add cert and key for pgw/pcrf

This commit is contained in:
Sukchan Lee 2017-08-16 22:58:12 +09:00
parent fccfb1aa2b
commit 75cdc9c077
21 changed files with 881 additions and 142 deletions

View File

@ -37,8 +37,12 @@ freeDiameter_DATA = \
support/freeDiameter/hss.conf \
support/freeDiameter/hss.key.pem \
support/freeDiameter/hss.cert.pem \
support/freeDiameter/dict_legacy_xml.conf \
support/freeDiameter/dict_gx.xml
support/freeDiameter/pgw.conf \
support/freeDiameter/pgw.key.pem \
support/freeDiameter/pgw.cert.pem \
support/freeDiameter/pcrf.conf \
support/freeDiameter/pcrf.key.pem \
support/freeDiameter/pcrf.cert.pem
install-data-hook:
$(MKDIR_P) $(prefix)/var/log

View File

@ -334,7 +334,9 @@ AC_CONFIG_FILES([test/Makefile])
AC_CONFIG_FILES([support/nextepc.conf])
AC_CONFIG_FILES([support/freeDiameter/mme.conf])
AC_CONFIG_FILES([support/freeDiameter/hss.conf])
AC_CONFIG_FILES([support/freeDiameter/dict_legacy_xml.conf])
AC_CONFIG_FILES([support/freeDiameter/pgw.conf])
AC_CONFIG_FILES([support/freeDiameter/pcrf.conf])
#AC_CONFIG_FILES([support/freeDiameter/dict_legacy_xml.conf])
AC_CONFIG_FILES([Makefile])
AC_OUTPUT

View File

@ -1,6 +1,21 @@
#define TRACE_MODULE _gx_init
#include "gx_lib.h"
#define CHECK_dict_search( _type, _criteria, _what, _result ) \
CHECK_FCT( fd_dict_search( fd_g_config->cnf_dict, (_type), (_criteria), (_what), (_result), ENOENT) );
struct dict_object *gx_application = NULL;
struct dict_object *gx_cmd_air = NULL;
struct dict_object *gx_cmd_aia = NULL;
int gx_dict_init(void)
{
application_id_t id = 16777238;
CHECK_dict_search( DICT_APPLICATION, APPLICATION_BY_ID, (void *)&id, &gx_application);
CHECK_dict_search( DICT_COMMAND, CMD_BY_NAME, "Credit-Control-Request", &gx_cmd_ccr);
CHECK_dict_search( DICT_COMMAND, CMD_BY_NAME, "Credit-Control-Answer", &gx_cmd_cca);
return 0;
}

22
lib/fd/gx/gx_lib.h Normal file
View File

@ -0,0 +1,22 @@
#ifndef __GX_LIB_H__
#define __GX_LIB_H__
#include "freeDiameter/freeDiameter-host.h"
#include "freeDiameter/libfdcore.h"
#ifdef __cplusplus
extern "C" {
#endif /* __cplusplus */
extern struct dict_object *gx_application;
extern struct dict_object *gx_cmd_ccr;
extern struct dict_object *gx_cmd_cca;
int gx_dict_init(void);
#ifdef __cplusplus
}
#endif /* __cplusplus */
#endif /* ! __GX_LIB_H__ */

View File

@ -3,7 +3,6 @@
#include "freeDiameter/freeDiameter-host.h"
#include "freeDiameter/libfdcore.h"
#include "freeDiameter/extension.h"
#ifdef __cplusplus
extern "C" {

View File

@ -1,19 +1,19 @@
-----BEGIN CERTIFICATE-----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MIIDHDCCAoWgAwIBAgIJAImkBUShxOkBMA0GCSqGSIb3DQEBBQUAMGgxFzAVBgNV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-----END CERTIFICATE-----

