|
1 # |
|
2 # OpenSSL example configuration file. |
|
3 # This is mostly being used for generation of certificate requests. |
|
4 # |
|
5 |
|
6 # This definition stops the following lines choking if HOME isn't |
|
7 # defined. |
|
8 HOME = . |
|
9 RANDFILE = $ENV::HOME/.rnd |
|
10 |
|
11 # Extra OBJECT IDENTIFIER info: |
|
12 #oid_file = $ENV::HOME/.oid |
|
13 oid_section = new_oids |
|
14 |
|
15 # To use this configuration file with the "-extfile" option of the |
|
16 # "openssl x509" utility, name here the section containing the |
|
17 # X.509v3 extensions to use: |
|
18 # extensions = |
|
19 # (Alternatively, use a configuration file that has only |
|
20 # X.509v3 extensions in its main [= default] section.) |
|
21 |
|
22 [ new_oids ] |
|
23 |
|
24 # We can add new OIDs in here for use by 'ca' and 'req'. |
|
25 # Add a simple OID like this: |
|
26 # testoid1=1.2.3.4 |
|
27 # Or use config file substitution like this: |
|
28 # testoid2=${testoid1}.5.6 |
|
29 |
|
30 #################################################################### |
|
31 [ ca ] |
|
32 default_ca = CA_default # The default ca section |
|
33 |
|
34 #################################################################### |
|
35 [ CA_default ] |
|
36 |
|
37 dir = ./demoCA # Where everything is kept |
|
38 certs = $dir/certs # Where the issued certs are kept |
|
39 crl_dir = $dir/crl # Where the issued crl are kept |
|
40 database = $dir/index.txt # database index file. |
|
41 #unique_subject = no # Set to 'no' to allow creation of |
|
42 # several ctificates with same subject. |
|
43 new_certs_dir = $dir/newcerts # default place for new certs. |
|
44 |
|
45 certificate = $dir/cacert.pem # The CA certificate |
|
46 serial = $dir/serial # The current serial number |
|
47 crlnumber = $dir/crlnumber # the current crl number |
|
48 # must be commented out to leave a V1 CRL |
|
49 crl = $dir/crl.pem # The current CRL |
|
50 private_key = $dir/private/cakey.pem# The private key |
|
51 RANDFILE = $dir/private/.rand # private random number file |
|
52 |
|
53 x509_extensions = usr_cert # The extentions to add to the cert |
|
54 |
|
55 # Comment out the following two lines for the "traditional" |
|
56 # (and highly broken) format. |
|
57 name_opt = ca_default # Subject Name options |
|
58 cert_opt = ca_default # Certificate field options |
|
59 |
|
60 # Extension copying option: use with caution. |
|
61 # copy_extensions = copy |
|
62 |
|
63 # Extensions to add to a CRL. Note: Netscape communicator chokes on V2 CRLs |
|
64 # so this is commented out by default to leave a V1 CRL. |
|
65 # crlnumber must also be commented out to leave a V1 CRL. |
|
66 # crl_extensions = crl_ext |
|
67 |
|
68 default_days = 365 # how long to certify for |
|
69 default_crl_days= 30 # how long before next CRL |
|
70 default_md = sha1 # which md to use. |
|
71 preserve = no # keep passed DN ordering |
|
72 |
|
73 # A few difference way of specifying how similar the request should look |
|
74 # For type CA, the listed attributes must be the same, and the optional |
|
75 # and supplied fields are just that :-) |
|
76 policy = policy_match |
|
77 |
|
78 # For the CA policy |
|
79 [ policy_match ] |
|
80 countryName = match |
|
81 stateOrProvinceName = match |
|
82 organizationName = match |
|
83 organizationalUnitName = optional |
|
84 commonName = supplied |
|
85 emailAddress = optional |
|
86 |
|
87 # For the 'anything' policy |
|
88 # At this point in time, you must list all acceptable 'object' |
|
89 # types. |
|
90 [ policy_anything ] |
|
91 countryName = optional |
|
92 stateOrProvinceName = optional |
|
93 localityName = optional |
|
94 organizationName = optional |
|
95 organizationalUnitName = optional |
|
96 commonName = supplied |
|
97 emailAddress = optional |
|
98 |
|
99 #################################################################### |
|
100 [ req ] |
