SSL CA import instructions
This article describes in detail how you can import our Certificate Authority Certificate into your IRC client. If the client you are using is not listed, please contact us in #help and we'll see if we can find out how to import it for you.
Contents
mIRC
Screenshot: http://vbprog.fixato.net/ss/irc/mirc_ca.PNG
- Download the CA certificate from our secure website.
- Save it somewhere you can easily find it. 'My Documents' or the mIRC directory are good options.
- If you are already using a trusted authorities file for one or more different networks, then you need to append the downloaded certificate to the existing trusted authorities file. If you need a reminder on where this file is located; the trusted authorities button has the path in it.
- Within mIRC, go to: Tools > Options, then in the left list navigate to Connect > Options.
- Provided you have installed SSL as described above, there should be an SSL button here. Click that
- Click on the empty button under 'Trusted authorities file'.
- Select the file you downloaded, and you are done. A reload of mIRC is not required; you should be able to connect.
Xchat
Note: Xchat does not have an in-client method for checking CAs; it uses OpenSSL's paths to read CAs. See [1] for the source of this information.
Download the certificate, then follow the directions specific to your OS.
Windows builds
Screenshot go: http://vbprog.fixato.net/ss/irc/xchat_ca.PNG
- Save it somewhere you can easily find (%appdata%\X-Chat 2 or My Documents are good choices)
- Right click My Computer and hit Properties. Go to the Advanced tab and hit Environment Variables.
- Create a User Variable (or System if you prefer it to be available systemwide should you have a multiuser computer) with the following attributes:
- Variable: SSL_CERT_FILE
- Value: C:\Path\Where\You\Saved\Your\Cert.pem
It is recommended to reload Xchat since you are modifying an environment variable, and you should no longer see this:
* * Verify E: unable to get local issuer certificate.? (20)
If not, then Xchat successfully recognized the CA.
Linux builds
- Install the certificate to the certs directory in the location given by openssl version -d and Xchat should pick it up.
- There seems to be no way to do this on a per-user basis so that root access is not required (or at least I cannot find it)
weechat
- Locate your current trusted authorities file in weechat: /set weechat.network.gnutls_ca_file
- This will probably mention "%h/ssl/CAs.pem", which means it's stored in ssl/CAs.pem in the weechat homedir (~/.weechat by default)
- Download the certificate
- Save it in ~/.weechat/ssl/CAs.pem or append it to this file
- Set the ssl_verify option for your Chat4All server entry to "on":
/set irc.server.Chat4All.ssl_verify on
Now you should be able to connect to our SSL enabled ports without problems. You might need to restart your weechat before it uses the new certificates authorities file.
irssi
- Download our CA certificate file to ~/.irssi/ca.cert.pem
- Add -ssl_cafile ~/.irssi/ca.cert.pem to your irssi server configuration:
/server add -auto -ssl -ssl_cafile ~/.irsi/ca.cert.pem -network Chat4All irc.chat4all.org 7001
- Connect to the network/server:
/connect irc.chat4all.org
That's all!
Quassel
Pending implementation according to Bug-report 464 at Quassel's website
You might find some more instructions in this SSL post at weechat.org
Append CAs in Windows
If you have CAs from other networks (like Freenode), you can append our Certificate Authority Certificate to the existing file.
- Open our CA certificate in a text editor such as Notepad and copy the contents.
- Open the existing trusted authorities file in another text editor and paste our copied CA certificate at the top of the file.
- Save the trusted authorities file.
Append CAs in Linux
If you have CAs from other networks (like Freenode), you can append our CA Certificate to the existing file.
Assume our CA certificate is called ca.cert.pem, the existing trusted certificate authorities file is called CAs.pem and they are both in the same directory.
Execute the following commands:
#Backup the current trusted certificate authorities cp CAs.pem CAs.pem.backup
#Concatenate our certificate into the existing trusted certificates authorities cat ca.cert.pem >> CAs.pem