|
@@ -337,13 +337,14 @@ function regenerate_ssh_host_keys {
|
337
|
337
|
function regenerate_dh_keys {
|
338
|
338
|
if [[ $REGENERATE_DH_KEYS == "yes" ]]; then
|
339
|
339
|
if [ ! -d /etc/ssl/mycerts ]; then
|
|
340
|
+ echo 'No dhparam certificates were found'
|
340
|
341
|
return
|
341
|
342
|
fi
|
342
|
343
|
|
343
|
344
|
data=$(tempfile 2>/dev/null)
|
344
|
345
|
trap "rm -f $data" 0 1 2 5 15
|
345
|
346
|
dialog --backtitle "Freedombone Security Configuration" \
|
346
|
|
- --radiolist "Select a key length:" 10 40 2 \
|
|
347
|
+ --radiolist "Select a Diffie-Hellman key length. The smaller length is better suited to low power systems:" 12 40 2 \
|
347
|
348
|
1 "1024 bits" off \
|
348
|
349
|
2 "3072 bits" on 2> $data
|
349
|
350
|
sel=$?
|
|
@@ -356,15 +357,18 @@ function regenerate_dh_keys {
|
356
|
357
|
2) DH_KEYLENGTH=3072;;
|
357
|
358
|
esac
|
358
|
359
|
|
|
360
|
+ ctr=0
|
359
|
361
|
for file in /etc/ssl/mycerts/*
|
360
|
362
|
do
|
361
|
363
|
if [[ -f $file ]]; then
|
362
|
364
|
filename=/etc/ssl/certs/$(echo $file | awk -F '/etc/ssl/mycerts/' '{print $2}' | awk -F '.crt' '{print $1}').dhparam
|
363
|
365
|
if [ -f $filename ]; then
|
364
|
366
|
openssl dhparam -check -text -5 $DH_KEYLENGTH -out $filename
|
|
367
|
+ ctr=$((ctr + 1))
|
365
|
368
|
fi
|
366
|
369
|
fi
|
367
|
370
|
done
|
|
371
|
+ echo "$ctr dhparam certificates were regenerated"
|
368
|
372
|
fi
|
369
|
373
|
}
|
370
|
374
|
|