pages/external/identifying: add ZNC. Closes #10 .

This commit is contained in:
Mikaela Suomalainen 2014-06-04 18:55:18 +03:00
parent e4edec44bc
commit 3a405ad139
2 changed files with 47 additions and 2 deletions

View File

@ -85,6 +85,18 @@ cp YOURNICKNAMEHERE.pem ~/.config/hexchat/certs/client.pem</code></pre>
<li>Disables verifying the certificates (required for self-signed certificates and I think that applies to our certificate too).</li>
</ol>
<h4 id="znc">ZNC</h4>
<p>Please read the both parts as you must add the certificate in webadmin or read ZNC documentation on how to add it manually.</p>
<h5 id="webadmin">Webadmin</h5>
<p>First login to your webadmin and if you are admin, go to the global settings. Check the checkbox <code>certauth</code>, scroll down and press &quot;Save&quot;.</p>
<p>Then go to your settings and check the checkbox <code>cert</code>. You might also want to check the checkbox for <code>sasl</code> and <code>perform</code>. Scroll down and click &quot;Save and return&quot;.</p>
<p>Now you should see <code>certauth</code> in global modules where you can specify the fingerprint of the pem file and your IRC client should be able to login to ZNC with it.</p>
<p>You should also see <code>Certificate</code> in user modules. On top of the page it will tell you if you have certificate specified. Open the <code>YOURNICKHERE.pem</code> and copy-paste everything in it to the large box and click <code>Update</code>.</p>
<h5 id="irc">IRC</h5>
<pre><code>/znc loadmod --type=global certauth
/znc loadmod --type=user cert
/znc loadmod --type=user perform
/znc loadmod --type=network sasl</code></pre>
<p>This is everything that was done above except adding the certificate which you should do in the webadmin (see the two last paragraphs under webadmin on this page).</p>
<h3 id="telling-nickserv-about-your-key">Telling NickServ about your key</h3>
<p>NickServ wants to know the fingerprint which you can get with the following command:</p>
<pre><code>openssl x509 -sha1 -noout -fingerprint -in YOURNICKNAMEHERE.pem | sed -e &#39;s/^.*=//;s/://g;y/ABCDEF/abcdef/&#39;</code></pre>
@ -107,7 +119,7 @@ XX:XX:XX -- NickServ: - 05dd01fedc1b821b796d0d785160f03e32f53fa8$$
XX:XX:XX -- NickServ: End of YOURNICK fingerprint list.</code></pre>
<h3 id="notes">Notes</h3>
<ul class="incremental">
<li>You must recreate your certificate yearly.</li>
<li>You must recreate your certificate as specified by the <code>-days</code> part in the openssl command.</li>
<li>This will identify you with immediately so you are still visible to /monitor.</li>
<li>This will identify you after services return unlike other methods if you happen to be on splitted server without services.</li>
<li>Supported networks which I am on:

View File

@ -163,7 +163,39 @@ certificates and I think that applies to our certificate too).
#### ZNC
Please read the both parts as you must add the certificate in webadmin or
read ZNC documentation on how to add it manually.
##### Webadmin
First login to your webadmin and if you are admin, go to the global
settings. Check the checkbox `certauth`, scroll down and press "Save".
Then go to your settings and check the checkbox `cert`. You might also
want to check the checkbox for `sasl` and `perform`. Scroll down and
click "Save and return".
Now you should see `certauth` in global modules where you can specify the
fingerprint of the pem file and your IRC client should be able to login to
ZNC with it.
You should also see `Certificate` in user modules. On top of the page it
will tell you if you have certificate specified. Open the
`YOURNICKHERE.pem` and copy-paste everything in it to the large box and
click `Update`.
##### IRC
```
/znc loadmod --type=global certauth
/znc loadmod --type=user cert
/znc loadmod --type=user perform
/znc loadmod --type=network sasl
```
This is everything that was done above except adding the certificate which
you should do in the webadmin (see the two last paragraphs under webadmin
on this page).
### Telling NickServ about your key
@ -217,7 +249,8 @@ XX:XX:XX -- NickServ: End of YOURNICK fingerprint list.
### Notes
* You must recreate your certificate yearly.
* You must recreate your certificate as specified by the `-days` part in
the openssl command.
* This will identify you with immediately so you are still visible to
/monitor.
* This will identify you after services return unlike other methods if you