Subversion Repositories configs

Rev

Rev 192 | Details | Compare with Previous | Last modification | View Log | RSS feed

Rev Author Line No. Line
192 - 1
#
2
# OpenSSL example configuration file.
3
# This is mostly being used for generation of certificate requests.
4
#
5
 
6
# Note that you can include other files from the main configuration
7
# file using the .include directive.
8
#.include filename
9
 
10
# This definition stops the following lines choking if HOME isn't
11
# defined.
12
HOME			= .
13
 
14
# Extra OBJECT IDENTIFIER info:
15
#oid_file		= $ENV::HOME/.oid
16
oid_section		= new_oids
17
 
18
# To use this configuration file with the "-extfile" option of the
19
# "openssl x509" utility, name here the section containing the
20
# X.509v3 extensions to use:
21
# extensions		=
22
# (Alternatively, use a configuration file that has only
23
# X.509v3 extensions in its main [= default] section.)
24
 
25
# Load default TLS policy configuration
26
 
27
openssl_conf = default_modules
28
 
29
[ default_modules ]
30
 
31
ssl_conf = ssl_module
32
 
33
[ ssl_module ]
34
 
35
system_default = crypto_policy
36
 
37
[ crypto_policy ]
38
 
39
.include /etc/crypto-policies/back-ends/opensslcnf.config
40
 
41
[ new_oids ]
42
 
43
# We can add new OIDs in here for use by 'ca', 'req' and 'ts'.
44
# Add a simple OID like this:
45
# testoid1=1.2.3.4
46
# Or use config file substitution like this:
47
# testoid2=${testoid1}.5.6
48
 
49
# Policies used by the TSA examples.
50
tsa_policy1 = 1.2.3.4.1
51
tsa_policy2 = 1.2.3.4.5.6
52
tsa_policy3 = 1.2.3.4.5.7
53
 
54
####################################################################
55
[ ca ]
56
default_ca	= CA_default		# The default ca section
57
 
58
####################################################################
59
[ CA_default ]
60
 
61
dir		= /etc/pki/CA		# Where everything is kept
62
certs		= $dir/certs		# Where the issued certs are kept
63
crl_dir		= $dir/crl		# Where the issued crl are kept
64
database	= $dir/index.txt	# database index file.
65
#unique_subject	= no			# Set to 'no' to allow creation of
66
					# several certs with same subject.
67
new_certs_dir	= $dir/newcerts		# default place for new certs.
68
 
69
certificate	= $dir/cacert.pem 	# The CA certificate
70
serial		= $dir/serial 		# The current serial number
71
crlnumber	= $dir/crlnumber	# the current crl number
72
					# must be commented out to leave a V1 CRL
73
crl		= $dir/crl.pem 		# The current CRL
74
private_key	= $dir/private/cakey.pem# The private key
75
 
76
x509_extensions	= usr_cert		# The extensions to add to the cert
77
 
78
# Comment out the following two lines for the "traditional"
79
# (and highly broken) format.
80
name_opt 	= ca_default		# Subject Name options
81
cert_opt 	= ca_default		# Certificate field options
82
 
83
# Extension copying option: use with caution.
84
# copy_extensions = copy
85
 
86
# Extensions to add to a CRL. Note: Netscape communicator chokes on V2 CRLs
87
# so this is commented out by default to leave a V1 CRL.
88
# crlnumber must also be commented out to leave a V1 CRL.
89
# crl_extensions	= crl_ext
90
 
91
default_days	= 365			# how long to certify for
92
default_crl_days= 30			# how long before next CRL
93
default_md	= sha256		# use SHA-256 by default
94
preserve	= no			# keep passed DN ordering
95
 
96
# A few difference way of specifying how similar the request should look
97
# For type CA, the listed attributes must be the same, and the optional
98
# and supplied fields are just that :-)
99
policy		= policy_match
100
 
101
# For the CA policy
102
[ policy_match ]
103
countryName		= match
104
stateOrProvinceName	= match
105
organizationName	= match
106
organizationalUnitName	= optional
107
commonName		= supplied
108
emailAddress		= optional
109
 
110
# For the 'anything' policy
111
# At this point in time, you must list all acceptable 'object'
112
# types.
113
[ policy_anything ]
114
countryName		= optional
115
stateOrProvinceName	= optional
116
localityName		= optional
117
organizationName	= optional
118
organizationalUnitName	= optional
119
commonName		= supplied
120
emailAddress		= optional
121
 
