File: estExampleCA.cnf

package info (click to toggle)
libest 3.2.0%2Bds-1.1
  • links: PTS
  • area: main
  • in suites: forky, sid, trixie
  • size: 11,792 kB
  • sloc: ansic: 60,980; java: 12,082; sh: 4,956; python: 4,474; xml: 385; makefile: 290
file content (109 lines) | stat: -rw-r--r-- 4,046 bytes parent folder | download
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
#
# This config file used as an Ugly Simple CA for EST demonstration purposes
#
# Normally one would replace the ESTserver callout scripts with scripts that 
# talk to your own fully armed and operational CA. (e.g. something real with some
# meat behind it, not just some demo CA).
#

[ ca ]
default_ca       = CA_default            # The default ca section

[ CA_default ]
# Some of these values are duplicates of settings in estScript_variables.sh file
# (keep them in sync!)
dir              = ./CA/estCA             # top dir (aka EST_OPENSSL_CADIR)
database         = $dir/index.txt         # index file (aka EST_OPENSSL_CADATABASE)
new_certs_dir    = $dir/newcerts          # new certs dir

certificate      = $dir/cacert.crt        # The CA cert (aka EST_OPENSSL_CACERT)
serial           = $dir/serial            # serial no file (aka EST_OPENSSL_CASERIAL)
private_key      = $dir/private/cakey.pem # CA private key (aka EST_OPENSSL_CAPRIVATE)
RANDFILE         = $dir/.rnd              # random number file

default_days     = 7305               # how long to certify for
default_md       = sha256             # md to use

# For certificate revocation lists
crl              = $dir/crl_estCA.pem
crl_extensions   = crl_ext
default_crl_days = 7305               # how long before next CRL
crlDistributionPoints = URI:http://example.com/crl.pem

policy           = policy_any             # default policy
email_in_dn      = no                     # Don't add the email into cert DN

name_opt         = ca_default             # Subject name display option
cert_opt         = ca_default             # Certificate display option
copy_extensions  = none                   # Don't copy extensions from request
x509_extensions  = client_cert            # The extensions to add to certs issued

# To enable a demo client to be run multiple time we DISABLE unique subject
# checking. This significantly reduces the security of this CA!!
unique_subject   = no

# This policy applies to clients *and* it apples to the CA cert itself
[ policy_any ]
commonName              = supplied
countryName             = optional
stateOrProvinceName     = optional
localityName            = optional
organizationName        = optional
organizationalUnitName  = optional
emailAddress            = optional
serialNumber            = optional 
emailAddress            = optional
title                   = optional
givenName               = optional
initials                = optional
pseudonym               = optional
generationQualifier     = optional
domainComponent         = optional

# This section is used when issuing certs from simpleEnroll.sh
[ client_cert ]
# These extensions are added when 'ca' signs a request.

# This goes against PKIX guidelines but some CAs do it and some software
# requires this to avoid interpreting an end user certificate as a CA.
basicConstraints      = CA:TRUE
keyUsage              = digitalSignature, keyCertSign

#
# Add the id-kp-cmcRA usage.  This isn't defined in OpenSSL, so we
# Need to use the OID value
#extendedKeyUsage      = critical,serverAuth,clientAuth,1.3.6.1.5.5.7.3.28

# PKIX recommendations harmless if included in all certificates.
subjectKeyIdentifier   = hash
#authorityKeyIdentifier = keyid,issuer
authorityKeyIdentifier = keyid

[ req_distinguished_name ]
x509_extensions        = v3_ca

# estExample_setup.sh references this section for initial CA values
[ v3_ca ]
basicConstraints      = CA:TRUE
subjectKeyIdentifier  = hash
#keyUsage              = digitalSignature, keyCertSign
subjectAltName        = @alt_names
crlDistributionPoints = URI:http://example.com/crl.pem

[ crl_ext ]
# Extension for CRLs (`man x509v3_config`).
authorityKeyIdentifier=keyid:always

[ alt_names ]
DNS.1 = localhost
DNS.2 = ip6-localhost
IP.1 = 127.0.0.1 
IP.2 = ::1 

[ req ]
default_bits           = 2048
distinguished_name     = req_distinguished_name
# NOTE: this must be the last section and last lines 
# because the ESThandler_clientgenp10.sh extends this file for 
# setting the challenge password attribute