You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 2 Next »

How to use SSL with the Solaris agent:

 

  1. Install Stunnel on Solaris.
  2. Install the agent on Solaris.
  3. Run the command to see the executed script: inetadm -l /network/uptimeagent/tcp | fgrep exec
  4. Run the command to update the executed script for the agent: inetadm -m /network/uptimeagent/tcp exec="/usr/sbin/stunnel /usr/local/etc/stunnel/uptimeagent.conf" where /usr/sbin/stunnel is the path to the stunnel executable and /usr/local/etc/stunnel/uptimeagent.conf is the path to the uptimeagent.conf built for stunnel to use.
  5. Run the command to see that the executed script has been changed: inetadm -l /network/uptimeagent/tcp | fgrep exec
  6. Create the certificate that will be used by Stunnel.  For example:
openssl req -new -x509 -days 365 -nodes -config stunnel.cnf -out stunnel.pem -keyout stunnel.pem

The following is a sample stunnel.cnf for the openssl program:

# create RSA certs - ServerRANDFILE = stunnel.rnd[ req ]default_bits = 1024encrypt_key = yesdistinguished_name = req_dnx509_extensions = cert_type[ req_dn ]countryName = Country Name (2 letter code)countryName_default             = PLcountryName_min                 = 2countryName_max                 = 2stateOrProvinceName             = State or Province Name (full name)stateOrProvinceName_default     = Some-StatelocalityName                    = Locality Name (eg, city)0.organizationName              = Organization Name (eg, company)0.organizationName_default      = Stunnel Developers LtdorganizationalUnitName          = Organizational Unit Name (eg, section)#organizationalUnitName_default =0.commonName                    = Common Name (FQDN of your server)0.commonName_default            = localhost# To create a certificate for more than one name uncomment:# 1.commonName                  = DNS alias of your server# 2.commonName                  = DNS alias of your server# ...# See http://home.netscape.com/eng/security/ssl_2.0_certificate.html# to see how Netscape understands commonName.[ cert_type ]nsCertType = server

 

7.  Copy stunnel.pem to <stunnel install directory>/uptimeagent.pem

 

8.  Create the uptimeagent.conf  with the following lines in the stunnel install directory:

 

cert=/etc/stunnel/uptimeagent.pemexec=/opt/uptime-agent/bin/uptimeagent

 

  • No labels