*** sgml.orig/runtime.sgml Thu Dec 21 16:21:45 2000 --- sgml/runtime.sgml Thu Dec 21 16:47:18 2000 *************** *** 1823,1848 **** For details on how to create your server private key and certificate, refer to the OpenSSL documentation. A simple self-signed ! certificate can be used to get started testing, but a certificate signed by a CA (either one of the global CAs or a local one) should be used in production so the client can verify the servers identity. To create ! a quick self-signed certificate, use the CA.pl ! script included in OpenSSL: ! ! CA.pl -newcert ! ! Fill out the information the script asks for. Make sure to enter ! the local host name as Common Name. The script will generate a key ! that is passphrase protected. To remove the passphrase (required ! if you want automatic start-up of the postmaster), run the command ! ! openssl x509 -inform PEM -outform PEM -in newreq.pem -out newkey_no_passphrase.pem ! ! Enter the old passphrase to unlock the existing key. Copy the file ! newreq.pem to PGDATA/server.crt ! and newkey_no_passphrase.pem to ! PGDATA/server.key. Remove the PRIVATE KEY part ! from the server.crt using any text editor. --- 1823,1853 ---- For details on how to create your server private key and certificate, refer to the OpenSSL documentation. A simple self-signed ! certificate can be used to get started for testing, but a certificate signed by a CA (either one of the global CAs or a local one) should be used in production so the client can verify the servers identity. To create ! a quick self-signed certificate, use the following OpenSSL command: ! ! openssl req -new -text -out cert.req ! ! Fill out the information that openssl asks for. Make sure that you enter ! the local host name as Common Name; the challenge password can be ! left blank. The script will generate a key that is passphrase protected; ! it will not accept a pass phrase that is less than four characters long. ! To remove the passphrase (as you must if you want automatic start-up of ! the postmaster), run the commands ! ! mv privkey.pem cert.pem.pw ! openssl rsa -in cert.pem.pw -out cert.pem ! ! Enter the old passphrase to unlock the existing key. Now do ! ! openssl req -x509 -in cert.req -text -key cert.pem -out cert.cert ! cp cert.pem $PGDATA/server.key ! cp cert.cert $PGDATA/server.crt ! ! to turn the certificate into a self-signed certificate and to copy the ! key and certificate to where the postmaster will look for them.