Difference between revisions of "SSL CA import instructions"

From Chat4AllFAQ
Jump to: navigation, search
m (Added placeholder for Quassel)
m (Added instructions for irssi)
Line 18: Line 18:
 
   /set irc.server.Chat4All.ssl_verify on
 
   /set irc.server.Chat4All.ssl_verify on
 
Now you should be able to connect to our SSL enabled ports without problems. You might need to restart your weechat before it uses the new certificates authorities file.
 
Now you should be able to connect to our SSL enabled ports without problems. You might need to restart your weechat before it uses the new certificates authorities file.
 +
 +
=irssi=
 +
#Download our CA certificate file to ~/.irssi/ca.cert.pem
 +
#Add ''-ssl_cafile ~/.irssi/ca.cert.pem'' to your irssi server configuration:
 +
  /server add -auto -ssl -ssl_cafile ~/.irsi/ca.cert.pem -network Chat4All irc.chat4all.org 7001
 +
#Connect to the network/server:
 +
  /connect irc.chat4all.org
 +
That's all!
  
 
=Quassel=
 
=Quassel=

Revision as of 19:19, 27 September 2010

This article describes in detail how you can import our Certificate Authority Certificate into your IRC client. If the client you are using is not listed, please contact us in #help and we'll see if we can find out how to import it for you.

mIRC

  1. Download the CA certificate from our website.
  2. Save it somewhere you can easily find it. 'My Documents' or the mIRC directory are good options.
  3. If you are already using a trusted authorities file for one or more different networks, then you need to append the downloaded certificate to the existing trusted authorities file. If you need a reminder on where this file is located; the trusted authorities button has the path in it.
  4. Within mIRC, go to: Tools > Options, then in the left list navigate to Connect > Options.
  5. Provided you have installed SSL as described above, there should be an SSL button here. Click that
  6. Click on the empty button under 'Trusted authorities file'.
  7. Select the file you downloaded, and you are done. A reload of mIRC is not required; you should be able to connect.

weechat

  1. Locate your current trusted authorities file in weechat: /set weechat.network.gnutls_ca_file
  2. This will probably mention "%h/ssl/CAs.pem", which means it's stored in ssl/CAs.pem in the weechat homedir (~/.weechat by default)
  3. Download the certificate
  4. Save it in ~/.weechat/ssl/CAs.pem or append it to this file
  5. Set the ssl_verify option for your Chat4All server entry to "on":
 /set irc.server.Chat4All.ssl_verify on

Now you should be able to connect to our SSL enabled ports without problems. You might need to restart your weechat before it uses the new certificates authorities file.

irssi

  1. Download our CA certificate file to ~/.irssi/ca.cert.pem
  2. Add -ssl_cafile ~/.irssi/ca.cert.pem to your irssi server configuration:
 /server add -auto -ssl -ssl_cafile ~/.irsi/ca.cert.pem -network Chat4All irc.chat4all.org 7001
  1. Connect to the network/server:
 /connect irc.chat4all.org

That's all!

Quassel

Pending implementation according to Bug-report 464 at Quassel's website

You might find some more instructions in this SSL post at weechat.org

Append CAs in Windows

If you have CAs from other networks (like Freenode), you can append our Certificate Authority Certificate to the existing file.

  1. Open our CA certificate in a text editor such as Notepad and copy the contents.
  2. Open the existing trusted authorities file in another text editor and paste our copied CA certificate at the top of the file.
  3. Save the trusted authorities file.

Append CAs in Linux

If you have CAs from other networks (like Freenode), you can append our CA Certificate to the existing file.

Assume our CA certificate is called ca.cert.pem, the existing trusted certificate authorities file is called CAs.pem and they are both in the same directory.

Execute the following commands:

 #Backup the current trusted certificate authorities
 cp CAs.pem CAs.pem.backup
 #Concatenate our certificate into the existing trusted certificates authorities
 cat ca.cert.pem >> CAs.pem