Annotation of elwix/config/etc/default/ssl/openssl.cnf, revision 1.1.1.1

1.1       misho       1: # $FreeBSD: src/crypto/openssl/apps/openssl.cnf,v 1.8 2006/07/29 19:14:46 simon Exp $
                      2: #
                      3: # OpenSSL example configuration file.
                      4: # This is mostly being used for generation of certificate requests.
                      5: #
                      6: 
                      7: # This definition stops the following lines choking if HOME isn't
                      8: # defined.
                      9: HOME                   = .
                     10: RANDFILE               = $ENV::HOME/.rnd
                     11: 
                     12: # Extra OBJECT IDENTIFIER info:
                     13: #oid_file              = $ENV::HOME/.oid
                     14: oid_section            = new_oids
                     15: 
                     16: # To use this configuration file with the "-extfile" option of the
                     17: # "openssl x509" utility, name here the section containing the
                     18: # X.509v3 extensions to use:
                     19: # extensions           = 
                     20: # (Alternatively, use a configuration file that has only
                     21: # X.509v3 extensions in its main [= default] section.)
                     22: 
                     23: [ new_oids ]
                     24: 
                     25: # We can add new OIDs in here for use by 'ca' and 'req'.
                     26: # Add a simple OID like this:
                     27: # testoid1=1.2.3.4
                     28: # Or use config file substitution like this:
                     29: # testoid2=${testoid1}.5.6
                     30: 
                     31: ####################################################################
                     32: [ ca ]
                     33: default_ca     = CA_default            # The default ca section
                     34: 
                     35: ####################################################################
                     36: [ CA_default ]
                     37: 
                     38: dir            = ./demoCA              # Where everything is kept
                     39: certs          = $dir/certs            # Where the issued certs are kept
                     40: crl_dir                = $dir/crl              # Where the issued crl are kept
                     41: database       = $dir/index.txt        # database index file.
                     42: #unique_subject        = no                    # Set to 'no' to allow creation of
                     43:                                        # several ctificates with same subject.
                     44: new_certs_dir  = $dir/newcerts         # default place for new certs.
                     45: 
                     46: certificate    = $dir/cacert.pem       # The CA certificate
                     47: serial         = $dir/serial           # The current serial number
                     48: crlnumber      = $dir/crlnumber        # the current crl number
                     49:                                        # must be commented out to leave a V1 CRL
                     50: crl            = $dir/crl.pem          # The current CRL
                     51: private_key    = $dir/private/cakey.pem# The private key
                     52: RANDFILE       = $dir/private/.rand    # private random number file
                     53: 
                     54: x509_extensions        = usr_cert              # The extentions to add to the cert
                     55: 
                     56: # Comment out the following two lines for the "traditional"
                     57: # (and highly broken) format.
                     58: name_opt       = ca_default            # Subject Name options
                     59: cert_opt       = ca_default            # Certificate field options
                     60: 
                     61: # Extension copying option: use with caution.
                     62: # copy_extensions = copy
                     63: 
                     64: # Extensions to add to a CRL. Note: Netscape communicator chokes on V2 CRLs
                     65: # so this is commented out by default to leave a V1 CRL.
                     66: # crlnumber must also be commented out to leave a V1 CRL.
                     67: # crl_extensions       = crl_ext
                     68: 
                     69: default_days   = 365                   # how long to certify for
                     70: default_crl_days= 30                   # how long before next CRL
                     71: default_md     = sha1                  # which md to use.
                     72: preserve       = no                    # keep passed DN ordering
                     73: 
                     74: # A few difference way of specifying how similar the request should look
                     75: # For type CA, the listed attributes must be the same, and the optional
                     76: # and supplied fields are just that :-)
                     77: policy         = policy_match
                     78: 
                     79: # For the CA policy
                     80: [ policy_match ]
                     81: countryName            = match
                     82: stateOrProvinceName    = match
                     83: organizationName       = match
                     84: organizationalUnitName = optional
                     85: commonName             = supplied
                     86: emailAddress           = optional
                     87: 
                     88: # For the 'anything' policy
                     89: # At this point in time, you must list all acceptable 'object'
                     90: # types.
