Thanks for sharing!

On Wed, Apr 4, 2018 at 2:11 AM, David Jentz <jen...@gmail.com> wrote:
> The other thread was getting a lot of responses so I start a new one..
>
> Here is a script that works for me on redhat 6.9 (/centos6.9) that
> converts a 4.0.3 -snapshot default install of openmeetings from http
> to https
>
> There are lots of opportunities for improvement to fully automate. I
> guess this might help people as a starting point but maybe not as an
> ending point.
>
> Here I am using the password as 'changeit' which is obviously not a
> real password..
>
> -Dave
>
> #!/bin/sh
> RED5_HOME=/opt/red5
> cd $RED5_HOME
> mkdir certs
> mkdir certs/private
>
> #create CA cert
> figlet create CA
> mkdir certs/ca
> mkdir certs/ca/private
> cd certs/ca
> #try to argment passphrase
> openssl genrsa -aes256 -out private/ca.key.pem 4096
> #check return code, exit on error
> #exit on no file private ca.key.pem
> chmod 400 private/ca.key.pem
>
> #try to argment passphrase
> openssl req -key private/ca.key.pem -new -x509 -days 7300 -sha256
> -extensions v3_ca -out ca.cert.pem
> #check return code, exit on error
> #exit on no file  ca.cert.pem
>
> #Create Selfsigned cert, maybe use what the russians have in threads instead.
> figlet create red5 cert
> cd $RED5_HOME
> cd certs
> #try to argment passphrase
> openssl req -new > new.ssl.csr
> #check return code, exit on error
> #exit on no file  new.ssl.csr
> #exit on no file  privkey
> #( use actual hostname for CN)
> #(leave challenge blank)
>
> mv privkey.pem private
>
> openssl rsa -in private/privkey.pem -out private/red5.cert.key
> #check return code, exit on error
> #exit on no file  new.cert.key
> openssl x509 -in new.ssl.csr -out red5.crt -req -signkey
> private/red5.cert.key -days 9999
> #check return code, exit on error
> #exit on no file  red5.crt
>
>
> openssl pkcs12 -export -in red5.crt -inkey private/red5.cert.key -out
> red5.p12 -name red5 -certfile ca/ca.cert.pem
> #check return code, exit on error
> #exit on no file  red5.crt
>
> #Need permissive type?? Some avc on next line need permissive type for
> secadm_java_t (it transistions)
> keytool -importkeystore -srcstorepass changeit -srckeystore red5.p12
> -srcstoretype PKCS12 -deststorepass changeit -destkeystore
> keystore.jks -alias red5
>
> keytool -import -alias root -keystore keystore.jks -trustcacerts -file
> ca/ca.cert.pem
> #^ keystorepass changeit no good, need expect script instead
>
> cp keystore.jks ../conf
> cp keystore.jks ../conf/truststore.jks
> #Rename the existing keystore file red5/conf/keystore.jmx to
> red5/conf/keystore.bak
> #mv ${RED5_HOME}/conf/keystore.jmx ${RED5_HOME}/conf/keystore.bak
> #Rename the existing truststore file red5/conf/truststore.jmx to
> red5/conf/truststore.bak
> #mv ${RED5_HOME}/conf/truststore.jmx ${RED5_HOME}/conf/truststore.bak
>
> cd ${RED5_HOME}
> #twizzle red5/conf/jee-container.xml line 33 SSL add <!--
> sed -i '33s/^/\<\!--/' conf/jee-container.xml
> #twizzle red5/conf/jee-container.xml line 71 SSL add -->
> sed -i '71s/^/--\>/' conf/jee-container.xml
> #twizzle red5/conf/jee-container.xml line 73 SSL remove <!--
> sed -i '73s/.*//' conf/jee-container.xml
> #twizzle red5/conf/jee-container.xml line 132 SSL remove -->
> sed -i '132s/.*//' conf/jee-container.xml
> #twizzle red5/conf/red5-core.xml line 198 add -->
> sed -i '198s/^/--\>/' conf/red5-core.xml
> #twizzle red5/conf/red5-core.xml line 234 remove -->
> sed -i '234s/.*//' conf/red5-core.xml
>
> sed -i 's/password/changeit/' conf/red5.properties
> ## trustAnchors parameter must be non empty



-- 
WBR
Maxim aka solomax

Reply via email to