View File

@ -3,24 +3,24 @@ Certificate:
Version: 3 (0x2)
Serial Number: 2 (0x2)
Signature Algorithm: sha1WithRSAEncryption
Issuer: CN=ca.localdomain, C=FR, ST=BdR, L=Aix, O=fD, OU=Tests
Issuer: CN=ca.localdomain, C=KO, ST=Seoul, L=Nowon, O=NextEPC, OU=Tests
Validity
Not Before: Aug 3 04:54:20 2017 GMT
Not After : Aug 3 04:54:20 2018 GMT
Subject: C=FR, ST=BdR, O=fD, OU=Tests, CN=hss.localdomain
Not Before: Aug 16 13:40:41 2017 GMT
Not After : Aug 16 13:40:41 2018 GMT
Subject: C=KO, ST=Seoul, O=NextEPC, OU=Tests, CN=hss.localdomain
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public Key: (1024 bit)
Modulus (1024 bit):
00:bd:a9:08:9f:d5:53:42:bb:51:9e:61:98:4b:aa:
f1:71:c6:6a:30:3c:a5:45:76:9c:24:e4:55:cd:2a:
92:b1:97:79:00:22:12:75:14:29:4e:f1:9c:b1:a0:
59:27:6c:ca:7a:10:97:79:50:b3:f8:65:ca:ec:74:
b7:67:ae:99:e7:94:2a:87:1e:dd:e4:f6:37:54:bc:
17:28:e9:b3:aa:58:5a:b8:54:51:cd:f0:76:8e:56:
f6:90:de:c3:d4:e5:bb:66:66:ec:ca:87:65:74:d3:
90:28:0c:33:60:bd:13:cc:98:51:cb:a0:1b:2b:d9:
a9:b9:9b:da:cd:a4:3b:85:09
00:c1:7f:93:8b:fc:66:1b:f1:55:0b:4c:53:8f:9c:
b2:ac:76:46:75:dc:7a:2e:c9:cb:8c:11:64:ae:d0:
59:fe:19:3e:44:32:12:73:ec:06:78:cd:45:da:46:
2d:54:ca:e4:00:9e:a2:38:d9:84:07:16:46:bb:b1:
ad:60:dc:32:63:0a:3c:60:f8:9d:98:7c:3c:3a:83:
1d:ed:2b:d9:50:1b:91:e9:5a:c0:1b:96:b0:75:3b:
29:a7:ac:c9:7f:29:4f:3b:6b:f8:ab:24:be:13:dc:
83:aa:7c:45:8e:b9:d4:df:01:b7:74:07:11:3b:c6:
1f:23:f2:de:fc:eb:27:0d:6b
Exponent: 65537 (0x10001)
X509v3 extensions:
X509v3 Basic Constraints:
@ -28,33 +28,33 @@ Certificate:
Netscape Comment:
OpenSSL Generated Certificate
X509v3 Subject Key Identifier:
76:9D:60:37:35:54:58:87:D5:19:1C:64:8F:97:5A:99:99:60:27:7E
54:F8:A5:57:44:DC:AC:AE:F8:56:59:EC:FD:E5:2A:98:D7:2B:9A:4F
X509v3 Authority Key Identifier:
keyid:5F:B1:04:57:9E:2D:7F:81:BA:37:44:DD:E2:A5:69:B7:DA:6D:AC:C3
keyid:F3:7A:C1:F1:A8:53:AF:C7:88:6C:37:E2:EF:06:20:A9:62:24:2D:E0
Signature Algorithm: sha1WithRSAEncryption
31:2f:96:bb:26:84:78:27:12:a4:38:69:ea:13:16:dd:87:e2:
76:d7:46:49:2d:2c:7a:8c:58:bb:37:de:4a:35:d9:aa:98:bf:
0a:39:a3:1e:9c:91:73:92:71:a3:42:a8:b4:9a:f7:27:e0:3d:
1c:4e:6f:b6:00:29:50:de:c5:6a:8e:6a:bf:6c:6d:19:5f:2d:
28:6a:e1:43:89:da:78:70:f3:6c:1f:6e:19:a4:76:0e:ea:ae:
c4:9f:67:9c:a1:39:f0:2b:1f:6e:8d:cd:0a:f7:8e:d1:30:59:
af:fa:40:ba:97:6c:50:b5:8d:48:02:59:f4:bc:0e:65:c8:ce:
d8:2b
70:f1:2b:d9:68:0a:4c:73:66:b5:4a:e4:fb:11:40:a6:f1:ba:
79:2e:7b:8a:16:48:c8:28:17:63:c7:2a:03:1a:60:7c:24:d3:
ac:51:19:d7:10:2b:68:f0:f8:54:16:28:9f:62:ca:3b:f2:99:
51:10:91:da:e3:0e:98:d8:80:37:e7:de:13:f3:b6:f9:72:8d:
49:d5:4a:c9:fb:0a:c3:8f:56:ee:08:91:e0:aa:1d:51:b8:59:
de:cd:74:12:9e:44:8c:8a:ab:82:f5:05:58:3f:d4:70:d1:b5:
d8:a0:97:f2:48:a2:f1:10:a2:68:bf:91:e1:5d:82:fb:37:71:
38:f7
-----BEGIN CERTIFICATE-----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MIICsjCCAhugAwIBAgIBAjANBgkqhkiG9w0BAQUFADBoMRcwFQYDVQQDEw5jYS5s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-----END CERTIFICATE-----

View File

@ -231,7 +231,6 @@ LoadExtension = "@prefix@/lib/nextepc/dict_nasreq.so";
LoadExtension = "@prefix@/lib/nextepc/dict_dcca.so";
LoadExtension = "@prefix@/lib/nextepc/dict_dcca_3gpp.so";
LoadExtension = "@prefix@/lib/nextepc/dict_s6a.so";
#LoadExtension = "@prefix@/lib/nextepc/dict_legacy_xml.so" : "@prefix@/etc/freeDiameter/dict_legacy_xml.conf";
##############################################################

View File

@ -1,15 +1,15 @@
-----BEGIN RSA PRIVATE KEY-----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MIICXgIBAAKBgQDBf5OL/GYb8VULTFOPnLKsdkZ13HouycuMEWSu0Fn+GT5EMhJz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-----END RSA PRIVATE KEY-----

View File

@ -3,24 +3,24 @@ Certificate:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: sha1WithRSAEncryption
Issuer: CN=ca.localdomain, C=FR, ST=BdR, L=Aix, O=fD, OU=Tests
Issuer: CN=ca.localdomain, C=KO, ST=Seoul, L=Nowon, O=NextEPC, OU=Tests
Validity
Not Before: Aug 3 04:54:20 2017 GMT
Not After : Aug 3 04:54:20 2018 GMT
Subject: C=FR, ST=BdR, O=fD, OU=Tests, CN=mme.localdomain
Not Before: Aug 16 13:40:41 2017 GMT
Not After : Aug 16 13:40:41 2018 GMT
Subject: C=KO, ST=Seoul, O=NextEPC, OU=Tests, CN=mme.localdomain
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public Key: (1024 bit)
Modulus (1024 bit):
00:c4:63:4d:ba:fe:d3:64:d9:71:1c:b2:b0:60:57:
30:e2:8c:1e:0e:e2:a2:9f:f1:f0:db:59:0b:28:16:
6c:6e:c5:e3:fb:4a:7e:0b:9e:79:42:c3:67:af:3b:
e5:20:6b:5f:8f:ae:46:77:14:8d:1d:ab:87:94:a2:
11:83:a4:ad:5f:40:d7:e3:1e:c1:63:90:c1:96:5a:
44:80:af:5c:0b:0c:25:6d:7d:6f:60:bd:31:7c:d5:
60:f6:70:a6:3c:a9:e9:b1:6a:88:14:14:72:be:00:
04:af:67:43:48:95:b7:71:e8:2d:0d:e2:9d:87:d7:
6e:0e:9f:7d:fa:84:70:92:fb
00:c1:af:23:ba:b8:79:38:c2:47:12:94:3f:2a:6c:
0d:6b:46:6d:1e:12:16:9a:e2:fc:0d:8e:a8:3a:0a:
d7:21:14:8a:ef:d5:c5:b0:29:00:64:be:5e:66:a7:
50:7b:56:74:10:61:54:db:0f:ba:bc:39:1c:14:66:
39:b1:c5:43:75:60:b5:7e:ba:d7:bb:49:28:56:1d:
e2:f5:ef:de:74:d4:ce:df:e3:bf:09:1e:19:88:47:
9f:a4:8c:96:1e:a6:aa:00:a4:e3:76:fd:d3:0f:b8:
90:66:fd:14:96:d6:fc:92:b2:80:de:ca:93:54:fe:
19:57:90:e0:51:33:a1:59:2f
Exponent: 65537 (0x10001)
X509v3 extensions:
X509v3 Basic Constraints:
@ -28,33 +28,33 @@ Certificate:
Netscape Comment:
OpenSSL Generated Certificate
X509v3 Subject Key Identifier:
0A:97:EF:76:AD:81:D6:2E:52:A3:6F:6E:46:87:4B:55:A7:02:49:06
4B:02:5E:40:00:AF:E8:2D:0A:31:C3:73:28:65:19:9A:60:53:0E:28
X509v3 Authority Key Identifier:
keyid:5F:B1:04:57:9E:2D:7F:81:BA:37:44:DD:E2:A5:69:B7:DA:6D:AC:C3
keyid:F3:7A:C1:F1:A8:53:AF:C7:88:6C:37:E2:EF:06:20:A9:62:24:2D:E0
Signature Algorithm: sha1WithRSAEncryption
be:9a:d5:ed:80:f8:03:1f:1c:eb:f9:e2:40:6c:55:4c:72:47:
c5:0b:a6:27:5c:74:08:90:b5:a6:a0:f1:b6:39:be:f7:d5:1d:
8c:a6:fe:90:12:8f:a7:26:3a:d7:7a:bb:f7:b1:ed:82:21:87:
20:f8:d6:cb:f6:bc:82:1e:07:63:75:98:a4:98:6e:ca:19:03:
34:c0:28:d7:0b:b5:23:c8:71:f6:0f:df:2f:fd:17:03:06:f6:
91:47:7d:3c:85:a6:92:aa:fa:18:72:96:35:91:cd:4b:77:a5:
71:5d:22:d2:8d:1d:23:09:9b:29:05:0a:69:ea:96:e1:5e:f5:
a8:3f
45:0b:45:91:d4:91:32:45:48:23:5c:c2:cd:2d:f0:b9:36:41:
10:d5:34:d4:9a:0e:61:c4:39:d1:a6:87:04:bd:a4:27:01:9a:
2c:d8:0e:a9:4c:21:a7:dc:6b:2d:68:63:eb:50:f7:d3:c0:54:
ad:d4:cf:0a:c2:82:d2:1f:3c:61:86:58:72:74:ab:ef:29:1a:
33:73:9a:5e:75:78:46:21:58:3f:6d:5d:96:cc:ff:0b:d4:84:
8b:9e:f7:f8:77:5e:37:7e:48:c9:a3:b5:6f:61:b3:10:bf:42:
d2:2d:f7:5f:c4:15:96:65:6a:14:9d:c5:a1:0f:86:02:7a:14:
65:06
-----BEGIN CERTIFICATE-----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MIICsjCCAhugAwIBAgIBATANBgkqhkiG9w0BAQUFADBoMRcwFQYDVQQDEw5jYS5s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-----END CERTIFICATE-----

