*** sgml.orig/runtime.sgml Thu Dec 21 16:21:45 2000
--- sgml/runtime.sgml Thu Dec 21 16:47:18 2000
***************
*** 1823,1848 ****
For details on how to create your server private key and certificate,
refer to the OpenSSL> documentation. A simple self-signed
! certificate can be used to get started testing, but a certificate signed
by a CA (either one of the global CAs or a local one) should be used in
production so the client can verify the servers identity. To create
! a quick self-signed certificate, use the CA.pl
! script included in OpenSSL:
!
! CA.pl -newcert
!
! Fill out the information the script asks for. Make sure to enter
! the local host name as Common Name. The script will generate a key
! that is passphrase protected. To remove the passphrase (required
! if you want automatic start-up of the postmaster), run the command
!
! openssl x509 -inform PEM -outform PEM -in newreq.pem -out newkey_no_passphrase.pem
!
! Enter the old passphrase to unlock the existing key. Copy the file
! newreq.pem> to PGDATA>/server.crt>
! and newkey_no_passphrase.pem> to
! PGDATA>/server.key>. Remove the PRIVATE KEY part
! from the server.crt using any text editor.
--- 1823,1853 ----
For details on how to create your server private key and certificate,
refer to the OpenSSL> documentation. A simple self-signed
! certificate can be used to get started for testing, but a certificate signed
by a CA (either one of the global CAs or a local one) should be used in
production so the client can verify the servers identity. To create
! a quick self-signed certificate, use the following OpenSSL command:
!
! openssl req -new -text -out cert.req
!
! Fill out the information that openssl asks for. Make sure that you enter
! the local host name as Common Name; the challenge password can be
! left blank. The script will generate a key that is passphrase protected;
! it will not accept a pass phrase that is less than four characters long.
! To remove the passphrase (as you must if you want automatic start-up of
! the postmaster), run the commands
!
! mv privkey.pem cert.pem.pw
! openssl rsa -in cert.pem.pw -out cert.pem
!
! Enter the old passphrase to unlock the existing key. Now do
!
! openssl req -x509 -in cert.req -text -key cert.pem -out cert.cert
! cp cert.pem $PGDATA/server.key
! cp cert.cert $PGDATA/server.crt
!
! to turn the certificate into a self-signed certificate and to copy the
! key and certificate to where the postmaster will look for them.