certbot/server-ca
Peter Eckersley 84eb5058c6 Disable raw IPv6 addresses by default
(they're scarier than I thought, and a bit dangerous in Web and maybe Windows
shell contexts)
2012-08-06 15:27:05 -07:00
..
blacklisting notes on future blacklist import speedups 2012-07-18 17:08:35 -07:00
demoCA some .gitignore files to suppress display of generated files in git 2012-07-14 13:49:58 -07:00
sni_challenge Added code to auto-configure the Apache server for SNI challenges 2012-08-01 19:31:21 -04:00
.gitignore some .gitignore files to suppress display of generated files in git 2012-07-14 13:49:58 -07:00
blacklists.py updated modulus blacklisting stuff 2012-07-17 00:33:45 -07:00
CA.sh correctly emit subject alternative names and remove most user-supplied data from cert 2012-07-13 22:50:58 -07:00
chocolate.py Disable raw IPv6 addresses by default 2012-08-06 15:27:05 -07:00
chocolate_protocol.proto support for distributing certificate chain file 2012-07-20 18:37:47 -07:00
clear-db.py script for clearing out Redis databae 2012-07-12 16:29:54 -07:00
CONFIG.py add cert_chain_file config option 2012-07-20 16:43:18 -07:00
CSR.py min_key_size → min_keysize 2012-07-19 23:22:52 -07:00
daemon.py have daemon send a pubsub message to itself to achieve prompt clean shutdowns 2012-07-20 23:54:58 -07:00
hashcash.py sorry, this one adds the previous commit about hashcash being dangerous...previous adds a symlink so clients can use it...grrr git is a mess within a mess 2012-07-17 21:11:38 -04:00
Makefile we're using git pull rather than scp/rsync to deploy now 2012-07-14 14:56:30 -07:00
README Slight update to README 2012-08-01 14:23:25 -04:00
REDIS moving everything server-side to server-ca directory 2012-07-06 14:45:26 -07:00
redis_lock.py implementation of Redis-mediated lock in Python 2012-07-14 22:54:19 -07:00

In this directory is a reference CA implementation of the Chocolate protocol,
DV and signing mechanism.

Instead of using "make deploy", we're currently using git pull to deploy this.
This requires restarting lighttpd on the server and ensuring that Redis and
a copy of daemon.py are running there.  If the .proto definition has
changed, it also needs to be recompiled on both the server and the client.



chocolate.py - server-side, requires web.py (python-webpy),
        PyCrypto (python-crypto) 2.3 (not 2.1!!), redis, python-redis,
        python-protobuf, "M3Crypto" (from our own tree) (hence also
	build-essential, python-dev, and swig)
	probably wants to run under a web server like lighttpd with fastcgi


chocolate_protocol.proto - protocol definition; needs protobuf-compiler

sni_challenge -
	Assumes Apache server with name based virtual hosts is running 
	(for intended address).
	Call perform_sni_cert_challenge(address, r, nonce) to verify the 
	server.
	Example code is given in main method
	Right now requires full path specification of CSR/KEY in the Global 
	Variables (how should this be specified?)
        requires python-socksipy, tor