View File

@ -231,7 +231,6 @@ LoadExtension = "@prefix@/lib/nextepc/dict_nasreq.so";
LoadExtension = "@prefix@/lib/nextepc/dict_dcca.so";
LoadExtension = "@prefix@/lib/nextepc/dict_dcca_3gpp.so";
LoadExtension = "@prefix@/lib/nextepc/dict_s6a.so";
#LoadExtension = "@prefix@/lib/nextepc/dict_legacy_xml.so" : "@prefix@/etc/freeDiameter/dict_legacy_xml.conf";
##############################################################

View File

@ -1,15 +1,15 @@
-----BEGIN RSA PRIVATE KEY-----
MIICXAIBAAKBgQDEY026/tNk2XEcsrBgVzDijB4O4qKf8fDbWQsoFmxuxeP7Sn4L
nnlCw2evO+Uga1+PrkZ3FI0dq4eUohGDpK1fQNfjHsFjkMGWWkSAr1wLDCVtfW9g
vTF81WD2cKY8qemxaogUFHK+AASvZ0NIlbdx6C0N4p2H124On336hHCS+wIDAQAB
AoGBAIHC965SCA2/2wxSSVYu5l8apBXDzB6Q90uH52ZCgr0ixoPY8bXtrUPe51iS
489rAwZl6atvCdsL5pbgC2CHZAG/AFnxGXt2oblTgoPrraPo6Y2tvPuF8HaalqwC
0Vbc+8aljxrEqS+xaJVPvl99k0xNVZL7XE13KFNSvIZmUqpJAkEA4JVvYKHS9Erd
3ITuK9DLt16NF9y3mmlfQmZdLT7i7TxVtpBKWpcSAW3CC4VNZexrkPa3Wvj2QV+Q
+Mo082P0RQJBAN/cJfI7y+T0GVloxDCXez0Gu471LIPTESKlhh4uRhEC9rWPRtbn
Ny9dzwjfN1P7Cpfsg9450FryCMqqMBe//j8CQBQkkwbBvN/4TwnWSl5Xrc3WhyUa
wMTyqn6UG8tRFp1cifuD2YdigVTreTn7TMPVfphT6IIaTkvyvFf0GuexkVkCQDib
No02SayvfOl68IFJDMS1ux+/J25+JMsaB/wBv331veTTQhp9hRrZIc0ghKEbzeX0
zLOY8vLMWSTGPDsFNYkCQGW+bpdgKMg/KryiL/U1PT79XnntapRjUHtrmpnCyf4l
6KelVd4tNGhSNOShZW3bNsbvQwiXcgYf1fe56S0Yuko=
MIICXQIBAAKBgQDBryO6uHk4wkcSlD8qbA1rRm0eEhaa4vwNjqg6CtchFIrv1cWw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-----END RSA PRIVATE KEY-----

