aboutsummaryrefslogtreecommitdiffstatshomepage
path: root/bin/OpenSim.ini.example
diff options
context:
space:
mode:
authorUbitUmarov2016-12-07 13:30:07 +0000
committerUbitUmarov2016-12-07 13:30:07 +0000
commit3a81642d979a84c5c2e666cb500e080d56f887ed (patch)
tree0f3302d414792ef3b3cb2046595561373f1ba19b /bin/OpenSim.ini.example
parentadd SSL certs validation options for robust to allow simple certificates, pos... (diff)
downloadopensim-SC-3a81642d979a84c5c2e666cb500e080d56f887ed.zip
opensim-SC-3a81642d979a84c5c2e666cb500e080d56f887ed.tar.gz
opensim-SC-3a81642d979a84c5c2e666cb500e080d56f887ed.tar.bz2
opensim-SC-3a81642d979a84c5c2e666cb500e080d56f887ed.tar.xz
add SSL certs validation options for regions to allow simple encriptation without any peer autentification using simple homemade (or even shared) certs.
Diffstat (limited to '')
-rw-r--r--bin/OpenSim.ini.example13
1 files changed, 13 insertions, 0 deletions
diff --git a/bin/OpenSim.ini.example b/bin/OpenSim.ini.example
index 4df6584..a4a6d0c 100644
--- a/bin/OpenSim.ini.example
+++ b/bin/OpenSim.ini.example
@@ -295,6 +295,19 @@
295 ;; default is false 295 ;; default is false
296 ; TelehubAllowLandmark = false 296 ; TelehubAllowLandmark = false
297 297
298
299 ;; SSL certificate validation options
300 ;; used also on contacting other peers that require SSL and we don't
301 ;; you should set this to false forcing all peers (like regions) to have valid certificates
302 ;; but you can allow selfsigned certificates or no official CA with next option true
303 ;# {NoVerifyCertChain} {} {do not verify SSL Cert Chain} {true false} true
304 ; NoVerifyCertChain = true
305
306 ;; you can also bypass the hostname or domain verification
307 ;# {NoVerifyCertHostname} {} {do not verify SSL Cert name versus peer name} {true false} true
308 ; NoVerifyCertHostname = true
309 ;; having both options true does provide encriptation, but low security
310 ;; possible enought for small grids, specially it not comercial
298 311
299[AccessControl] 312[AccessControl]
300 ;# {AllowedClients} {} {Bar (|) separated list of allowed clients} {} 313 ;# {AllowedClients} {} {Bar (|) separated list of allowed clients} {}