blob: dbe8cbefe0eaff39e0abd55754878cd48c7beb18 [file] [log] [blame]
Ralf S. Engelschalld02b48c1998-12-21 10:52:47 +00001#
Ralf S. Engelschall06d5b161999-01-02 12:59:33 +00002# OpenSSL example configuration file.
Ralf S. Engelschalld02b48c1998-12-21 10:52:47 +00003# This is mostly being used for generation of certificate requests.
4#
5
Dr. Stephen Henson36217a91999-12-24 23:53:57 +00006# This definition stops the following lines choking if HOME isn't
7# defined.
8HOME = .
Ralf S. Engelschalld02b48c1998-12-21 10:52:47 +00009RANDFILE = $ENV::HOME/.rnd
Dr. Stephen Henson20432ea2000-01-01 16:42:49 +000010
11# Extra OBJECT IDENTIFIER info:
12#oid_file = $ENV::HOME/.oid
Dr. Stephen Hensona43aa731999-02-23 00:07:46 +000013oid_section = new_oids
14
Bodo Möller3f45ed81999-05-17 08:28:37 +000015# To use this configuration file with the "-extfile" option of the
Bodo Möllere186bf91999-05-16 12:17:20 +000016# "openssl x509" utility, name here the section containing the
17# X.509v3 extensions to use:
18# extensions =
19# (Alternatively, use a configuration file that has only
20# X.509v3 extensions in its main [= default] section.)
21
Dr. Stephen Hensona43aa731999-02-23 00:07:46 +000022[ new_oids ]
23
24# We can add new OIDs in here for use by 'ca' and 'req'.
25# Add a simple OID like this:
26# testoid1=1.2.3.4
27# Or use config file substitution like this:
28# testoid2=${testoid1}.5.6
Ralf S. Engelschalld02b48c1998-12-21 10:52:47 +000029
30####################################################################
31[ ca ]
32default_ca = CA_default # The default ca section
33
34####################################################################
35[ CA_default ]
36
37dir = ./demoCA # Where everything is kept
38certs = $dir/certs # Where the issued certs are kept
39crl_dir = $dir/crl # Where the issued crl are kept
40database = $dir/index.txt # database index file.
41new_certs_dir = $dir/newcerts # default place for new certs.
42
43certificate = $dir/cacert.pem # The CA certificate
44serial = $dir/serial # The current serial number
45crl = $dir/crl.pem # The current CRL
46private_key = $dir/private/cakey.pem# The private key
47RANDFILE = $dir/private/.rand # private random number file
48
Dr. Stephen Hensonb2347661999-01-26 01:19:27 +000049x509_extensions = usr_cert # The extentions to add to the cert
Dr. Stephen Henson257e2061999-05-19 23:54:58 +000050
51# Extensions to add to a CRL. Note: Netscape communicator chokes on V2 CRLs
52# so this is commented out by default to leave a V1 CRL.
53# crl_extensions = crl_ext
54
Ralf S. Engelschalld02b48c1998-12-21 10:52:47 +000055default_days = 365 # how long to certify for
56default_crl_days= 30 # how long before next CRL
57default_md = md5 # which md to use.
58preserve = no # keep passed DN ordering
59
60# A few difference way of specifying how similar the request should look
61# For type CA, the listed attributes must be the same, and the optional
62# and supplied fields are just that :-)
63policy = policy_match
64
65# For the CA policy
66[ policy_match ]
67countryName = match
68stateOrProvinceName = match
69organizationName = match
70organizationalUnitName = optional
71commonName = supplied
72emailAddress = optional
73
74# For the 'anything' policy
75# At this point in time, you must list all acceptable 'object'
76# types.
77[ policy_anything ]
78countryName = optional
79stateOrProvinceName = optional
80localityName = optional
81organizationName = optional
82organizationalUnitName = optional
83commonName = supplied
84emailAddress = optional
85
86####################################################################
87[ req ]
88default_bits = 1024
89default_keyfile = privkey.pem
90distinguished_name = req_distinguished_name
91attributes = req_attributes
Dr. Stephen Hensonb2347661999-01-26 01:19:27 +000092x509_extensions = v3_ca # The extentions to add to the self signed cert
Ralf S. Engelschalld02b48c1998-12-21 10:52:47 +000093
Dr. Stephen Henson36217a91999-12-24 23:53:57 +000094# Passwords for private keys if not present they will be prompted for
95# input_password = secret
96# output_password = secret
97
Dr. Stephen Hensonb38f9f62000-01-06 01:26:48 +000098# This sets a mask for permitted string types. There are several options.
Dr. Stephen Henson74400f71999-10-27 00:15:11 +000099# default: PrintableString, T61String, BMPString.
100# pkix : PrintableString, BMPString.
101# utf8only: only UTF8Strings.
Dr. Stephen Hensonb38f9f62000-01-06 01:26:48 +0000102# nombstr : PrintableString, T61String (no BMPStrings or UTF8Strings).