View File

@ -0,0 +1,60 @@
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 4 (0x4)
Signature Algorithm: sha1WithRSAEncryption
Issuer: CN=ca.localdomain, C=KO, ST=Seoul, L=Nowon, O=NextEPC, OU=Tests
Validity
Not Before: Aug 16 13:40:42 2017 GMT
Not After : Aug 16 13:40:42 2018 GMT
Subject: C=KO, ST=Seoul, O=NextEPC, OU=Tests, CN=pcrf.localdomain
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public Key: (1024 bit)
Modulus (1024 bit):
00:ae:71:a8:de:88:34:b7:44:e8:a4:03:9a:c5:d8:
34:25:af:e1:92:35:95:b6:10:34:94:51:7f:d6:4e:
12:2a:50:aa:aa:29:21:4b:ad:1a:35:94:12:37:82:
b1:4b:80:04:fd:59:ed:2a:98:e5:28:a8:7a:40:dc:
46:a2:16:57:66:c5:94:35:ce:f7:1e:ba:19:ae:bc:
70:05:5d:27:e3:12:31:ac:76:e5:57:bf:f9:56:e1:
5c:13:0c:bb:16:11:cc:73:97:f9:3c:7a:a7:d5:b5:
cc:24:ff:ab:53:6b:ce:66:c9:b8:cc:6e:0d:6b:81:
95:84:e5:ab:c4:b3:70:dc:0b
Exponent: 65537 (0x10001)
X509v3 extensions:
X509v3 Basic Constraints:
CA:FALSE
Netscape Comment:
OpenSSL Generated Certificate
X509v3 Subject Key Identifier:
2E:F7:30:CE:5B:68:2C:8D:58:1E:A0:23:16:14:70:F6:68:6E:05:C5
X509v3 Authority Key Identifier:
keyid:F3:7A:C1:F1:A8:53:AF:C7:88:6C:37:E2:EF:06:20:A9:62:24:2D:E0
Signature Algorithm: sha1WithRSAEncryption
53:4d:74:e1:a9:e5:15:5d:a2:d2:65:d9:06:3a:7e:1a:90:71:
a7:14:d6:82:a9:f5:1d:55:4b:5a:9b:ee:a4:68:e0:1c:42:88:
5e:89:39:77:6c:2a:46:55:37:b4:ac:ad:f7:f8:e3:05:6d:bc:
a8:4b:80:51:d2:7f:ab:bc:ae:d6:cd:24:94:b5:64:11:17:10:
28:93:05:34:1b:93:bf:fd:97:cd:0f:fd:0a:b1:1f:e7:00:17:
2b:49:03:6e:e4:62:57:b7:36:74:53:6c:7b:0f:85:49:56:88:
66:fd:af:9c:52:3a:8f:35:9e:2f:fd:47:16:be:f8:c0:cc:25:
6a:f2
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----

