Older libvirt versions still only work if 'encryption_key' is enabled
in the server and client certificates. Add a note.
Suggested-by: Daniel P. Berrangé <berrange(a)redhat.com>
Signed-off-by: Sebastian Mitterle <smitterl(a)redhat.com>
---
docs/kbase/tlscerts.rst | 12 ++++++++++++
1 file changed, 12 insertions(+)
diff --git a/docs/kbase/tlscerts.rst b/docs/kbase/tlscerts.rst
index 5a1cb4be0d..2104e7a88b 100644
--- a/docs/kbase/tlscerts.rst
+++ b/docs/kbase/tlscerts.rst
@@ -104,6 +104,18 @@ connect provided they have a valid certificate issued by the CA for
their own IP
address. You may want to change this to make it less (or more) permissive,
depending on your needs.
+The following sections will describe how to created the data needed for the TLS
+setup. They use templates to create Certificate Authority, server and client
+certificates.
+
+Important: versions of libvirt before 11.6.0 also required the ``encryption_key``
+flag in the server and client template. This is no longer mandated since it is
+not applicable for use with many modern cryptographic algorithms, but it is
+harmless if present as it will be ignored. If compatibility with both old and
+new libvirt versions is required, then this extra flag must be added when
+creating the certificate.
+
+
Setting up a Certificate Authority (CA)
---------------------------------------
--
2.50.1
Show replies by date