|
101 default_bits = 1024 |
|
102 default_keyfile = privkey.pem |
|
103 distinguished_name = req_distinguished_name |
|
104 attributes = req_attributes |
|
105 x509_extensions = v3_ca # The extentions to add to the self signed cert |
|
106 |
|
107 # Passwords for private keys if not present they will be prompted for |
|
108 # input_password = secret |
|
109 # output_password = secret |
|
110 |
|
111 # This sets a mask for permitted string types. There are several options. |
|
112 # default: PrintableString, T61String, BMPString. |
|
113 # pkix : PrintableString, BMPString. |
|
114 # utf8only: only UTF8Strings. |
|
115 # nombstr : PrintableString, T61String (no BMPStrings or UTF8Strings). |
|
116 # MASK:XXXX a literal mask value. |
|
117 # WARNING: current versions of Netscape crash on BMPStrings or UTF8Strings |
|
118 # so use this option with caution! |
|
119 string_mask = nombstr |
|
120 |
|
121 # req_extensions = v3_req # The extensions to add to a certificate request |
|
122 |
|
123 [ req_distinguished_name ] |
|
124 countryName = Country Name (2 letter code) |
|
125 countryName_default = AU |
|
126 countryName_min = 2 |
|
127 countryName_max = 2 |
|
128 |
|
129 stateOrProvinceName = State or Province Name (full name) |
|
130 stateOrProvinceName_default = Some-State |
|
131 |
|
132 localityName = Locality Name (eg, city) |
|
133 |
|
134 0.organizationName = Organization Name (eg, company) |
|
135 0.organizationName_default = Internet Widgits Pty Ltd |
|
136 |
|
137 # we can do this but it is not needed normally :-) |
|
138 #1.organizationName = Second Organization Name (eg, company) |
|
139 #1.organizationName_default = World Wide Web Pty Ltd |
|
140 |
|
141 organizationalUnitName = Organizational Unit Name (eg, section) |
|
142 #organizationalUnitName_default = |
|
143 |
|
144 commonName = Common Name (eg, YOUR name) |
|
145 commonName_max = 64 |
|
146 |
|
147 emailAddress = Email Address |
|
148 emailAddress_max = 64 |
|
149 |
|
150 # SET-ex3 = SET extension number 3 |
|
151 |
|
152 [ req_attributes ] |
|
153 challengePassword = A challenge password |
|
154 challengePassword_min = 4 |
|
155 challengePassword_max = 20 |
|
156 |
|
157 unstructuredName = An optional company name |
|
158 |
|
159 [ usr_cert ] |
|
160 |
|
161 # These extensions are added when 'ca' signs a request. |
|
162 |
|
163 # This goes against PKIX guidelines but some CAs do it and some software |
|
164 # requires this to avoid interpreting an end user certificate as a CA. |
|
165 |
|
166 basicConstraints=CA:FALSE |
|
167 |
|
168 # Here are some examples of the usage of nsCertType. If it is omitted |
|
169 # the certificate can be used for anything *except* object signing. |
|
170 |
|
171 # This is OK for an SSL server. |
|
172 # nsCertType = server |
|
173 |
|
174 # For an object signing certificate this would be used. |
|
175 # nsCertType = objsign |
|
176 |
|
177 # For normal client use this is typical |
|
178 # nsCertType = client, email |
|
179 |
|
180 # and for everything including object signing: |
|
181 # nsCertType = client, email, objsign |
|
182 |
|
183 # This is typical in keyUsage for a client certificate. |
|
184 # keyUsage = nonRepudiation, digitalSignature, keyEncipherment |
|
185 |
|
186 # This will be displayed in Netscape's comment listbox. |
|
187 nsComment = "OpenSSL Generated Certificate" |
|
188 |
|
189 # PKIX recommendations harmless if included in all certificates. |
|
190 subjectKeyIdentifier=hash |
|
191 authorityKeyIdentifier=keyid,issuer |
|
192 |
|
193 # This stuff is for subjectAltName and issuerAltname. |
|
194 # Import the email address. |
|
195 # subjectAltName=email:copy |
|
196 # An alternative to produce certificates that aren't |
|
197 # deprecated according to PKIX. |
|
198 # subjectAltName=email:move |
|
199 |
|
200 # Copy subject details |
|
201 # issuerAltName=issuer:copy |
|
202 |
|
203 #nsCaRevocationUrl = http://www.domain.dom/ca-crl.pem |
|
204 #nsBaseUrl |
|
205 #nsRevocationUrl |
|
206 #nsRenewalUrl |
|
207 #nsCaPolicyUrl |
|
208 #nsSslServerName |
|
209 |
|
210 [ v3_req ] |
|
211 |
|
212 # Extensions to add to a certificate request |
|
213 |
|
214 basicConstraints = CA:FALSE |
|
215 keyUsage = nonRepudiation, digitalSignature, keyEncipherment |
|
216 |
|
217 [ v3_ca ] |
|
218 |
|
219 |
|
220 # Extensions for a typical CA |
|
221 |
|
222 |
|
223 # PKIX recommendation. |
|
224 |
|
225 subjectKeyIdentifier=hash |
|
226 |
|
227 authorityKeyIdentifier=keyid:always,issuer:always |
|
228 |
|
229 # This is what PKIX recommends but some broken software chokes on critical |
|
230 # extensions. |
|
231 #basicConstraints = critical,CA:true |
|
232 # So we do this instead. |
|
233 basicConstraints = CA:true |
|
234 |
|
235 # Key usage: this is typical for a CA certificate. However since it will |
|
236 # prevent it being used as an test self-signed certificate it is best |
|
237 # left out by default. |
|
238 # keyUsage = cRLSign, keyCertSign |
|
239 |
|
240 # Some might want this also |
|
241 # nsCertType = sslCA, emailCA |
|
242 |
|
243 # Include email address in subject alt name: another PKIX recommendation |
|
244 # subjectAltName=email:copy |
|
245 # Copy issuer details |
|
246 # issuerAltName=issuer:copy |
|
247 |
|
248 # DER hex encoding of an extension: beware experts only! |
|
249 # obj=DER:02:03 |
|
250 # Where 'obj' is a standard or added object |
|
251 # You can even override a supported extension: |
|
252 # basicConstraints= critical, DER:30:03:01:01:FF |
|
253 |
|
254 [ crl_ext ] |
|
255 |
|
256 # CRL extensions. |
|
257 # Only issuerAltName and authorityKeyIdentifier make any sense in a CRL. |
|
258 |
|
259 # issuerAltName=issuer:copy |
|
260 authorityKeyIdentifier=keyid:always,issuer:always |
|
261 |
|
262 [ proxy_cert_ext ] |
|
263 # These extensions should be added when creating a proxy certificate |
|
264 |
|
265 # This goes against PKIX guidelines but some CAs do it and some software |
|
266 # requires this to avoid interpreting an end user certificate as a CA. |
|
267 |
|
268 basicConstraints=CA:FALSE |
|
269 |
|
270 # Here are some examples of the usage of nsCertType. If it is omitted |
|
271 # the certificate can be used for anything *except* object signing. |
|
272 |
|
273 # This is OK for an SSL server. |
|
274 # nsCertType = server |
|
275 |
|
276 # For an object signing certificate this would be used. |
|
277 # nsCertType = objsign |
|
278 |
|
279 # For normal client use this is typical |
|
280 # nsCertType = client, email |
|
281 |
|
282 # and for everything including object signing: |
|
283 # nsCertType = client, email, objsign |
|
284 |
|
285 # This is typical in keyUsage for a client certificate. |
|
286 # keyUsage = nonRepudiation, digitalSignature, keyEncipherment |
|
287 |
|
288 # This will be displayed in Netscape's comment listbox. |
|
289 nsComment = "OpenSSL Generated Certificate" |
|
290 |
|
291 # PKIX recommendations harmless if included in all certificates. |
|
292 subjectKeyIdentifier=hash |
|
293 authorityKeyIdentifier=keyid,issuer:always |
|
294 |
|
295 # This stuff is for subjectAltName and issuerAltname. |
|
296 # Import the email address. |
|
297 # subjectAltName=email:copy |
|
298 # An alternative to produce certificates that aren't |
|
299 # deprecated according to PKIX. |
|
300 # subjectAltName=email:move |
|
301 |
|
302 # Copy subject details |
|
303 # issuerAltName=issuer:copy |
|
304 |
|
305 #nsCaRevocationUrl = http://www.domain.dom/ca-crl.pem |
|
306 #nsBaseUrl |
|
307 #nsRevocationUrl |
|
308 #nsRenewalUrl |
|
309 #nsCaPolicyUrl |
|
310 #nsSslServerName |
|
311 |
|
312 # This really needs to be in place for it to be a proxy certificate. |
|
313 proxyCertInfo=critical,language:id-ppl-anyLanguage,pathlen:3,policy:foo |