View File

@ -0,0 +1,267 @@
# This is a sample configuration file for freeDiameter daemon.
# Most of the options can be omitted, as they default to reasonable values.
# Only TLS-related options must be configured properly in usual setups.
# It is possible to use "include" keyword to import additional files
# e.g.: include "/etc/freeDiameter.d/*.conf"
# This is exactly equivalent as copy & paste the content of the included file(s)
# where the "include" keyword is found.
##############################################################
## Peer identity and realm
# The Diameter Identity of this daemon.
# This must be a valid FQDN that resolves to the local host.
# Default: hostname's FQDN
#Identity = "aaa.koganei.freediameter.net";
Identity = "pcrf.localdomain";
# The Diameter Realm of this daemon.
# Default: the domain part of Identity (after the first dot).
#Realm = "koganei.freediameter.net";
Realm = "localdomain";
##############################################################
## Transport protocol configuration
# The port this peer is listening on for incoming connections (TCP and SCTP).
# Default: 3868. Use 0 to disable.
#Port = 3868;
# The port this peer is listening on for incoming TLS-protected connections (TCP and SCTP).
# See TLS_old_method for more information about TLS flavours.
# Note: we use TLS/SCTP instead of DTLS/SCTP at the moment. This will change in future version of freeDiameter.
# Default: 5868. Use 0 to disable.
#SecPort = 5868;
# Use RFC3588 method for TLS protection, where TLS is negociated after CER/CEA exchange is completed
# on the unsecure connection. The alternative is RFC6733 mechanism, where TLS protects also the
# CER/CEA exchange on a dedicated secure port.
# This parameter only affects outgoing connections.
# The setting can be also defined per-peer (see Peers configuration section).
# Default: use RFC6733 method with separate port for TLS.
#TLS_old_method;
# Disable use of TCP protocol (only listen and connect over SCTP)
# Default : TCP enabled
#No_TCP;
# Disable use of SCTP protocol (only listen and connect over TCP)
# Default : SCTP enabled
#No_SCTP;
No_SCTP;
# This option is ignored if freeDiameter is compiled with DISABLE_SCTP option.
# Prefer TCP instead of SCTP for establishing new connections.
# This setting may be overwritten per peer in peer configuration blocs.
# Default : SCTP is attempted first.
#Prefer_TCP;
# Default number of streams per SCTP associations.
# This setting may be overwritten per peer basis.
# Default : 30 streams
#SCTP_streams = 30;
##############################################################
## Endpoint configuration
# Disable use of IP addresses (only IPv6)
# Default : IP enabled
#No_IP;
# Disable use of IPv6 addresses (only IP)
# Default : IPv6 enabled
#No_IPv6;
# Specify local addresses the server must bind to
# Default : listen on all addresses available.
#ListenOn = "202.249.37.5";
#ListenOn = "2001:200:903:2::202:1";
#ListenOn = "fe80::21c:5ff:fe98:7d62%eth0";
ListenOn = "10.1.35.218";
##############################################################
## Server configuration
# How many Diameter peers are allowed to be connecting at the same time ?
# This parameter limits the number of incoming connections from the time
# the connection is accepted until the first CER is received.
# Default: 5 unidentified clients in paralel.
#ThreadsPerServer = 5;
##############################################################
## TLS Configuration
# TLS is managed by the GNUTLS library in the freeDiameter daemon.
# You may find more information about parameters and special behaviors
# in the relevant documentation.
# http://www.gnu.org/software/gnutls/manual/
# Credentials of the local peer
# The X509 certificate and private key file to use for the local peer.
# The files must contain PKCS-1 encoded RSA key, in PEM format.
# (These parameters are passed to gnutls_certificate_set_x509_key_file function)
# Default : NO DEFAULT
#TLS_Cred = "<x509 certif file.PEM>" , "<x509 private key file.PEM>";
#TLS_Cred = "/etc/ssl/certs/freeDiameter.pem", "/etc/ssl/private/freeDiameter.key";
TLS_Cred = "@prefix@/etc/freeDiameter/pcrf.cert.pem", "@prefix@/etc/freeDiameter/pcrf.key.pem";
# Certificate authority / trust anchors
# The file containing the list of trusted Certificate Authorities (PEM list)
# (This parameter is passed to gnutls_certificate_set_x509_trust_file function)
# The directive can appear several times to specify several files.
# Default : GNUTLS default behavior
#TLS_CA = "<file.PEM>";
TLS_CA = "@prefix@/etc/freeDiameter/cacert.pem";
# Certificate Revocation List file
# The information about revoked certificates.
# The file contains a list of trusted CRLs in PEM format. They should have been verified before.
# (This parameter is passed to gnutls_certificate_set_x509_crl_file function)
# Note: openssl CRL format might have interoperability issue with GNUTLS format.
# Default : GNUTLS default behavior
#TLS_CRL = "<file.PEM>";
# GNU TLS Priority string
# This string allows to configure the behavior of GNUTLS key exchanges
# algorithms. See gnutls_priority_init function documentation for information.
# You should also refer to the Diameter required TLS support here:
# http://tools.ietf.org/html/rfc6733#section-13.1
# Default : "NORMAL"
# Example: TLS_Prio = "NONE:+VERS-TLS1.1:+AES-128-CBC:+RSA:+SHA1:+COMP-NULL";
#TLS_Prio = "NORMAL";
# Diffie-Hellman parameters size
# Set the number of bits for generated DH parameters
# Valid value should be 768, 1024, 2048, 3072 or 4096.
# (This parameter is passed to gnutls_dh_params_generate2 function,
# it usually should match RSA key size)
# Default : 1024
#TLS_DH_Bits = 1024;
# Alternatively, you can specify a file to load the PKCS#3 encoded
# DH parameters directly from. This accelerates the daemon start
# but is slightly less secure. If this file is provided, the
# TLS_DH_Bits parameters has no effect.
# Default : no default.
#TLS_DH_File = "<file.PEM>";
##############################################################
## Timers configuration
# The Tc timer of this peer.
# It is the delay before a new attempt is made to reconnect a disconnected peer.
# The value is expressed in seconds. The recommended value is 30 seconds.
# Default: 30
#TcTimer = 30;
# The Tw timer of this peer.
# It is the delay before a watchdog message is sent, as described in RFC 3539.
# The value is expressed in seconds. The default value is 30 seconds. Value must
# be greater or equal to 6 seconds. See details in the RFC.
# Default: 30
#TwTimer = 30;
##############################################################
## Applications configuration
# Disable the relaying of Diameter messages?
# For messages not handled locally, the default behavior is to forward the
# message to another peer if any is available, according to the routing
# algorithms. In addition the "0xffffff" application is advertised in CER/CEA
# exchanges.
# Default: Relaying is enabled.
#NoRelay;
# Number of server threads that can handle incoming messages at the same time.
# Default: 4
#AppServThreads = 4;
# Other applications are configured by loaded extensions.
##############################################################
## Extensions configuration
# The freeDiameter framework merely provides support for
# Diameter Base Protocol. The specific application behaviors,
# as well as advanced functions, are provided
# by loadable extensions (plug-ins).
# These extensions may in addition receive the name of a
# configuration file, the format of which is extension-specific.
#
# Format:
#LoadExtension = "/path/to/extension" [ : "/optional/configuration/file" ] ;
#
# Examples:
#LoadExtension = "extensions/sample.fdx";
#LoadExtension = "extensions/sample.fdx":"conf/sample.conf";
# Extensions are named as follow:
# dict_* for extensions that add content to the dictionary definitions.
# dbg_* for extensions useful only to retrieve more information on the framework execution.
# acl_* : Access control list, to control which peers are allowed to connect.
# rt_* : routing extensions that impact how messages are forwarded to other peers.
# app_* : applications, these extensions usually register callbacks to handle specific messages.
# test_* : dummy extensions that are useful only in testing environments.
# The dbg_msg_dump.fdx extension allows you to tweak the way freeDiameter displays some
# information about some events. This extension does not actually use a configuration file
# but receives directly a parameter in the string passed to the extension. Here are some examples:
## LoadExtension = "dbg_msg_dumps.fdx" : "0x1111"; # Removes all default hooks, very quiet even in case of errors.
## LoadExtension = "dbg_msg_dumps.fdx" : "0x2222"; # Display all events with few details.
## LoadExtension = "dbg_msg_dumps.fdx" : "0x0080"; # Dump complete information about sent and received messages.
# The four digits respectively control: connections, routing decisions, sent/received messages, errors.
# The values for each digit are:
# 0 - default - keep the default behavior
# 1 - quiet - remove any specific log
# 2 - compact - display only a summary of the information
# 4 - full - display the complete information on a single long line
# 8 - tree - display the complete information in an easier to read format spanning several lines.
LoadExtension = "dbg_msg_dumps.fdx" : "0x8888";
LoadExtension = "dict_rfc5777.fdx";
LoadExtension = "dict_mip6i.fdx";
LoadExtension = "dict_nas_mipv6.fdx";
LoadExtension = "@prefix@/lib/nextepc/dict_nasreq.so";
LoadExtension = "@prefix@/lib/nextepc/dict_dcca.so";
LoadExtension = "@prefix@/lib/nextepc/dict_dcca_3gpp.so";
#LoadExtension = "@prefix@/lib/nextepc/dict_legacy_xml.so" : "@prefix@/etc/freeDiameter/dict_legacy_xml.conf";
##############################################################
## Peers configuration
# The local server listens for incoming connections. By default,
# all unknown connecting peers are rejected. Extensions can override this behavior (e.g., acl_wl).
#
# In addition to incoming connections, the local peer can
# be configured to establish and maintain connections to some
# Diameter nodes and allow connections from these nodes.
# This is achieved with the ConnectPeer directive described below.
#
# Note that the configured Diameter Identity MUST match
# the information received inside CEA, or the connection will be aborted.
#
# Format:
#ConnectPeer = "diameterid" [ { parameter1; parameter2; ...} ] ;
# Parameters that can be specified in the peer's parameter list:
# No_TCP; No_SCTP; No_IP; No_IPv6; Prefer_TCP; TLS_old_method;
# No_TLS; # assume transparent security instead of TLS. DTLS is not supported yet (will change in future versions).
# Port = 5868; # The port to connect to
# TcTimer = 30;
# TwTimer = 30;
# ConnectTo = "202.249.37.5";
# ConnectTo = "2001:200:903:2::202:1";
# TLS_Prio = "NORMAL";
# Realm = "realm.net"; # Reject the peer if it does not advertise this realm.
# Examples:
#ConnectPeer = "aaa.wide.ad.jp";
#ConnectPeer = "old.diameter.serv" { TcTimer = 60; TLS_old_method; No_SCTP; Port=3868; } ;
ConnectPeer = "pgw.localdomain" { ConnectTo = "10.1.35.219"; No_TLS; };
##############################################################

