Older libvirt versions still only work if 'encryption_key' is enabled in the server and client certificates. Add a note.
Suggested-by: Daniel P. Berrangé <berra...@redhat.com> Signed-off-by: Sebastian Mitterle <smitt...@redhat.com> --- docs/kbase/tlscerts.rst | 12 ++++++++++++ 1 file changed, 12 insertions(+) diff --git a/docs/kbase/tlscerts.rst b/docs/kbase/tlscerts.rst index 5a1cb4be0d..2104e7a88b 100644 --- a/docs/kbase/tlscerts.rst +++ b/docs/kbase/tlscerts.rst @@ -104,6 +104,18 @@ connect provided they have a valid certificate issued by the CA for their own IP address. You may want to change this to make it less (or more) permissive, depending on your needs. +The following sections will describe how to created the data needed for the TLS +setup. They use templates to create Certificate Authority, server and client +certificates. + +Important: versions of libvirt before 11.6.0 also required the ``encryption_key`` +flag in the server and client template. This is no longer mandated since it is +not applicable for use with many modern cryptographic algorithms, but it is +harmless if present as it will be ignored. If compatibility with both old and +new libvirt versions is required, then this extra flag must be added when +creating the certificate. + + Setting up a Certificate Authority (CA) --------------------------------------- -- 2.50.1