Dr. Stephen Henson74400f71999-10-27 00:15:11 +0000103# MASK:XXXX a literal mask value.
104# WARNING: current versions of Netscape crash on BMPStrings or UTF8Strings
105# so use this option with caution!
Dr. Stephen Hensonb38f9f62000-01-06 01:26:48 +0000106string_mask = nombstr
Dr. Stephen Henson74400f71999-10-27 00:15:11 +0000107
Dr. Stephen Hensonc79b16e1999-08-25 16:59:26 +0000108# req_extensions = v3_req # The extensions to add to a certificate request
109
Ralf S. Engelschalld02b48c1998-12-21 10:52:47 +0000110[ req_distinguished_name ]
111countryName = Country Name (2 letter code)
112countryName_default = AU
113countryName_min = 2
114countryName_max = 2
115
116stateOrProvinceName = State or Province Name (full name)
117stateOrProvinceName_default = Some-State
118
119localityName = Locality Name (eg, city)
120
1210.organizationName = Organization Name (eg, company)
1220.organizationName_default = Internet Widgits Pty Ltd
123
124# we can do this but it is not needed normally :-)
125#1.organizationName = Second Organization Name (eg, company)
Ralf S. Engelschall06d5b161999-01-02 12:59:33 +0000126#1.organizationName_default = World Wide Web Pty Ltd
Ralf S. Engelschalld02b48c1998-12-21 10:52:47 +0000127
128organizationalUnitName = Organizational Unit Name (eg, section)
129#organizationalUnitName_default =
130
131commonName = Common Name (eg, YOUR name)
132commonName_max = 64
133
134emailAddress = Email Address
135emailAddress_max = 40
136
Dr. Stephen Hensona43aa731999-02-23 00:07:46 +0000137# SET-ex3 = SET extension number 3
Ralf S. Engelschalldfeab061998-12-21 11:00:56 +0000138
Ralf S. Engelschalld02b48c1998-12-21 10:52:47 +0000139[ req_attributes ]
140challengePassword = A challenge password
141challengePassword_min = 4
142challengePassword_max = 20
143
144unstructuredName = An optional company name
145
Dr. Stephen Hensonb2347661999-01-26 01:19:27 +0000146[ usr_cert ]
Ralf S. Engelschalld02b48c1998-12-21 10:52:47 +0000147
Dr. Stephen Hensonb2347661999-01-26 01:19:27 +0000148# These extensions are added when 'ca' signs a request.
Ralf S. Engelschalld02b48c1998-12-21 10:52:47 +0000149
Dr. Stephen Hensonb2347661999-01-26 01:19:27 +0000150# This goes against PKIX guidelines but some CAs do it and some software
151# requires this to avoid interpreting an end user certificate as a CA.
Ralf S. Engelschalld02b48c1998-12-21 10:52:47 +0000152
Dr. Stephen Hensonb2347661999-01-26 01:19:27 +0000153basicConstraints=CA:FALSE
154
155# Here are some examples of the usage of nsCertType. If it is omitted
156# the certificate can be used for anything *except* object signing.
157
158# This is OK for an SSL server.
Dr. Stephen Henson257e2061999-05-19 23:54:58 +0000159# nsCertType = server
Dr. Stephen Hensonb2347661999-01-26 01:19:27 +0000160
161# For an object signing certificate this would be used.
Dr. Stephen Henson257e2061999-05-19 23:54:58 +0000162# nsCertType = objsign
Dr. Stephen Hensonb2347661999-01-26 01:19:27 +0000163
164# For normal client use this is typical
Dr. Stephen Henson257e2061999-05-19 23:54:58 +0000165# nsCertType = client, email
Dr. Stephen Hensonb2347661999-01-26 01:19:27 +0000166
Dr. Stephen Henson257e2061999-05-19 23:54:58 +0000167# and for everything including object signing:
168# nsCertType = client, email, objsign
Dr. Stephen Hensonb2347661999-01-26 01:19:27 +0000169
Dr. Stephen Henson257e2061999-05-19 23:54:58 +0000170# This is typical in keyUsage for a client certificate.
171# keyUsage = nonRepudiation, digitalSignature, keyEncipherment
Dr. Stephen Hensonb2347661999-01-26 01:19:27 +0000172
Dr. Stephen Henson257e2061999-05-19 23:54:58 +0000173# This will be displayed in Netscape's comment listbox.
Dr. Stephen Hensonb2347661999-01-26 01:19:27 +0000174nsComment = "OpenSSL Generated Certificate"
Dr. Stephen Henson0be97471999-02-17 23:22:57 +0000175
Dr. Stephen Henson257e2061999-05-19 23:54:58 +0000176# PKIX recommendations harmless if included in all certificates.