View File

@ -0,0 +1,15 @@
-----BEGIN RSA PRIVATE KEY-----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-----END RSA PRIVATE KEY-----

View File

@ -0,0 +1,60 @@
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 3 (0x3)
Signature Algorithm: sha1WithRSAEncryption
Issuer: CN=ca.localdomain, C=KO, ST=Seoul, L=Nowon, O=NextEPC, OU=Tests
Validity
Not Before: Aug 16 13:40:42 2017 GMT
Not After : Aug 16 13:40:42 2018 GMT
Subject: C=KO, ST=Seoul, O=NextEPC, OU=Tests, CN=pgw.localdomain
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public Key: (1024 bit)
Modulus (1024 bit):
00:ae:d6:4d:b2:79:12:7d:84:56:8d:3e:ca:e5:3b:
b2:7d:68:cb:f7:0a:5a:ce:76:fe:b0:26:f1:91:ba:
90:50:f4:ba:41:ef:32:f9:fe:43:da:6d:0e:7d:66:
a3:8e:04:0c:a3:56:f2:7a:e4:73:ca:3e:e1:8e:50:
77:ce:3e:11:be:36:84:8e:63:c0:4e:c6:3d:f9:69:
c2:3e:21:a5:34:6e:f6:c7:31:30:d3:2f:1f:83:a9:
c3:53:93:81:9f:54:f6:5c:ec:8d:19:29:b4:7c:76:
90:0a:98:dd:a0:52:cf:0f:de:22:ec:d3:9d:4e:82:
4f:bd:4c:99:28:a9:07:62:61
Exponent: 65537 (0x10001)
X509v3 extensions:
X509v3 Basic Constraints:
CA:FALSE
Netscape Comment:
OpenSSL Generated Certificate
X509v3 Subject Key Identifier:
0E:7B:C8:6B:CC:82:7D:20:82:1E:3B:AB:5F:C5:0E:5E:E6:E1:80:9B
X509v3 Authority Key Identifier:
keyid:F3:7A:C1:F1:A8:53:AF:C7:88:6C:37:E2:EF:06:20:A9:62:24:2D:E0
Signature Algorithm: sha1WithRSAEncryption
94:f5:71:a5:6c:d2:29:18:2a:43:80:a0:39:b2:97:f0:62:d5:
16:a6:d3:34:9b:be:02:74:e4:23:25:d7:f9:25:23:83:a1:54:
6b:26:38:ef:22:7e:57:9c:1a:98:65:8b:f5:99:83:87:f8:7b:
2f:de:c3:cc:2b:e6:67:84:bf:b6:2d:86:86:49:d6:d8:17:39:
94:03:e6:77:48:75:79:87:d5:7a:27:8b:aa:6d:6d:c0:8a:8a:
d2:39:55:18:6c:1f:73:3b:fa:0b:3e:aa:6f:e0:0d:16:48:cc:
e2:b8:f0:5c:61:67:9e:0c:91:fc:62:d3:8a:62:af:5d:59:0f:
29:a6
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----

