From 3a405ad1396167a5beca5d4614ef4231d6d2d8ff Mon Sep 17 00:00:00 2001 From: Mikaela Suomalainen Date: Wed, 4 Jun 2014 18:55:18 +0300 Subject: [PATCH] pages/external/identifying: add ZNC. Closes #10 . --- pages/external/identifying.html | 14 +++++++++++- pages/external/identifying.html.md | 35 +++++++++++++++++++++++++++++- 2 files changed, 47 insertions(+), 2 deletions(-) diff --git a/pages/external/identifying.html b/pages/external/identifying.html index 5aadb92..fa0e2cb 100644 --- a/pages/external/identifying.html +++ b/pages/external/identifying.html @@ -85,6 +85,18 @@ cp YOURNICKNAMEHERE.pem ~/.config/hexchat/certs/client.pem
  • Disables verifying the certificates (required for self-signed certificates and I think that applies to our certificate too).
  • ZNC

    +

    Please read the both parts as you must add the certificate in webadmin or read ZNC documentation on how to add it manually.

    +
    Webadmin
    +

    First login to your webadmin and if you are admin, go to the global settings. Check the checkbox certauth, scroll down and press "Save".

    +

    Then go to your settings and check the checkbox cert. You might also want to check the checkbox for sasl and perform. Scroll down and click "Save and return".

    +

    Now you should see certauth in global modules where you can specify the fingerprint of the pem file and your IRC client should be able to login to ZNC with it.

    +

    You should also see Certificate in user modules. On top of the page it will tell you if you have certificate specified. Open the YOURNICKHERE.pem and copy-paste everything in it to the large box and click Update.

    +
    IRC
    +
    /znc loadmod --type=global certauth
    +/znc loadmod --type=user cert
    +/znc loadmod --type=user perform
    +/znc loadmod --type=network sasl
    +

    This is everything that was done above except adding the certificate which you should do in the webadmin (see the two last paragraphs under webadmin on this page).

    Telling NickServ about your key

    NickServ wants to know the fingerprint which you can get with the following command:

    openssl x509 -sha1 -noout -fingerprint -in YOURNICKNAMEHERE.pem | sed -e 's/^.*=//;s/://g;y/ABCDEF/abcdef/'
    @@ -107,7 +119,7 @@ XX:XX:XX -- NickServ: - 05dd01fedc1b821b796d0d785160f03e32f53fa8$$ XX:XX:XX -- NickServ: End of YOURNICK fingerprint list.

    Notes