View Single Post
Old 09-13-2020, 04:32 PM   #12
DNSB
Bibliophagist
DNSB ought to be getting tired of karma fortunes by now.DNSB ought to be getting tired of karma fortunes by now.DNSB ought to be getting tired of karma fortunes by now.DNSB ought to be getting tired of karma fortunes by now.DNSB ought to be getting tired of karma fortunes by now.DNSB ought to be getting tired of karma fortunes by now.DNSB ought to be getting tired of karma fortunes by now.DNSB ought to be getting tired of karma fortunes by now.DNSB ought to be getting tired of karma fortunes by now.DNSB ought to be getting tired of karma fortunes by now.DNSB ought to be getting tired of karma fortunes by now.
 
DNSB's Avatar
 
Posts: 47,107
Karma: 169815798
Join Date: Jul 2010
Location: Vancouver
Device: Kobo Sage, Libra Colour, Lenovo M8 FHD, Paperwhite 4, Tolino epos
Quote:
Originally Posted by Elektron View Post
thanks Ill check it out
EDIT: Where is /etc/cert/ca.pem and how do I "provide" it?
Code:
ca_cert="/etc/cert/ca.pem"
It lives in the Linux system partition on your Kobo ereader though as far as I recall, the cert directory does not exist by default. You could generate a KoboRoot.tgz file with that certificate in it and install it that way or use FTP to transfer it. One question is if you will need the CA cert and if you can set it as not needed, if you are going to be comfortable with chaining the certs together (I used OpenSSL to handle that task when I was playing with this). In our corporate case, we did not need the CA cert but you did need to get the client certificate from IT. I've added a sample what wpa_supplicant.conf looked like in one test:
Code:
identity=ABCDEFGHIJ123@xxxxxyyyy.ca
password=alpha/numeric/symbol/etc
client_cert="/etc/ssl/ABCDEFGHIJ123@xxxxxyyyy.ca.p12"
ca_cert="/etc/ssl/cacert.pem"
private_key="/etc/ssl/ABCDEFGHIJ123@xxxxxyyyy.ca.key"
private_key_passwd==passwordsuppliedbyIT
system_ca-certs=false
Note that I used /etc/ssl/ insteadl of /etc/cert/.
DNSB is offline   Reply With Quote