View File

@ -0,0 +1,268 @@
# This is a sample configuration file for freeDiameter daemon.
# Most of the options can be omitted, as they default to reasonable values.
# Only TLS-related options must be configured properly in usual setups.
# It is possible to use "include" keyword to import additional files
# e.g.: include "/etc/freeDiameter.d/*.conf"
# This is exactly equivalent as copy & paste the content of the included file(s)
# where the "include" keyword is found.
##############################################################
## Peer identity and realm
# The Diameter Identity of this daemon.
# This must be a valid FQDN that resolves to the local host.
# Default: hostname's FQDN
#Identity = "aaa.koganei.freediameter.net";
Identity = "pgw.localdomain";
# The Diameter Realm of this daemon.
# Default: the domain part of Identity (after the first dot).
#Realm = "koganei.freediameter.net";
Realm = "localdomain";
##############################################################
## Transport protocol configuration
# The port this peer is listening on for incoming connections (TCP and SCTP).
# Default: 3868. Use 0 to disable.
#Port = 3868;
# The port this peer is listening on for incoming TLS-protected connections (TCP and SCTP).
# See TLS_old_method for more information about TLS flavours.
# Note: we use TLS/SCTP instead of DTLS/SCTP at the moment. This will change in future version of freeDiameter.
# Default: 5868. Use 0 to disable.
#SecPort = 5868;
# Use RFC3588 method for TLS protection, where TLS is negociated after CER/CEA exchange is completed
# on the unsecure connection. The alternative is RFC6733 mechanism, where TLS protects also the
# CER/CEA exchange on a dedicated secure port.
# This parameter only affects outgoing connections.
# The setting can be also defined per-peer (see Peers configuration section).
# Default: use RFC6733 method with separate port for TLS.
#TLS_old_method;
# Disable use of TCP protocol (only listen and connect over SCTP)
# Default : TCP enabled
#No_TCP;
# Disable use of SCTP protocol (only listen and connect over TCP)
# Default : SCTP enabled
#No_SCTP;
No_SCTP;
# This option is ignored if freeDiameter is compiled with DISABLE_SCTP option.
# Prefer TCP instead of SCTP for establishing new connections.
# This setting may be overwritten per peer in peer configuration blocs.
# Default : SCTP is attempted first.
#Prefer_TCP;
# Default number of streams per SCTP associations.
# This setting may be overwritten per peer basis.
# Default : 30 streams
#SCTP_streams = 30;
##############################################################
## Endpoint configuration
# Disable use of IP addresses (only IPv6)
# Default : IP enabled
#No_IP;
# Disable use of IPv6 addresses (only IP)
# Default : IPv6 enabled
#No_IPv6;
# Specify local addresses the server must bind to
# Default : listen on all addresses available.
#ListenOn = "202.249.37.5";
#ListenOn = "2001:200:903:2::202:1";
#ListenOn = "fe80::21c:5ff:fe98:7d62%eth0";
ListenOn = "10.1.35.219";
##############################################################
## Server configuration
# How many Diameter peers are allowed to be connecting at the same time ?
# This parameter limits the number of incoming connections from the time
# the connection is accepted until the first CER is received.
# Default: 5 unidentified clients in paralel.
#ThreadsPerServer = 5;
##############################################################
## TLS Configuration
# TLS is managed by the GNUTLS library in the freeDiameter daemon.
# You may find more information about parameters and special behaviors
# in the relevant documentation.
# http://www.gnu.org/software/gnutls/manual/
# Credentials of the local peer
# The X509 certificate and private key file to use for the local peer.
# The files must contain PKCS-1 encoded RSA key, in PEM format.
# (These parameters are passed to gnutls_certificate_set_x509_key_file function)
# Default : NO DEFAULT
#TLS_Cred = "<x509 certif file.PEM>" , "<x509 private key file.PEM>";
#TLS_Cred = "/etc/ssl/certs/freeDiameter.pem", "/etc/ssl/private/freeDiameter.key";
TLS_Cred = "@prefix@/etc/freeDiameter/pgw.cert.pem", "@prefix@/etc/freeDiameter/pgw.key.pem";
# Certificate authority / trust anchors
# The file containing the list of trusted Certificate Authorities (PEM list)
# (This parameter is passed to gnutls_certificate_set_x509_trust_file function)
# The directive can appear several times to specify several files.
# Default : GNUTLS default behavior
#TLS_CA = "<file.PEM>";
TLS_CA = "@prefix@/etc/freeDiameter/cacert.pem";
# Certificate Revocation List file
# The information about revoked certificates.
# The file contains a list of trusted CRLs in PEM format. They should have been verified before.
# (This parameter is passed to gnutls_certificate_set_x509_crl_file function)
# Note: openssl CRL format might have interoperability issue with GNUTLS format.
# Default : GNUTLS default behavior
#TLS_CRL = "<file.PEM>";
# GNU TLS Priority string
# This string allows to configure the behavior of GNUTLS key exchanges
# algorithms. See gnutls_priority_init function documentation for information.
# You should also refer to the Diameter required TLS support here:
# http://tools.ietf.org/html/rfc6733#section-13.1
# Default : "NORMAL"
# Example: TLS_Prio = "NONE:+VERS-TLS1.1:+AES-128-CBC:+RSA:+SHA1:+COMP-NULL";
#TLS_Prio = "NORMAL";
# Diffie-Hellman parameters size
# Set the number of bits for generated DH parameters
# Valid value should be 768, 1024, 2048, 3072 or 4096.
# (This parameter is passed to gnutls_dh_params_generate2 function,
# it usually should match RSA key size)
# Default : 1024
#TLS_DH_Bits = 1024;
# Alternatively, you can specify a file to load the PKCS#3 encoded
# DH parameters directly from. This accelerates the daemon start
# but is slightly less secure. If this file is provided, the
# TLS_DH_Bits parameters has no effect.
# Default : no default.
#TLS_DH_File = "<file.PEM>";
##############################################################
## Timers configuration
# The Tc timer of this peer.
# It is the delay before a new attempt is made to reconnect a disconnected peer.
# The value is expressed in seconds. The recommended value is 30 seconds.
# Default: 30
#TcTimer = 30;
# The Tw timer of this peer.
# It is the delay before a watchdog message is sent, as described in RFC 3539.
# The value is expressed in seconds. The default value is 30 seconds. Value must
# be greater or equal to 6 seconds. See details in the RFC.
# Default: 30
#TwTimer = 30;
##############################################################
## Applications configuration
# Disable the relaying of Diameter messages?
# For messages not handled locally, the default behavior is to forward the
# message to another peer if any is available, according to the routing
# algorithms. In addition the "0xffffff" application is advertised in CER/CEA
# exchanges.
# Default: Relaying is enabled.
#NoRelay;
# Number of server threads that can handle incoming messages at the same time.
# Default: 4
#AppServThreads = 4;
# Other applications are configured by loaded extensions.
##############################################################
## Extensions configuration
# The freeDiameter framework merely provides support for
# Diameter Base Protocol. The specific application behaviors,
# as well as advanced functions, are provided
# by loadable extensions (plug-ins).
# These extensions may in addition receive the name of a
# configuration file, the format of which is extension-specific.
#
# Format:
#LoadExtension = "/path/to/extension" [ : "/optional/configuration/file" ] ;
#
# Examples:
#LoadExtension = "extensions/sample.fdx";
#LoadExtension = "extensions/sample.fdx":"conf/sample.conf";
# Extensions are named as follow:
# dict_* for extensions that add content to the dictionary definitions.
# dbg_* for extensions useful only to retrieve more information on the framework execution.
# acl_* : Access control list, to control which peers are allowed to connect.
# rt_* : routing extensions that impact how messages are forwarded to other peers.
# app_* : applications, these extensions usually register callbacks to handle specific messages.
# test_* : dummy extensions that are useful only in testing environments.
# The dbg_msg_dump.fdx extension allows you to tweak the way freeDiameter displays some
# information about some events. This extension does not actually use a configuration file
# but receives directly a parameter in the string passed to the extension. Here are some examples:
## LoadExtension = "dbg_msg_dumps.fdx" : "0x1111"; # Removes all default hooks, very quiet even in case of errors.
## LoadExtension = "dbg_msg_dumps.fdx" : "0x2222"; # Display all events with few details.
## LoadExtension = "dbg_msg_dumps.fdx" : "0x0080"; # Dump complete information about sent and received messages.
# The four digits respectively control: connections, routing decisions, sent/received messages, errors.
# The values for each digit are:
# 0 - default - keep the default behavior
# 1 - quiet - remove any specific log
# 2 - compact - display only a summary of the information
# 4 - full - display the complete information on a single long line
# 8 - tree - display the complete information in an easier to read format spanning several lines.
LoadExtension = "dbg_msg_dumps.fdx" : "0x8888";
LoadExtension = "dict_rfc5777.fdx";
LoadExtension = "dict_mip6i.fdx";
LoadExtension = "dict_nas_mipv6.fdx";
LoadExtension = "@prefix@/lib/nextepc/dict_nasreq.so";
LoadExtension = "@prefix@/lib/nextepc/dict_dcca.so";
LoadExtension = "@prefix@/lib/nextepc/dict_dcca_3gpp.so";
#LoadExtension = "@prefix@/lib/nextepc/dict_legacy_xml.so" : "@prefix@/etc/freeDiameter/dict_legacy_xml.conf";
##############################################################
## Peers configuration
# The local server listens for incoming connections. By default,
# all unknown connecting peers are rejected. Extensions can override this behavior (e.g., acl_wl).
#
# In addition to incoming connections, the local peer can
# be configured to establish and maintain connections to some
# Diameter nodes and allow connections from these nodes.
# This is achieved with the ConnectPeer directive described below.
#
# Note that the configured Diameter Identity MUST match
# the information received inside CEA, or the connection will be aborted.
#
# Format:
#ConnectPeer = "diameterid" [ { parameter1; parameter2; ...} ] ;
# Parameters that can be specified in the peer's parameter list:
# No_TCP; No_SCTP; No_IP; No_IPv6; Prefer_TCP; TLS_old_method;
# No_TLS; # assume transparent security instead of TLS. DTLS is not supported yet (will change in future versions).
# Port = 5868; # The port to connect to
# TcTimer = 30;
# TwTimer = 30;
# ConnectTo = "202.249.37.5";
# ConnectTo = "2001:200:903:2::202:1";
# TLS_Prio = "NORMAL";
# Realm = "realm.net"; # Reject the peer if it does not advertise this realm.
# Examples:
#ConnectPeer = "aaa.wide.ad.jp";
#ConnectPeer = "old.diameter.serv" { TcTimer = 60; TLS_old_method; No_SCTP; Port=3868; } ;
ConnectPeer = "pcrf.localdomain" { ConnectTo = "10.1.35.218"; No_TLS; };
##############################################################