                     91: [ policy_anything ]
                     92: countryName            = optional
                     93: stateOrProvinceName    = optional
                     94: localityName           = optional
                     95: organizationName       = optional
                     96: organizationalUnitName = optional
                     97: commonName             = supplied
                     98: emailAddress           = optional
                     99: 
                    100: ####################################################################
                    101: [ req ]
                    102: default_bits           = 1024
                    103: default_keyfile        = privkey.pem
                    104: distinguished_name     = req_distinguished_name
                    105: attributes             = req_attributes
                    106: x509_extensions        = v3_ca # The extentions to add to the self signed cert
                    107: 
                    108: # Passwords for private keys if not present they will be prompted for
                    109: # input_password = secret
                    110: # output_password = secret
                    111: 
                    112: # This sets a mask for permitted string types. There are several options. 
                    113: # default: PrintableString, T61String, BMPString.
                    114: # pkix  : PrintableString, BMPString.
                    115: # utf8only: only UTF8Strings.
                    116: # nombstr : PrintableString, T61String (no BMPStrings or UTF8Strings).
                    117: # MASK:XXXX a literal mask value.
                    118: # WARNING: current versions of Netscape crash on BMPStrings or UTF8Strings
                    119: # so use this option with caution!
                    120: string_mask = nombstr
                    121: 
                    122: # req_extensions = v3_req # The extensions to add to a certificate request
                    123: 
                    124: [ req_distinguished_name ]
                    125: countryName                    = Country Name (2 letter code)
                    126: countryName_default            = AU
                    127: countryName_min                        = 2
                    128: countryName_max                        = 2
                    129: 
                    130: stateOrProvinceName            = State or Province Name (full name)
                    131: stateOrProvinceName_default    = Some-State
                    132: 
                    133: localityName                   = Locality Name (eg, city)
                    134: 
                    135: 0.organizationName             = Organization Name (eg, company)
                    136: 0.organizationName_default     = Internet Widgits Pty Ltd
                    137: 
                    138: # we can do this but it is not needed normally :-)
                    139: #1.organizationName            = Second Organization Name (eg, company)
                    140: #1.organizationName_default    = World Wide Web Pty Ltd
                    141: 
                    142: organizationalUnitName         = Organizational Unit Name (eg, section)
                    143: #organizationalUnitName_default        =
                    144: 
                    145: commonName                     = Common Name (eg, YOUR name)
                    146: commonName_max                 = 64
                    147: 
                    148: emailAddress                   = Email Address
                    149: emailAddress_max               = 64
                    150: 
                    151: # SET-ex3                      = SET extension number 3
                    152: 
                    153: [ req_attributes ]
                    154: challengePassword              = A challenge password
                    155: challengePassword_min          = 4
                    156: challengePassword_max          = 20
                    157: 
                    158: unstructuredName               = An optional company name
                    159: 
                    160: [ usr_cert ]
                    161: 
                    162: # These extensions are added when 'ca' signs a request.
                    163: 
                    164: # This goes against PKIX guidelines but some CAs do it and some software
                    165: # requires this to avoid interpreting an end user certificate as a CA.
                    166: 
                    167: basicConstraints=CA:FALSE
                    168: 
                    169: # Here are some examples of the usage of nsCertType. If it is omitted
                    170: # the certificate can be used for anything *except* object signing.
                    171: 
                    172: # This is OK for an SSL server.
                    173: # nsCertType                   = server
                    174: 
                    175: # For an object signing certificate this would be used.
                    176: # nsCertType = objsign
                    177: 
                    178: # For normal client use this is typical
                    179: # nsCertType = client, email
                    180: 
                    181: # and for everything including object signing:
                    182: # nsCertType = client, email, objsign
                    183: 
                    184: # This is typical in keyUsage for a client certificate.
                    185: # keyUsage = nonRepudiation, digitalSignature, keyEncipherment
                    186: 
                    187: # This will be displayed in Netscape's comment listbox.
                    188: nsComment                      = "OpenSSL Generated Certificate"
                    189: 
                    190: # PKIX recommendations harmless if included in all certificates.
                    191: subjectKeyIdentifier=hash
                    192: authorityKeyIdentifier=keyid,issuer
                    193: 
                    194: # This stuff is for subjectAltName and issuerAltname.
                    195: # Import the email address.
                    196: # subjectAltName=email:copy
                    197: # An alternative to produce certificates that aren't
                    198: # deprecated according to PKIX.
