diff -Nur -x '*.orig' -x '*.rej' smeserver-openvpn-s2s-0.1/root/etc/e-smith/locale/en-us/etc/e-smith/web/functions/openvpns2s mezzanine_patched_smeserver-openvpn-s2s-0.1/root/etc/e-smith/locale/en-us/etc/e-smith/web/functions/openvpns2s --- smeserver-openvpn-s2s-0.1/root/etc/e-smith/locale/en-us/etc/e-smith/web/functions/openvpns2s 2010-10-17 16:10:14.000000000 +0200 +++ mezzanine_patched_smeserver-openvpn-s2s-0.1/root/etc/e-smith/locale/en-us/etc/e-smith/web/functions/openvpns2s 2010-10-17 16:09:42.000000000 +0200 @@ -44,8 +44,71 @@ Status + DESC_AUTH + + + Shared Key is simple to configure because you don't need to create and manage a PKI. + You just need to create a secret key, and and configure it on both side.
+ TLS authentication is a bit harder to configure, as you'll need to manage a PKI, but + provide a better level of security (like the Perfect Forward Secrecy).
+ If you don't care about the extra security provided by TLS, you should choose Shared Key here.]]> +
+
+ + LABEL_AUTH + Authentication mechanism + + + DESC_CONFIGURE_CERT + This page lets you configure the authentication of this daemon + + + DESC_CRL_URL + + You can enter an URL where the CRL can be find. Your SME Server will update the CRL every hour + and check if the certificate of the remote endpoint is not revoked. If you don't wan't to use + the CRL verification , just let this field emtpy. + + + + LABEL_CRL_URL + CRL update URL + + + DESC_CA_PEM + Enter the authoritative certificate in pem format + + + LABEL_CA_PEM + Authoritative certificate + + + DESC_CRT_PEM + Enter the certificate in pem format + + + LABEL_CRT_PEM + Enter the certificate in pem format + + DESC_REMOTE_HOST - Enter the hostname or IP of the remote server + Certificate + + + DESC_KEY_PEM + Enter the private key in pem format + + + LABEL_KEY_PEM + Private key + + + DESC_DH_PEM + Enter Diffie-Hellman parameters + + + LABEL_DH_PEM + Diffie-Hellman parameters LABEL_REMOTE_HOST @@ -102,9 +165,19 @@ + DESC_SHARED_KEY_TLS + + + It will provide an extra security layer to your server.
+ You can create keys using this command: openvpn --genkey --secret /dev/stdout
+ This key should be kept secret, and only be stored on the client and the server.]]> +
+
+ LABEL_SHARED_KEY - Secret key + Shared key + DESC_ADD_SERVER_PAGE This page lets you configure a new daemon acting as a server