Cleaning up markdown formatting

Eugene Pirogov 2019-12-09 00:00:30 +02:00
parent 03729a980c
commit 9d8268e153
1 changed files with 24 additions and 12 deletions

36
SSL.md

@ -7,8 +7,8 @@
- Load the certificate in Personal store of the Local System (http://www.databasemart.com/howto/SQLoverssl/How_To_Import_Personal_Certificate_With_MMC.aspx)
- Copy the Hash/thumbprint of the certificate (http://msdn.microsoft.com/en-us/library/ms734695.aspx). Thumbprint will contain spaces. Copy thumbprint to clipboard as is.
### Enabling SSL in Sonarr
1. Go to Settings -> General
2. Show advanced options
3. Enable SSL, set the SSL port and certificate hash (Sonarr will remove all spaces from the hash as they are not required).
@ -17,7 +17,6 @@
6. Verify SSL connectivity
7. If Sonarr server is still not listening on SSL port, then follow the workaround mentioned in this [thread](http://stackoverflow.com/questions/14953132/iis-7-error-a-specified-logon-session-does-not-exist-it-may-already-have-been).
## Linux / OS X
### Limitations
@ -41,17 +40,23 @@ Mono doesn't support intermediate certificates, which results in a broken chain
3. Run pvk.exe via Command Prompt:
`pvk.exe -in yourdomain.key -topvk -nocrypt -out yourdomain.pvk`
```
pvk.exe -in yourdomain.key -topvk -nocrypt -out yourdomain.pvk
```
### LetsEncrypt Support - Converting key/cert to pvk on linux
1. Using OpenSSL >1.0.0 it should be possible to generate a .pvk using a .pem from LetsEncrypt
`openssl rsa -in privkey.pem -outform PVK -pvk-none -out yourdomain.pvk`
```
openssl rsa -in privkey.pem -outform PVK -pvk-none -out yourdomain.pvk
```
2. You will also need to generate a .cert from .pem
`openssl x509 -inform PEM -in cert.pem -outform DER -out yourdomain.crt`
```
openssl x509 -inform PEM -in cert.pem -outform DER -out yourdomain.crt
```
### Synology Only
_If you're not running Sonarr on a Synology, skip these steps_
@ -59,27 +64,34 @@ _If you're not running Sonarr on a Synology, skip these steps_
1. Place the SSL certificate **and** converted key in `pvk` format in `/volume1/@appstore/nzbdrone/var/`
2. Load the certificate with `httpcfg` (comes with mono) as `sc-nzbdrone`, the user that runs Sonarr:
`su sc-nzbdrone -c "/volume1/@appstore/mono/bin/httpcfg -add -port <SSL_PORT> -pvk yourdomain.pvk -cert yourdomain.crt"`
```
su sc-nzbdrone -c "/volume1/@appstore/mono/bin/httpcfg -add -port <SSL_PORT> -pvk yourdomain.pvk -cert yourdomain.crt"
```
*Replace `<SSL_PORT>` with the SSL port you set in Sonarr.*
3. Skip the importing step below as the pvk and cert have already been imported
### Importing
1. Load the certificate with `httpcfg` (comes with mono) with the user that runs Sonarr:
`httpcfg -add -port <SSL_PORT> -pvk yourdomain.pvk -cert yourdomain.crt`
Load the certificate with `httpcfg` (comes with mono) with the user that runs Sonarr:
*Replace `<SSL_PORT>` with the SSL port you set in Sonarr.*
```
httpcfg -add -port <SSL_PORT> -pvk yourdomain.pvk -cert yourdomain.crt
```
*Replace `<SSL_PORT>` with the SSL port you set in Sonarr.*
### Enabling SSL in Sonarr
1. Go to Settings -> General
2. Show advanced options
3. Enable SSL, set the SSL port
4. Save
5. Verify
## Generate a Self-signed Certificate ##
openssl genrsa -out yourdomain.key 2048
openssl req -new -x509 -key yourdomain.key -out yourdomain.crt -days 3650 -subj /CN=yourdomain
```
openssl genrsa -out yourdomain.key 2048
openssl req -new -x509 -key yourdomain.key -out yourdomain.crt -days 3650 -subj /CN=yourdomain
```