View File

@ -0,0 +1,15 @@
-----BEGIN RSA PRIVATE KEY-----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-----END RSA PRIVATE KEY-----

View File

@ -4,6 +4,7 @@ ifconfig eth1:hss 10.1.35.214/24 up
ifconfig eth1:mme 10.1.35.215/24 up
ifconfig eth1:sgw_s5 10.1.35.216/24 up
ifconfig eth1:sgw_s11 10.1.35.217/24 up
ifconfig eth1:pcrf 10.1.35.218/24 up
ifconfig eth1:pgw 10.1.35.219/24 up
ifconfig pgwtun 45.45.0.1/16 up

View File

@ -2,7 +2,7 @@
if [ 1 -ne $# ]
then
echo You must specify output directory : ./make_cert ../out
echo You must specify output directory : ./make_certs.sh ./freeDiameter
exit;
fi
@ -13,19 +13,29 @@ echo 01 > demoCA/serial
touch demoCA/index.txt
# CA self certificate
openssl req -new -batch -x509 -days 3650 -nodes -newkey rsa:1024 -out $1/cacert.pem -keyout cakey.pem -subj /CN=ca.localdomain/C=FR/ST=BdR/L=Aix/O=fD/OU=Tests
openssl req -new -batch -x509 -days 3650 -nodes -newkey rsa:1024 -out $1/cacert.pem -keyout cakey.pem -subj /CN=ca.localdomain/C=KO/ST=Seoul/L=Nowon/O=NextEPC/OU=Tests
#mme
openssl genrsa -out $1/mme.key.pem 1024
openssl req -new -batch -out mme.csr.pem -key $1/mme.key.pem -subj /CN=mme.localdomain/C=FR/ST=BdR/L=Aix/O=fD/OU=Tests
openssl req -new -batch -out mme.csr.pem -key $1/mme.key.pem -subj /CN=mme.localdomain/C=KO/ST=Seoul/L=Nowon/O=NextEPC/OU=Tests
openssl ca -cert $1/cacert.pem -keyfile cakey.pem -in mme.csr.pem -out $1/mme.cert.pem -outdir . -batch
#hss
openssl genrsa -out $1/hss.key.pem 1024
openssl req -new -batch -out hss.csr.pem -key $1/hss.key.pem -subj /CN=hss.localdomain/C=FR/ST=BdR/L=Aix/O=fD/OU=Tests
openssl req -new -batch -out hss.csr.pem -key $1/hss.key.pem -subj /CN=hss.localdomain/C=KO/ST=Seoul/L=Nowon/O=NextEPC/OU=Tests
openssl ca -cert $1/cacert.pem -keyfile cakey.pem -in hss.csr.pem -out $1/hss.cert.pem -outdir . -batch
#pgw
openssl genrsa -out $1/pgw.key.pem 1024
openssl req -new -batch -out pgw.csr.pem -key $1/pgw.key.pem -subj /CN=pgw.localdomain/C=KO/ST=Seoul/L=Nowon/O=NextEPC/OU=Tests
openssl ca -cert $1/cacert.pem -keyfile cakey.pem -in pgw.csr.pem -out $1/pgw.cert.pem -outdir . -batch
#pcrf
openssl genrsa -out $1/pcrf.key.pem 1024
openssl req -new -batch -out pcrf.csr.pem -key $1/pcrf.key.pem -subj /CN=pcrf.localdomain/C=KO/ST=Seoul/L=Nowon/O=NextEPC/OU=Tests
openssl ca -cert $1/cacert.pem -keyfile cakey.pem -in pcrf.csr.pem -out $1/pcrf.cert.pem -outdir . -batch
rm -rf demoCA
rm -f 01.pem 02.pem
rm -f 01.pem 02.pem 03.pem 04.pem
rm -f cakey.pem
rm -f hss.csr.pem mme.csr.pem
rm -f mme.csr.pem hss.csr.pem pgw.csr.pem pcrf.csr.pem

View File

@ -10,15 +10,6 @@
OTHERS: 1,
}
HSS :
{
FD_CONF_PATH : "@prefix@/etc/freeDiameter/hss.conf",
NETWORK :
{
S6A_ADDR : "10.1.35.214"
}
}
MME :
{
FD_CONF_PATH : "@prefix@/etc/freeDiameter/mme.conf",
@ -28,7 +19,6 @@
NETWORK :
{
S6A_ADDR : "10.1.35.215",
S1AP_ADDR : "10.1.35.215",
S11_ADDR: "10.1.35.215",
}
@ -58,6 +48,11 @@
}
}
HSS :
{
FD_CONF_PATH : "@prefix@/etc/freeDiameter/hss.conf",
}
SGW :
{
NETWORK :
@ -74,6 +69,8 @@
PGW :
{
FD_CONF_PATH : "@prefix@/etc/freeDiameter/pgw.conf",
NETWORK :
{
S5C_ADDR: "10.1.35.219",
@ -96,4 +93,10 @@
SECONDARY_ADDR: "4.4.4.4"
}
}
PCRF :
{
FD_CONF_PATH : "@prefix@/etc/freeDiameter/pcrf.conf",
}
}