Dr. Stephen Henson175b0941999-02-10 01:12:59 +0000177subjectKeyIdentifier=hash
Dr. Stephen Henson0be97471999-02-17 23:22:57 +0000178authorityKeyIdentifier=keyid,issuer:always
179
Dr. Stephen Henson257e2061999-05-19 23:54:58 +0000180# This stuff is for subjectAltName and issuerAltname.
Dr. Stephen Hensonaa066b91999-02-21 01:46:45 +0000181# Import the email address.
Dr. Stephen Henson257e2061999-05-19 23:54:58 +0000182# subjectAltName=email:copy
Dr. Stephen Hensonaa066b91999-02-21 01:46:45 +0000183
184# Copy subject details
Dr. Stephen Henson257e2061999-05-19 23:54:58 +0000185# issuerAltName=issuer:copy
Dr. Stephen Hensonb2347661999-01-26 01:19:27 +0000186
187#nsCaRevocationUrl = http://www.domain.dom/ca-crl.pem
Ralf S. Engelschalld02b48c1998-12-21 10:52:47 +0000188#nsBaseUrl
189#nsRevocationUrl
190#nsRenewalUrl
191#nsCaPolicyUrl
192#nsSslServerName
Ralf S. Engelschalld02b48c1998-12-21 10:52:47 +0000193
Dr. Stephen Hensonc79b16e1999-08-25 16:59:26 +0000194[ v3_req ]
195
196# Extensions to add to a certificate request
197
198basicConstraints = CA:FALSE
199keyUsage = nonRepudiation, digitalSignature, keyEncipherment
200
Ralf S. Engelschall5a97a0b1999-08-08 09:39:43 +0000201[ v3_ca ]
Dr. Stephen Hensonf317aa41999-01-25 01:09:21 +0000202
Dr. Stephen Hensonc79b16e1999-08-25 16:59:26 +0000203
Dr. Stephen Hensonf317aa41999-01-25 01:09:21 +0000204# Extensions for a typical CA
205
Dr. Stephen Hensonb2347661999-01-26 01:19:27 +0000206
Dr. Stephen Henson175b0941999-02-10 01:12:59 +0000207# PKIX recommendation.
208
209subjectKeyIdentifier=hash
210
Dr. Stephen Henson0be97471999-02-17 23:22:57 +0000211authorityKeyIdentifier=keyid:always,issuer:always
212
Dr. Stephen Hensonb2347661999-01-26 01:19:27 +0000213# This is what PKIX recommends but some broken software chokes on critical
214# extensions.
215#basicConstraints = critical,CA:true
Dr. Stephen Henson257e2061999-05-19 23:54:58 +0000216# So we do this instead.
217basicConstraints = CA:true
Dr. Stephen Hensonb2347661999-01-26 01:19:27 +0000218
Dr. Stephen Henson257e2061999-05-19 23:54:58 +0000219# Key usage: this is typical for a CA certificate. However since it will
220# prevent it being used as an test self-signed certificate it is best
221# left out by default.
222# keyUsage = cRLSign, keyCertSign
Dr. Stephen Hensonf317aa41999-01-25 01:09:21 +0000223
Dr. Stephen Hensonb2347661999-01-26 01:19:27 +0000224# Some might want this also
Dr. Stephen Henson257e2061999-05-19 23:54:58 +0000225# nsCertType = sslCA, emailCA
Dr. Stephen Henson388ff0b1999-02-14 16:48:22 +0000226
Dr. Stephen Hensonaa066b91999-02-21 01:46:45 +0000227# Include email address in subject alt name: another PKIX recommendation
Dr. Stephen Henson257e2061999-05-19 23:54:58 +0000228# subjectAltName=email:copy
Dr. Stephen Hensonaa066b91999-02-21 01:46:45 +0000229# Copy issuer details
Dr. Stephen Henson257e2061999-05-19 23:54:58 +0000230# issuerAltName=issuer:copy
Dr. Stephen Hensonaa066b91999-02-21 01:46:45 +0000231
Dr. Stephen Hensonc79b16e1999-08-25 16:59:26 +0000232# DER hex encoding of an extension: beware experts only!
233# obj=DER:02:03
234# Where 'obj' is a standard or added object
Dr. Stephen Henson388ff0b1999-02-14 16:48:22 +0000235# You can even override a supported extension:
Dr. Stephen Hensonc79b16e1999-08-25 16:59:26 +0000236# basicConstraints= critical, DER:30:03:01:01:FF
Dr. Stephen Henson1756d401999-03-06 19:33:29 +0000237
238[ crl_ext ]
239
240# CRL extensions.
241# Only issuerAltName and authorityKeyIdentifier make any sense in a CRL.
242
Dr. Stephen Henson257e2061999-05-19 23:54:58 +0000243# issuerAltName=issuer:copy
Dr. Stephen Henson1756d401999-03-06 19:33:29 +0000244authorityKeyIdentifier=keyid:always,issuer:always