Annotation of embedaddon/strongswan/src/pki/man/pki.1.in, revision 1.1.1.1
1.1 misho 1: .TH PKI 1 "2015-08-06" "@PACKAGE_VERSION@" "strongSwan"
2: .
3: .SH "NAME"
4: .
5: pki \- Simple public key infrastructure (PKI) management tool
6: .
7: .SH "SYNOPSIS"
8: .
9: .SY "pki"
10: .I command
11: .RI [ option\~ .\|.\|.]
12: .YS
13: .
14: .SY "pki"
15: .B \-h
16: |
17: .B \-\-help
18: .YS
19: .
20: .SH "DESCRIPTION"
21: .
22: .B pki
23: is a suite of commands that allow you to manage a simple public key
24: infrastructure (PKI).
25: .P
26: Generate RSA and ECDSA key pairs, create PKCS#10 certificate requests
27: containing subjectAltNames, create X.509 self-signed end-entity and root CA
28: certificates, issue end-entity and intermediate CA certificates signed by the
29: private key of a CA and containing subjectAltNames, CRL distribution points
30: and URIs of OCSP servers. You can also extract raw public keys from private
31: keys, certificate requests and certificates and compute two kinds of SHA-1-based
32: key IDs.
33: .
34: .SH "COMMANDS"
35: .
36: .TP
37: .B "\-h, \-\-help"
38: Prints usage information and a short summary of the available commands.
39: .TP
40: .B "\-g, \-\-gen"
41: Generate a new private key.
42: .TP
43: .B "\-s, \-\-self"
44: Create a self-signed certificate.
45: .TP
46: .B "\-i, \-\-issue"
47: Issue a certificate using a CA certificate and key.
48: .TP
49: .B "\-c, \-\-signcrl"
50: Issue a CRL using a CA certificate and key.
51: .TP
52: .B "\-z, \-\-acert"
53: Issue an attribute certificate.
54: .TP
55: .B "\-r, \-\-req"
56: Create a PKCS#10 certificate request.
57: .TP
58: .B "\-7, \-\-pkcs7"
59: Provides PKCS#7 wrap/unwrap functions.
60: .TP
61: .B "\-k, \-\-keyid"
62: Calculate key identifiers of a key or certificate.
63: .TP
64: .B "\-a, \-\-print"
65: Print a credential (key, certificate etc.) in human readable form.
66: .TP
67: .B "\-d, \-\-dn"
68: Extract the subject DN of an X.509 certificate.
69: .TP
70: .B "\-p, \-\-pub"
71: Extract a public key from a private key or certificate.
72: .TP
73: .B "\-v, \-\-verify"
74: Verify a certificate using a CA certificate.
75: .
76: .SH "EXAMPLES"
77: .
78: .SS "Generating a CA Certificate"
79: .
80: The first step is to generate a private key using the
81: .B \-\-gen
82: command. By default this generates a 2048-bit RSA key.
83: .PP
84: .EX
85: pki \-\-gen > ca_key.der
86: .EE
87: .PP
88: This key is used to create the self-signed CA certificate, using the
89: .B \-\-self
90: command. The distinguished name should be adjusted to your needs.
91: .PP
92: .EX
93: pki \-\-self \-\-ca \-\-in ca_key.der \\
94: \-\-dn "C=CH, O=strongSwan, CN=strongSwan CA" > ca_cert.der
95: .EE
96: .PP
97: .
98: .SS "Generating End-Entity Certificates"
99: .
100: With the root CA certificate and key at hand end-entity certificates for clients
101: and servers can be issued. Similarly intermediate CA certificates can be issued,
102: which in turn can issue other certificates.
103: To generate a certificate for a server, we start by generating a private key.
104: .PP
105: .EX
106: pki \-\-gen > server_key.der
107: .EE
108: .PP
109: The public key will be included in the certificate so lets extract that from the
110: private key.
111: .PP
112: .EX
113: pki \-\-pub \-\-in server_key.der > server_pub.der
114: .EE
115: .PP
116: The following command will use the CA certificate and private key to issue the
117: certificate for this server. Adjust the distinguished name, subjectAltName(s)
118: and flags as needed (check
119: .BR pki\ \-\-issue (8)
120: for more options).
121: .PP
122: .EX
123: pki \-\-issue \-\-in server_pub.der \-\-cacert ca_cert.der \\
124: \-\-cakey ca_key.der \-\-dn "C=CH, O=strongSwan, CN=VPN Server" \\
125: \-\-san vpn.strongswan.org \-\-flag serverAuth > server_cert.der
126: .EE
127: .PP
128: Instead of storing the public key in a separate
129: file, the output of
130: .B \-\-pub
131: may also be piped directly into the above command.
132: .
133: .SS "Generating Certificate Revocation Lists (CRL)"
134: .
135: If end-entity certificates have to be revoked, CRLs may be generated using
136: the
137: .B \-\-signcrl
138: command.
139: .PP
140: .EX
141: pki \-\-signcrl \-\-cacert ca_cert.der \-\-cakey ca_key.der \\
142: \-\-reason superseded \-\-cert server_cert.der > crl.der
143: .EE
144: .PP
145: The certificate given with \-\-cacert must be either a CA certificate or a
146: certificate with the
147: .I crlSign
148: extended key usage (\-\-flag crlSign). URIs to CRLs may be included in issued
149: certificates with the \-\-crl option.
150: .
151: .SH "SEE ALSO"
152: .
153: .BR pki\ \-\-gen (1),
154: .BR pki\ \-\-self (1),
155: .BR pki\ \-\-issue (1),
156: .BR pki\ \-\-signcrl (1),
157: .BR pki\ \-\-acert (1),
158: .BR pki\ \-\-req (1),
159: .BR pki\ \-\-pkcs7 (1),
160: .BR pki\ \-\-keyid (1),
161: .BR pki\ \-\-print (1),
162: .BR pki\ \-\-dn (1),
163: .BR pki\ \-\-pub (1),
164: .BR pki\ \-\-verify (1)
FreeBSD-CVSweb <freebsd-cvsweb@FreeBSD.org>