diff --git a/docs/ikev2-howto-zh.md b/docs/ikev2-howto-zh.md index 8892504..fffa09a 100644 --- a/docs/ikev2-howto-zh.md +++ b/docs/ikev2-howto-zh.md @@ -610,7 +610,7 @@ sudo chmod 600 ikev2vpnca.cer vpnclient.cer vpnclient.key certutil -z <(head -c 1024 /dev/urandom) \ -S -x -n "IKEv2 VPN CA" \ -s "O=IKEv2 VPN,CN=IKEv2 VPN CA" \ - -k rsa -v 120 \ + -k rsa -g 3072 -v 120 \ -d sql:/etc/ipsec.d -t "CT,," -2 ``` @@ -632,7 +632,7 @@ sudo chmod 600 ikev2vpnca.cer vpnclient.cer vpnclient.key certutil -z <(head -c 1024 /dev/urandom) \ -S -c "IKEv2 VPN CA" -n "$PUBLIC_IP" \ -s "O=IKEv2 VPN,CN=$PUBLIC_IP" \ - -k rsa -v 120 \ + -k rsa -g 3072 -v 120 \ -d sql:/etc/ipsec.d -t ",," \ --keyUsage digitalSignature,keyEncipherment \ --extKeyUsage serverAuth \ @@ -653,7 +653,7 @@ sudo chmod 600 ikev2vpnca.cer vpnclient.cer vpnclient.key certutil -z <(head -c 1024 /dev/urandom) \ -S -c "IKEv2 VPN CA" -n "vpnclient" \ -s "O=IKEv2 VPN,CN=vpnclient" \ - -k rsa -v 120 \ + -k rsa -g 3072 -v 120 \ -d sql:/etc/ipsec.d -t ",," \ --keyUsage digitalSignature,keyEncipherment \ --extKeyUsage serverAuth,clientAuth -8 "vpnclient" diff --git a/docs/ikev2-howto.md b/docs/ikev2-howto.md index 98f5227..6c59122 100644 --- a/docs/ikev2-howto.md +++ b/docs/ikev2-howto.md @@ -612,7 +612,7 @@ The following example shows how to manually configure IKEv2 with Libreswan. Comm certutil -z <(head -c 1024 /dev/urandom) \ -S -x -n "IKEv2 VPN CA" \ -s "O=IKEv2 VPN,CN=IKEv2 VPN CA" \ - -k rsa -v 120 \ + -k rsa -g 3072 -v 120 \ -d sql:/etc/ipsec.d -t "CT,," -2 ``` @@ -634,7 +634,7 @@ The following example shows how to manually configure IKEv2 with Libreswan. Comm certutil -z <(head -c 1024 /dev/urandom) \ -S -c "IKEv2 VPN CA" -n "$PUBLIC_IP" \ -s "O=IKEv2 VPN,CN=$PUBLIC_IP" \ - -k rsa -v 120 \ + -k rsa -g 3072 -v 120 \ -d sql:/etc/ipsec.d -t ",," \ --keyUsage digitalSignature,keyEncipherment \ --extKeyUsage serverAuth \ @@ -655,7 +655,7 @@ The following example shows how to manually configure IKEv2 with Libreswan. Comm certutil -z <(head -c 1024 /dev/urandom) \ -S -c "IKEv2 VPN CA" -n "vpnclient" \ -s "O=IKEv2 VPN,CN=vpnclient" \ - -k rsa -v 120 \ + -k rsa -g 3072 -v 120 \ -d sql:/etc/ipsec.d -t ",," \ --keyUsage digitalSignature,keyEncipherment \ --extKeyUsage serverAuth,clientAuth -8 "vpnclient" diff --git a/extras/ikev2setup.sh b/extras/ikev2setup.sh index 9cf8454..8e2c693 100755 --- a/extras/ikev2setup.sh +++ b/extras/ikev2setup.sh @@ -646,12 +646,12 @@ EOF create_client_cert() { bigecho2 "Generating client certificate..." - sleep $((RANDOM % 3 + 1)) + sleep 1 certutil -z <(head -c 1024 /dev/urandom) \ -S -c "IKEv2 VPN CA" -n "$client_name" \ -s "O=IKEv2 VPN,CN=$client_name" \ - -k rsa -v "$client_validity" \ + -k rsa -g 3072 -v "$client_validity" \ -d sql:/etc/ipsec.d -t ",," \ --keyUsage digitalSignature,keyEncipherment \ --extKeyUsage serverAuth,clientAuth -8 "$client_name" >/dev/null 2>&1 || exiterr "Failed to create client certificate." @@ -923,20 +923,20 @@ create_ca_server_certs() { certutil -z <(head -c 1024 /dev/urandom) \ -S -x -n "IKEv2 VPN CA" \ -s "O=IKEv2 VPN,CN=IKEv2 VPN CA" \ - -k rsa -v 120 \ + -k rsa -g 3072 -v 120 \ -d sql:/etc/ipsec.d -t "CT,," -2 >/dev/null 2>&1 <