openbsd-ports/security/stunnel/patches/patch-tools_stunnel_conf-sample_in

43 lines
1.5 KiB
Plaintext
Raw Normal View History

--- tools/stunnel.conf-sample.in.orig Sun Jul 24 06:51:56 2011
+++ tools/stunnel.conf-sample.in Wed Sep 7 12:06:13 2011
@@ -8,10 +8,10 @@
; A copy of some devices and system files is needed within the chroot jail
; Chroot conflicts with configuration file reload and many other features
2006-03-23 10:49:53 -05:00
-chroot = @prefix@/var/lib/stunnel/
+chroot = /var/stunnel/
; Chroot jail can be escaped if setuid option is not used
-setuid = nobody
2006-09-27 11:30:10 -04:00
-setgid = @DEFAULT_GROUP@
+setuid = _stunnel
+setgid = _stunnel
; PID is created inside the chroot jail
pid = /stunnel.pid
@@ -25,8 +25,8 @@ pid = /stunnel.pid
; *****************************************************************************
; Certificate/key is needed in server mode and optional in client mode
-cert = @prefix@/etc/stunnel/mail.pem
-;key = @prefix@/etc/stunnel/mail.pem
+cert = @sysconfdir@/ssl/stunnel.pem
+;key = @sysconfdir@/ssl/private/stunnel.key
; Authentication stuff needs to be configured to prevent MITM attacks
; It is not enabled by default!
@@ -35,12 +35,12 @@ cert = @prefix@/etc/stunnel/mail.pem
2005-10-22 14:00:32 -04:00
; CApath is located inside chroot jail
2004-12-27 03:24:44 -05:00
;CApath = /certs
2005-10-22 14:00:32 -04:00
; It's often easier to use CAfile
2004-12-27 03:24:44 -05:00
-;CAfile = @prefix@/etc/stunnel/certs.pem
2009-05-28 14:08:49 -04:00
+;CAfile = @sysconfdir@/ssl/cert.pem
2005-10-22 14:00:32 -04:00
; Don't forget to c_rehash CRLpath
; CRLpath is located inside chroot jail
2004-12-27 03:24:44 -05:00
;CRLpath = /crls
; Alternatively CRLfile can be used
2004-12-27 03:24:44 -05:00
-;CRLfile = @prefix@/etc/stunnel/crls.pem
+;CRLfile = @sysconfdir@/ssl/crls.pem
; Disable support for insecure SSLv2 protocol
options = NO_SSLv2