122
####################################################################
123
[ req ]
124
default_bits		= 2048
125
default_md		= sha256
126
default_keyfile 	= privkey.pem
127
distinguished_name	= req_distinguished_name
128
attributes		= req_attributes
129
x509_extensions	= v3_ca	# The extensions to add to the self signed cert
130
 
131
# Passwords for private keys if not present they will be prompted for
132
# input_password = secret
133
# output_password = secret
134
 
135
# This sets a mask for permitted string types. There are several options.
136
# default: PrintableString, T61String, BMPString.
137
# pkix	 : PrintableString, BMPString (PKIX recommendation before 2004)
138
# utf8only: only UTF8Strings (PKIX recommendation after 2004).
139
# nombstr : PrintableString, T61String (no BMPStrings or UTF8Strings).
140
# MASK:XXXX a literal mask value.
141
# WARNING: ancient versions of Netscape crash on BMPStrings or UTF8Strings.
142
string_mask = utf8only
143
 
144
# req_extensions = v3_req # The extensions to add to a certificate request
145
 
146
[ req_distinguished_name ]
147
countryName			= Country Name (2 letter code)
148
countryName_default		= XX
149
countryName_min			= 2
150
countryName_max			= 2
151
 
152
stateOrProvinceName		= State or Province Name (full name)
153
#stateOrProvinceName_default	= Default Province
154
 
155
localityName			= Locality Name (eg, city)
156
localityName_default		= Default City
157
 
158
0.organizationName		= Organization Name (eg, company)
159
0.organizationName_default	= Default Company Ltd
160
 
161
# we can do this but it is not needed normally :-)
162
#1.organizationName		= Second Organization Name (eg, company)
163
#1.organizationName_default	= World Wide Web Pty Ltd
164
 
165
organizationalUnitName		= Organizational Unit Name (eg, section)
166
#organizationalUnitName_default	=
167
 
168
commonName			= Common Name (eg, your name or your server\'s hostname)
169
commonName_max			= 64
170
 
171
emailAddress			= Email Address
172
emailAddress_max		= 64
173
 
174
# SET-ex3			= SET extension number 3
175
 
176
[ req_attributes ]
177
challengePassword		= A challenge password
178
challengePassword_min		= 4
179
challengePassword_max		= 20
180
 
181
unstructuredName		= An optional company name
182
 
183
[ usr_cert ]
184
 
185
# These extensions are added when 'ca' signs a request.
186
 
187
# This goes against PKIX guidelines but some CAs do it and some software
188
# requires this to avoid interpreting an end user certificate as a CA.
189
 
190
basicConstraints=CA:FALSE
191
 
192
# Here are some examples of the usage of nsCertType. If it is omitted
193
# the certificate can be used for anything *except* object signing.
194
 
195
# This is OK for an SSL server.
196
# nsCertType			= server
197
 
198
# For an object signing certificate this would be used.
199
# nsCertType = objsign
200
 
201
# For normal client use this is typical
202
# nsCertType = client, email
203
 
204
# and for everything including object signing:
205
# nsCertType = client, email, objsign
206
 
207
# This is typical in keyUsage for a client certificate.
208
# keyUsage = nonRepudiation, digitalSignature, keyEncipherment
209
 
210
# This will be displayed in Netscape's comment listbox.
211
nsComment			= "OpenSSL Generated Certificate"
212
 
213
# PKIX recommendations harmless if included in all certificates.
214
subjectKeyIdentifier=hash
215
authorityKeyIdentifier=keyid,issuer
216
 
217
# This stuff is for subjectAltName and issuerAltname.
218
# Import the email address.
219
# subjectAltName=email:copy
220
# An alternative to produce certificates that aren't
221
# deprecated according to PKIX.
222
# subjectAltName=email:move
223
 
224
# Copy subject details
225
# issuerAltName=issuer:copy
226
 
227
#nsCaRevocationUrl		= http://www.domain.dom/ca-crl.pem
228
#nsBaseUrl
229
#nsRevocationUrl
230
#nsRenewalUrl
231
#nsCaPolicyUrl
232
#nsSslServerName
233
 
234
# This is required for TSA certificates.
235
# extendedKeyUsage = critical,timeStamping
236
 
237
[ v3_req ]
238
 
239
# Extensions to add to a certificate request
240
 
241
basicConstraints = CA:FALSE
242
keyUsage = nonRepudiation, digitalSignature, keyEncipherment
243
 
244
[ v3_ca ]
245
 
246
 
247
# Extensions for a typical CA
248
 
249
 
250
# PKIX recommendation.
251
 
252
subjectKeyIdentifier=hash
253
 
254
authorityKeyIdentifier=keyid:always,issuer
255
 
256
basicConstraints = critical,CA:true
257
 
258
# Key usage: this is typical for a CA certificate. However since it will
259
# prevent it being used as an test self-signed certificate it is best
260
# left out by default.
261
# keyUsage = cRLSign, keyCertSign
262
 
