diff -Nur -x '*.orig' -x '*.rej' smeserver-openvpn-s2s-0.1/root/etc/e-smith/locale/en-us/etc/e-smith/web/functions/openvpns2s mezzanine_patched_smeserver-openvpn-s2s-0.1/root/etc/e-smith/locale/en-us/etc/e-smith/web/functions/openvpns2s
--- smeserver-openvpn-s2s-0.1/root/etc/e-smith/locale/en-us/etc/e-smith/web/functions/openvpns2s 2010-10-17 16:10:14.000000000 +0200
+++ mezzanine_patched_smeserver-openvpn-s2s-0.1/root/etc/e-smith/locale/en-us/etc/e-smith/web/functions/openvpns2s 2010-10-17 16:09:42.000000000 +0200
@@ -44,8 +44,71 @@
Status
+ DESC_AUTH
+
+
+ Shared Key is simple to configure because you don't need to create and manage a PKI.
+ You just need to create a secret key, and and configure it on both side.
+ TLS authentication is a bit harder to configure, as you'll need to manage a PKI, but
+ provide a better level of security (like the Perfect Forward Secrecy).
+ If you don't care about the extra security provided by TLS, you should choose Shared Key here.]]>
+
+
+
+ LABEL_AUTH
+ Authentication mechanism
+
+
+ DESC_CONFIGURE_CERT
+ This page lets you configure the authentication of this daemon
+
+
+ DESC_CRL_URL
+
+ You can enter an URL where the CRL can be find. Your SME Server will update the CRL every hour
+ and check if the certificate of the remote endpoint is not revoked. If you don't wan't to use
+ the CRL verification , just let this field emtpy.
+
+
+
+ LABEL_CRL_URL
+ CRL update URL
+
+
+ DESC_CA_PEM
+ Enter the authoritative certificate in pem format
+
+
+ LABEL_CA_PEM
+ Authoritative certificate
+
+
+ DESC_CRT_PEM
+ Enter the certificate in pem format
+
+
+ LABEL_CRT_PEM
+ Enter the certificate in pem format
+
+
DESC_REMOTE_HOST
- Enter the hostname or IP of the remote server
+ Certificate
+
+
+ DESC_KEY_PEM
+ Enter the private key in pem format
+
+
+ LABEL_KEY_PEM
+ Private key
+
+
+ DESC_DH_PEM
+ Enter Diffie-Hellman parameters
+
+
+ LABEL_DH_PEM
+ Diffie-Hellman parameters
LABEL_REMOTE_HOST
@@ -102,9 +165,19 @@
+ DESC_SHARED_KEY_TLS
+
+
+ It will provide an extra security layer to your server.
+ You can create keys using this command: openvpn --genkey --secret /dev/stdout
+ This key should be kept secret, and only be stored on the client and the server.]]>
+
+
+
LABEL_SHARED_KEY
- Secret key
+ Shared key
+
DESC_ADD_SERVER_PAGE
This page lets you configure a new daemon acting as a server