                    199: # subjectAltName=email:move
                    200: 
                    201: # Copy subject details
                    202: # issuerAltName=issuer:copy
                    203: 
                    204: #nsCaRevocationUrl             = http://www.domain.dom/ca-crl.pem
                    205: #nsBaseUrl
                    206: #nsRevocationUrl
                    207: #nsRenewalUrl
                    208: #nsCaPolicyUrl
                    209: #nsSslServerName
                    210: 
                    211: [ v3_req ]
                    212: 
                    213: # Extensions to add to a certificate request
                    214: 
                    215: basicConstraints = CA:FALSE
                    216: keyUsage = nonRepudiation, digitalSignature, keyEncipherment
                    217: 
                    218: [ v3_ca ]
                    219: 
                    220: 
                    221: # Extensions for a typical CA
                    222: 
                    223: 
                    224: # PKIX recommendation.
                    225: 
                    226: subjectKeyIdentifier=hash
                    227: 
                    228: authorityKeyIdentifier=keyid:always,issuer:always
                    229: 
                    230: # This is what PKIX recommends but some broken software chokes on critical
                    231: # extensions.
                    232: #basicConstraints = critical,CA:true
                    233: # So we do this instead.
                    234: basicConstraints = CA:true
                    235: 
                    236: # Key usage: this is typical for a CA certificate. However since it will
                    237: # prevent it being used as an test self-signed certificate it is best
                    238: # left out by default.
                    239: # keyUsage = cRLSign, keyCertSign
                    240: 
                    241: # Some might want this also
                    242: # nsCertType = sslCA, emailCA
                    243: 
                    244: # Include email address in subject alt name: another PKIX recommendation
                    245: # subjectAltName=email:copy
                    246: # Copy issuer details
                    247: # issuerAltName=issuer:copy
                    248: 
                    249: # DER hex encoding of an extension: beware experts only!
                    250: # obj=DER:02:03
                    251: # Where 'obj' is a standard or added object
                    252: # You can even override a supported extension:
                    253: # basicConstraints= critical, DER:30:03:01:01:FF
                    254: 
                    255: [ crl_ext ]
                    256: 
                    257: # CRL extensions.
                    258: # Only issuerAltName and authorityKeyIdentifier make any sense in a CRL.
                    259: 
                    260: # issuerAltName=issuer:copy
                    261: authorityKeyIdentifier=keyid:always,issuer:always
                    262: 
                    263: [ proxy_cert_ext ]
                    264: # These extensions should be added when creating a proxy certificate
                    265: 
                    266: # This goes against PKIX guidelines but some CAs do it and some software
                    267: # requires this to avoid interpreting an end user certificate as a CA.
                    268: 
                    269: basicConstraints=CA:FALSE
                    270: 
                    271: # Here are some examples of the usage of nsCertType. If it is omitted
                    272: # the certificate can be used for anything *except* object signing.
                    273: 
                    274: # This is OK for an SSL server.
                    275: # nsCertType                   = server
                    276: 
                    277: # For an object signing certificate this would be used.
                    278: # nsCertType = objsign
                    279: 
                    280: # For normal client use this is typical
                    281: # nsCertType = client, email
                    282: 
                    283: # and for everything including object signing:
                    284: # nsCertType = client, email, objsign
                    285: 
                    286: # This is typical in keyUsage for a client certificate.
                    287: # keyUsage = nonRepudiation, digitalSignature, keyEncipherment
                    288: 
                    289: # This will be displayed in Netscape's comment listbox.
                    290: nsComment                      = "OpenSSL Generated Certificate"
                    291: 
                    292: # PKIX recommendations harmless if included in all certificates.
                    293: subjectKeyIdentifier=hash
                    294: authorityKeyIdentifier=keyid,issuer:always
                    295: 
                    296: # This stuff is for subjectAltName and issuerAltname.
                    297: # Import the email address.
                    298: # subjectAltName=email:copy
                    299: # An alternative to produce certificates that aren't
                    300: # deprecated according to PKIX.
                    301: # subjectAltName=email:move
                    302: 
                    303: # Copy subject details
                    304: # issuerAltName=issuer:copy
                    305: 
                    306: #nsCaRevocationUrl             = http://www.domain.dom/ca-crl.pem
                    307: #nsBaseUrl
                    308: #nsRevocationUrl
                    309: #nsRenewalUrl
                    310: #nsCaPolicyUrl
                    311: #nsSslServerName
                    312: 
                    313: # This really needs to be in place for it to be a proxy certificate.
                    314: proxyCertInfo=critical,language:id-ppl-anyLanguage,pathlen:3,policy:foo

FreeBSD-CVSweb <freebsd-cvsweb@FreeBSD.org>