From mboxrd@z Thu Jan 1 00:00:00 1970 Authentication-Results: mail.toke.dk; spf=pass (mailfrom) smtp.mailfrom=irif.fr (client-ip=2001:660:3301:8000::1:2; helo=korolev.univ-paris7.fr; envelope-from=jch@irif.fr; receiver=) Authentication-Results: mail.toke.dk; dkim=pass (2048-bit key; unprotected) header.d=irif.fr header.i=@irif.fr header.a=rsa-sha256 header.s=dkim-irif header.b=cyc3fKBS Received: from korolev.univ-paris7.fr (korolev.univ-paris7.fr [IPv6:2001:660:3301:8000::1:2]) by mail.toke.dk (Postfix) with ESMTPS id B802AA48B06 for ; Wed, 20 Dec 2023 14:57:58 +0100 (CET) Received: from mailhub.math.univ-paris-diderot.fr (mailhub.math.univ-paris-diderot.fr [81.194.30.253]) by korolev.univ-paris7.fr (8.14.4/8.14.4/relay1/82085) with ESMTP id 3BKDvw8k025080; Wed, 20 Dec 2023 14:57:58 +0100 Received: from mailhub.math.univ-paris-diderot.fr (localhost [127.0.0.1]) by mailhub.math.univ-paris-diderot.fr (Postfix) with ESMTP id 8FCE854535; Wed, 20 Dec 2023 14:57:57 +0100 (CET) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=irif.fr; h= content-type:content-type:mime-version:user-agent:references :in-reply-to:subject:subject:from:from:message-id:date:date :received:received; s=dkim-irif; t=1703080676; x=1703944677; bh= j/q2pUjpV/2te3ZjU0NQu2G7oLWX403UAZHZxXVT7VI=; b=cyc3fKBSFzIe71as Pam180tK86A2n9Ax/uD3PfBs69ypBKHvWVYU1DH4e+F54n9JGXqEcfIU0Xs/IlU/ n5343BmWgFNx3g2x6gSvzwKMydZYVZNZajzhmhdpXkqmX4qInJ5KcYTwMi8RP9op Tks0ChgVBXVwnbqho7I12m5UP4j1X2GRX+6bLu7hm0jMJiZCHspa0aMp7vv7Z0TP HIyh+6vGII+QEzEHyBL/6lwWVspmyAP6Zh6eSBg7G1NGksOVnhkXO0OeACwb4S1U G+5dvm1eMO6AFlVcAbkznPNjFjx+GUZ0aY/+XiqyeTDoWT2MpfjuFeQUSTBkbmfS OxfZow== X-Virus-Scanned: amavisd-new at math.univ-paris-diderot.fr Received: from mailhub.math.univ-paris-diderot.fr ([127.0.0.1]) by mailhub.math.univ-paris-diderot.fr (mailhub.math.univ-paris-diderot.fr [127.0.0.1]) (amavisd-new, port 10023) with ESMTP id exmktJ-ZjHqH; Wed, 20 Dec 2023 14:57:56 +0100 (CET) Received: from pirx.irif.fr (unknown [78.194.40.74]) (Authenticated sender: jch) by mailhub.math.univ-paris-diderot.fr (Postfix) with ESMTPSA id 9902C542E0; Wed, 20 Dec 2023 14:57:55 +0100 (CET) Date: Wed, 20 Dec 2023 14:57:55 +0100 Message-ID: <875y0t0ye4.wl-jch@irif.fr> From: Juliusz Chroboczek To: KOS In-Reply-To: References: User-Agent: Wanderlust/2.15.9 (Almost Unreal) Emacs/29.1 Mule/6.0 MIME-Version: 1.0 (generated by SEMI-EPG 1.14.7 - "Harue") Content-Type: text/plain; charset=US-ASCII X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.2.7 (korolev.univ-paris7.fr [194.254.61.138]); Wed, 20 Dec 2023 14:57:58 +0100 (CET) X-Miltered: at korolev with ID 6582F2E6.000 by Joe's j-chkmail (http : // j-chkmail dot ensmp dot fr)! X-j-chkmail-Enveloppe: 6582F2E6.000 from mailhub.math.univ-paris-diderot.fr/mailhub.math.univ-paris-diderot.fr/null/mailhub.math.univ-paris-diderot.fr/ X-j-chkmail-Score: MSGID : 6582F2E6.000 on korolev.univ-paris7.fr : j-chkmail score : . : R=. U=. O=. B=0.000 -> S=0.000 X-j-chkmail-Status: Ham Message-ID-Hash: UN5VB2GBIKHYBHRGB4ZS5SWYOSM6TP4E X-Message-ID-Hash: UN5VB2GBIKHYBHRGB4ZS5SWYOSM6TP4E X-MailFrom: jch@irif.fr X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header CC: galene@lists.galene.org X-Mailman-Version: 3.3.9 Precedence: list Subject: [Galene] Re: Message from KOS List-Id: =?utf-8?q?Gal=C3=A8ne_videoconferencing_server_discussion_list?= Archived-At: List-Archive: List-Help: List-Owner: List-Post: List-Subscribe: List-Unsubscribe: > I have compiled Galene for Windows 10 and it works perfectly. Thanks so > much about this amazing and lightweight program! Thanks for the kind words. > The problem is that when the Galene server restarts, a new self-signed > certificate is created (probably) and all the family members have to > accept again the new certificate in their browsers. > Is there any way to make this certificate sticky in Galene, so that no new > certificate is generated on every Galene server restart? Just generate a self-sigend certificate, and put it in the "data" directory. If you have a copy of openssl, chdir into the data directory, then do: openssl req -newkey rsa:2048 -nodes -keyout key.pem -x509 -days 365 -out cert.pem If you don't have openssl, the simplest is probably to use the "generate_cert.go" program, which is included in the Go distribution under "src/rypto/tls". You may download a copy here: https://github.com/golang/go/raw/master/src/crypto/tls/generate_cert.go -- Juliusz