17cc3449d2cc0ce6796e71dccfb4ba4e67e72a1a
Open Autonomous Connection INS
This is the INS for our Open Autonomous Connection project.
Feel free to join our Discord.
License Notice
This project (OAC) is licensed under the Open Autonomous Public License (OAPL).
Third-party components:
- UnlegitLibrary is authored by the same copyright holder and is used here under a special agreement:
While UnlegitLibrary is generally distributed under the GNU GPLv3,
it is additionally licensed under OAPL exclusively for the OAC project.
Therefore, within OAC, the OAPL terms apply to UnlegitLibrary as well.
Bugs/Problems
In progress
TODO
Certificate generation for NetworkSystem
Creating Root-CA:
openssl genrsa -out myCA.key 4096
openssl req -x509 -new -nodes -key myCA.key -sha256 -days 3650 -out myCA.pem
myCA.key = private Key for CA (keep secret)
myCA.pem = public Root-Certificate for signing server and client certificates
Creating (DNS-/Web-)Server Certificate based on Root-CA:
openssl genrsa -out server.key 2048
openssl req -new -key server.key -out server.csr
openssl x509 -req -in server.csr -CA myCA.pem -CAkey myCA.key -CAcreateserial -out server.crt -days 825 -sha256
server.key = private Key for Server
server.crt = Server-Certificate signed by Root-CA
Optional: Creating Client Certificate based on Root-CA:
openssl genrsa -out client.key 2048
openssl req -new -key client.key -out client.csr
openssl x509 -req -in client.csr -CA myCA.pem -CAkey myCA.key -CAcreateserial -out client.crt -days 825 -sha256
client.key = private Key for Client
client.crt = Client-Certificate signed by Root-CA
Note
All certificate registrars require the Root CA to issue a server/client certificate
Description
Languages
HTML
43.4%
Roff
40.8%
Java
15.8%