263
# Some might want this also
264
# nsCertType = sslCA, emailCA
265
 
266
# Include email address in subject alt name: another PKIX recommendation
267
# subjectAltName=email:copy
268
# Copy issuer details
269
# issuerAltName=issuer:copy
270
 
271
# DER hex encoding of an extension: beware experts only!
272
# obj=DER:02:03
273
# Where 'obj' is a standard or added object
274
# You can even override a supported extension:
275
# basicConstraints= critical, DER:30:03:01:01:FF
276
 
277
[ crl_ext ]
278
 
279
# CRL extensions.
280
# Only issuerAltName and authorityKeyIdentifier make any sense in a CRL.
281
 
282
# issuerAltName=issuer:copy
283
authorityKeyIdentifier=keyid:always
284
 
285
[ proxy_cert_ext ]
286
# These extensions should be added when creating a proxy certificate
287
 
288
# This goes against PKIX guidelines but some CAs do it and some software
289
# requires this to avoid interpreting an end user certificate as a CA.
290
 
291
basicConstraints=CA:FALSE
292
 
293
# Here are some examples of the usage of nsCertType. If it is omitted
294
# the certificate can be used for anything *except* object signing.
295
 
296
# This is OK for an SSL server.
297
# nsCertType			= server
298
 
299
# For an object signing certificate this would be used.
300
# nsCertType = objsign
301
 
302
# For normal client use this is typical
303
# nsCertType = client, email
304
 
305
# and for everything including object signing:
306
# nsCertType = client, email, objsign
307
 
308
# This is typical in keyUsage for a client certificate.
309
# keyUsage = nonRepudiation, digitalSignature, keyEncipherment
310
 
311
# This will be displayed in Netscape's comment listbox.
312
nsComment			= "OpenSSL Generated Certificate"
313
 
314
# PKIX recommendations harmless if included in all certificates.
315
subjectKeyIdentifier=hash
316
authorityKeyIdentifier=keyid,issuer
317
 
318
# This stuff is for subjectAltName and issuerAltname.
319
# Import the email address.
320
# subjectAltName=email:copy
321
# An alternative to produce certificates that aren't
322
# deprecated according to PKIX.
323
# subjectAltName=email:move
324
 
325
# Copy subject details
326
# issuerAltName=issuer:copy
327
 
328
#nsCaRevocationUrl		= http://www.domain.dom/ca-crl.pem
329
#nsBaseUrl
330
#nsRevocationUrl
331
#nsRenewalUrl
332
#nsCaPolicyUrl
333
#nsSslServerName
334
 
335
# This really needs to be in place for it to be a proxy certificate.
336
proxyCertInfo=critical,language:id-ppl-anyLanguage,pathlen:3,policy:foo
337
 
338
####################################################################
339
[ tsa ]
340
 
341
default_tsa = tsa_config1	# the default TSA section
342
 
343
[ tsa_config1 ]
344
 
345
# These are used by the TSA reply generation only.
346
dir		= /etc/pki/CA		# TSA root directory
347
serial		= $dir/tsaserial	# The current serial number (mandatory)
348
crypto_device	= builtin		# OpenSSL engine to use for signing
349
signer_cert	= $dir/tsacert.pem 	# The TSA signing certificate
350
					# (optional)
351
certs		= $dir/cacert.pem	# Certificate chain to include in reply
352
					# (optional)
353
signer_key	= $dir/private/tsakey.pem # The TSA private key (optional)
354
signer_digest  = sha256			# Signing digest to use. (Optional)
355
default_policy	= tsa_policy1		# Policy if request did not specify it
356
					# (optional)
357
other_policies	= tsa_policy2, tsa_policy3	# acceptable policies (optional)
358
digests     = sha1, sha256, sha384, sha512  # Acceptable message digests (mandatory)
359
accuracy	= secs:1, millisecs:500, microsecs:100	# (optional)
360
clock_precision_digits  = 0	# number of digits after dot. (optional)
361
ordering		= yes	# Is ordering defined for timestamps?
362
				# (optional, default: no)
363
tsa_name		= yes	# Must the TSA name be included in the reply?
364
				# (optional, default: no)
365
ess_cert_id_chain	= no	# Must the ESS cert id chain be included?
366
				# (optional, default: no)
203 - 367
ess_cert_id_alg		= sha256	# algorithm to compute certificate
192 - 368
				# identifier (optional, default: sha1)