On donderdag 18 juli 2019 20:11:46 CEST RedOmen wrote: > I tried to use the instructions here: > https://bugs.quassel-irc.org/projects/quassel-irc/wiki/Client-Core_SSL_suppo > rt but could not get it to work. > > I ended up having to remove all the /var/lib/quassel/ files and running > dpkg-reconfigure quassel-core and manually recreating my accounts but > that seems to have fixed it.
You were bitten by https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=732728. The command that you need(ed) is contained in the postinst script of the package. You can view it by downloading the .deb file from https://packages.debian.org/buster/amd64/quassel-core/download (or find it in /var/cache/apt/archives/), open/extract it and then open/extract control.tar.xz in which you'll find the postinst file. For completeness, here's the relevant part of postinst that generates the certificate: # some variables QUASSEL_GROUP=quassel QUASSEL_USER=quasselcore QUASSEL_HOME=/var/lib/quassel QUASSEL_LOG=/var/log/quassel QUASSEL_CERT=$QUASSEL_HOME/quasselCert.pem if [ ! -e $QUASSEL_CERT ] ; then echo "Generating SSL certificate as $QUASSEL_CERT ..." ( umask 0027 && runuser -u $QUASSEL_USER -- openssl req -x509 -nodes -batch -days 680 -newkey rsa \ -keyout $QUASSEL_CERT -out $QUASSEL_CERT ) fi I know it's not important for you anymore, but in case others run into the same issue, they should now have enough to just regenerate the certificate.
signature.asc
Description: This is a digitally signed message part.