging mode should also create testcertificates, i.e.:$ radiusd -X  That will cause the EAP-TLS module to run the "bootstrap" script inthis directory.  The script will be executed only once, the first timethe server has been installed on a particular machine.  This bootstrapscript SHOULD be run on installation of any pre-built binary packagefor your OS.  In any case, the script will ensure that it is not runtwice, and that it does not over-write any existing certificates.  If you already have CA and server certificates, rename (or delete)this directory, and create a new "certs" directory containing yourcertificates.  Note that the "make install" command will NOTover-write your existing "raddb/certs" directory, which means that the"bootstrap" command will not be run.		NEW INSTALLATIONS OF FREERADIUS  We suggest that new installations use the test certificates forinitial tests, and then create real certificates to use for normaluser authentication.  See the instructions below for how to create thevarious certificates.  The old test certificates can be deleted byrunning the following command:$ rm -f *.pem *.der *.csr *.crt *.key *.p12 serial* index.txt*  Then, follow the instructions below for creating real certificates.  Once the final certificates have been created, you can delete the"bootstrap" command from this directory, and delete the"make_cert_command" configuration from the "tls" sub-section ofeap.conf.  If you do not want to enable EAP-TLS, PEAP, or EAP-TTLS, then deletethe relevant sub-sections from the "eap.conf" file.		MAKING A ROOT CERTIFICATE$ vi ca.cnf  Edit the "input_password" and "output_password" fields to be the  password for the CA certificate.  Edit the [certificate_authority] section to have the correct values  for your country, state, etc.$ make ca.pem  This step creates the CA certificate.$ make ca.der  This step creates the DER format of the self-signed certificate,  which is can be imported into Windows.		MAKING A SERVER CERTIFICATE$ vi server.cnf  Edit the "input_password" and "output_password" fields to be the  password for the server certificate.  Edit the [server] section to have the correct values for your  country, state, etc.  Be sure that the commonName field here is  different from the commonName for the CA certificate.$ make server.pem  This step creates the server certificate.  If you have an existing certificate authority, and wish to create a  certificate signing request for the server certificate, edit  server.cnf as above, and type the following command.$ make server.csr  You will have to ensure that the certificate contains the XP  extensions needed by Microsoft clients.		MAKING A CLIENT CERTIFICATE  Client certificates are used by EAP-TLS, and optionally by EAP-TTLSand PEAP.  The following steps outline how to create a clientcertificate that is signed by the server certificate created above.You will have to have the password for the server certificate in the"input_password" and "output_password" fields of the server.cnf file.$ vi client.cnf  Edit the "input_password" and "output_password" fields to be the  password for the client certificate.  You will have to give these  passwords to the end user who will be using the certificates.  Edit the [client] section to have the correct values for your  country, state, etc.  Be sure that the commonName field here is  the User-Name that will be used for logins!$ make client.pem  The users certificate will be in "commonName.pem",  i.e. "user@example.com.pem".  To create another client certificate, just repeat the steps for  making a client certificate, being sure to enter a different login  name for "commonName", and a different password.		PERFORMANCE  EAP performance for EAP-TLS, TTLS, and PEAP is dominated by SSL  calculations.  That is, a normal system can handle PAP  authentication at a rate of 10k packets/s.  However, SSL involves  RSA calculations, which are very expensive.  To benchmark your system,  do:$ openssl speed rsa  or$ openssl speed rsa2048  to test 2048 bit keys.  A 1GHz system will likely do 30 calculations/s.  A 2Ghz system may  do 50 calculations/s, or more.  That number is also the number of  authentications/s that can be done for EAP-TLS (or TTLS, or PEAP).

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -