?? openssl.cnf
字號:
## OpenSSL example configuration file.# This is mostly being used for generation of certificate requests.## This definition stops the following lines choking if HOME isn't# defined.HOME = .RANDFILE = $ENV::HOME/.rnd# Extra OBJECT IDENTIFIER info:#oid_file = $ENV::HOME/.oidoid_section = new_oids# To use this configuration file with the "-extfile" option of the# "openssl x509" utility, name here the section containing the# X.509v3 extensions to use:# extensions =# (Alternatively, use a configuration file that has only# X.509v3 extensions in its main [= default] section.)[ new_oids ]# We can add new OIDs in here for use by 'ca' and 'req'.# Add a simple OID like this:# testoid1=1.2.3.4# Or use config file substitution like this:# testoid2=${testoid1}.5.6####################################################################[ ca ]default_ca = CA_default # The default ca section####################################################################[ CA_default ]dir = /usr/local/OpenCA # Where everything is keptcerts = $dir/certs/issued # Where the issued certs are keptcrl_dir = $dir/crl # Where the issued crl are keptdatabase = $dir/stuff/index.txt # database index file.new_certs_dir = $dir/outbound/certs # default place for new certs.certificate = $dir/stuff/cacert.pem # The CA certificateserial = $dir/stuff/serial # The current serial numbercrl = $dir/stuff/crl.pem # The current CRLprivate_key = $dir/private/cakey.pem# The private keyRANDFILE = $dir/private/.rand # private random number fileoid_file = $dir/private/.oidx509_extensions = user_cert # The extentions to add to the cert#crl_extensions = crl_ext # Extensions to add to CRL # As Netscape only accepts CLRs V1, # DON't use CRL's extensions # at least if you are uning Netscape # 4.5(-).default_days = 365 # how long to certify fordefault_crl_days= 7 # how long before next CRLdefault_md = md5 # which md to use.preserve = yes # keep passed DN ordering# A few difference way of specifying how similar the request should look# For type CA, the listed attributes must be the same, and the optional# and supplied fields are just that :-)policy = policy_match# For the CA policy[ policy_match ]countryName = suppliedorganizationName = suppliedorganizationalUnitName = optionalcommonName = optionalemailAddress = optional# For the 'anything' policy# At this point in time, you must list all acceptable 'object'# types.[ policy_anything ]countryName = supplied## stateOrProvinceName = optional## localityName = optionalorganizationName = suppliedorganizationalUnitName = optionalcommonName = suppliedemailAddress = optional####################################################################[ req ]default_bits = 1024default_keyfile = privkey.pemdistinguished_name = req_distinguished_nameattributes = req_attributesx509_extensions = v3_ca # The extentions to # add to the self signed # cert[ req_distinguished_name ]emailAddress = Email AddressemailAddress_max = 40commonName = Common Name (eg, YOUR name)commonName_max = 64organizationalUnitName = Organizational Unit Name (eg, section)#organizationalUnitName_default = OpenCA User0.organizationName = Organization Name (eg, company)0.organizationName_default = OpenCAcountryName = Country Name (2 letter code)countryName_default = ITcountryName_min = 2countryName_max = 2## stateOrProvinceName = State or Province Name (full name)## stateOrProvinceName_default = Some-State## localityName = Locality Name (eg, city)# we can do this but it is not needed normally :-)#1.organizationName = Second Organization Name (eg, company)#1.organizationName_default = World Wide Web Pty LtdSET-ex3 = SET extension number 3[ req_attributes ]## challengePassword = A challenge password## challengePassword_min = 4## challengePassword_max = 20## unstructuredName = An optional company name#################################################################[ user_cert ]# These extensions are added when 'ca' signs a request.# This goes against PKIX guidelines but some CAs do it and some software# requires this to avoid interpreting an end user certificate as a CA.basicConstraints=CA:FALSE# Here are some examples of the usage of nsCertType. If it is omitted# the certificate can be used for anything *except* object signing.# For an object signing certificate this would be used.#nsCertType = objsign# For normal client use this is typicalnsCertType = client, email# This is typical alsokeyUsage = nonRepudiation, digitalSignature, keyEnciphermentnsComment = "OpenCA User Certificate"# PKIX recommendationssubjectKeyIdentifier=hashauthorityKeyIdentifier=keyid,issuer:always# Import the email address.subjectAltName=email:copy# Copy subject detailsissuerAltName=issuer:copynsCaRevocationUrl = https://www.openca.org/cgi-bin/getcrl#nsBaseUrlnsRevocationUrl = https://www.openca.org/cgi-bin/getcrlnsRenewalUrl = https://www.openca.org:4443/renewal#nsCaPolicyUrl#nsSslServerName#################################################################[ v3_ca]# Extensions for a typical CA# It's a CA certificatebasicConstraints = CA:true# PKIX recommendation.subjectKeyIdentifier=hashauthorityKeyIdentifier=keyid:always,issuer:always# This is what PKIX recommends but some broken software chokes on critical# extensions.#basicConstraints = critical,CA:true# Key usage: again this should really be critical.keyUsage = cRLSign, keyCertSign# Some might want this also#nsCertType = sslCA, emailCA# Include email address in subject alt name: another PKIX recommendationsubjectAltName=email:copy# Copy issuer detailsissuerAltName=issuer:copy# RAW DER hex encoding of an extension: beware experts only!# 1.2.3.5=RAW:02:03# You can even override a supported extension:# basicConstraints= critical, RAW:30:03:01:01:FF#################################################################[ server_cert ]# These extensions are added when 'ca' signs a request.# This goes against PKIX guidelines but some CAs do it and some software# requires this to avoid interpreting an end user certificate as a CA.basicConstraints=CA:FALSE# Here are some examples of the usage of nsCertType. If it is omitted# the certificate can be used for anything *except* object signing.# This is OK for an SSL server.nsCertType = server# This is typical alsokeyUsage = nonRepudiation, digitalSignature, keyEnciphermentnsComment = "OpenCA Server Certificate"# PKIX recommendationssubjectKeyIdentifier=hashauthorityKeyIdentifier=keyid,issuer:always# Import the email address.subjectAltName=email:copy# Copy subject detailsissuerAltName=issuer:copynsCaRevocationUrl = https://www.openca.org/cgi-bin/getcrl#nsBaseUrlnsRevocationUrl = https://www.openca.org/cgi-bin/getcrlnsRenewalUrl = https://www.openca.org:4443/renewal#nsCaPolicyUrl#nsSslServerName = $ENV::SERVER_NAME#################################################################[ user_objsign_cert ]# These extensions are added when 'ca' signs a request.# This goes against PKIX guidelines but some CAs do it and some software# requires this to avoid interpreting an end user certificate as a CA.basicConstraints=CA:FALSE# Here are some examples of the usage of nsCertType. If it is omitted# the certificate can be used for anything *except* object signing.# This is OK for an SSL server.#nsCertType = server# For an object signing certificate this would be used.nsCertType = objsign# For normal client use this is typicalnsCertType = client, email, objsign# This is typical alsokeyUsage = nonRepudiation, digitalSignature, keyEnciphermentnsComment = "OpenCA User ObjSign Certificate"# PKIX recommendationssubjectKeyIdentifier=hashauthorityKeyIdentifier=keyid,issuer:always# Import the email address.subjectAltName=email:copy# Copy subject detailsissuerAltName=issuer:copynsCaRevocationUrl = https://www.openca.org/cgi-bin/getcrl#nsBaseUrlnsRevocationUrl = https://www.openca.org/cgi-bin/getcrlnsRenewalUrl = https://www.openca.org:4443/renewal#nsCaPolicyUrl#nsSslServerName#################################################################[ server_objsign_cert ]# These extensions are added when 'ca' signs a request.# This goes against PKIX guidelines but some CAs do it and some software# requires this to avoid interpreting an end user certificate as a CA.basicConstraints=CA:FALSE# Here are some examples of the usage of nsCertType. If it is omitted# the certificate can be used for anything *except* object signing.# This is OK for an SSL server.nsCertType = server, objsign# This is typical alsokeyUsage = nonRepudiation, digitalSignature, keyEnciphermentnsComment = "OpenCA Server ObjSign Certificate"# PKIX recommendationssubjectKeyIdentifier=hashauthorityKeyIdentifier=keyid,issuer:always# Import the email address.subjectAltName=email:copy# Copy subject detailsissuerAltName=issuer:copynsCaRevocationUrl = https://www.openca.org/cgi-bin/getcrl#nsBaseUrlnsRevocationUrl = https://www.openca.org/cgi-bin/getcrlnsRenewalUrl = https://www.openca.org:4443/renewal#nsCaPolicyUrl#nsSslServerName = $ENV::SERVER_NAME#################################################################[ crl_ext ]# CRL extensions.# Only issuerAltName and authorityKeyIdentifier make any sense in a CRL.# As Netscape only accepts CLRs Version1, DON't use CRL's extensions# at least if you are uning Netscape 4.5(-).# issuerAltName=issuer:copy# authorityKeyIdentifier=keyid:always,issuer:always
?? 快捷鍵說明
復制代碼
Ctrl + C
搜索代碼
Ctrl + F
全屏模式
F11
切換主題
Ctrl + Shift + D
顯示快捷鍵
?
增大字號
Ctrl + =
減小字號
Ctrl + -