1 | =pod
|
---|
2 |
|
---|
3 | =head1 NAME
|
---|
4 |
|
---|
5 | openssl-req,
|
---|
6 | req - PKCS#10 certificate request and certificate generating utility
|
---|
7 |
|
---|
8 | =head1 SYNOPSIS
|
---|
9 |
|
---|
10 | B<openssl> B<req>
|
---|
11 | [B<-help>]
|
---|
12 | [B<-inform PEM|DER>]
|
---|
13 | [B<-outform PEM|DER>]
|
---|
14 | [B<-in filename>]
|
---|
15 | [B<-passin arg>]
|
---|
16 | [B<-out filename>]
|
---|
17 | [B<-passout arg>]
|
---|
18 | [B<-text>]
|
---|
19 | [B<-pubkey>]
|
---|
20 | [B<-noout>]
|
---|
21 | [B<-verify>]
|
---|
22 | [B<-modulus>]
|
---|
23 | [B<-new>]
|
---|
24 | [B<-rand file...>]
|
---|
25 | [B<-writerand file>]
|
---|
26 | [B<-newkey rsa:bits>]
|
---|
27 | [B<-newkey alg:file>]
|
---|
28 | [B<-nodes>]
|
---|
29 | [B<-key filename>]
|
---|
30 | [B<-keyform PEM|DER>]
|
---|
31 | [B<-keyout filename>]
|
---|
32 | [B<-keygen_engine id>]
|
---|
33 | [B<-I<digest>>]
|
---|
34 | [B<-config filename>]
|
---|
35 | [B<-multivalue-rdn>]
|
---|
36 | [B<-x509>]
|
---|
37 | [B<-days n>]
|
---|
38 | [B<-set_serial n>]
|
---|
39 | [B<-newhdr>]
|
---|
40 | [B<-addext ext>]
|
---|
41 | [B<-extensions section>]
|
---|
42 | [B<-reqexts section>]
|
---|
43 | [B<-precert>]
|
---|
44 | [B<-utf8>]
|
---|
45 | [B<-nameopt>]
|
---|
46 | [B<-reqopt>]
|
---|
47 | [B<-subject>]
|
---|
48 | [B<-subj arg>]
|
---|
49 | [B<-sigopt nm:v>]
|
---|
50 | [B<-batch>]
|
---|
51 | [B<-verbose>]
|
---|
52 | [B<-engine id>]
|
---|
53 |
|
---|
54 | =head1 DESCRIPTION
|
---|
55 |
|
---|
56 | The B<req> command primarily creates and processes certificate requests
|
---|
57 | in PKCS#10 format. It can additionally create self signed certificates
|
---|
58 | for use as root CAs for example.
|
---|
59 |
|
---|
60 | =head1 OPTIONS
|
---|
61 |
|
---|
62 | =over 4
|
---|
63 |
|
---|
64 | =item B<-help>
|
---|
65 |
|
---|
66 | Print out a usage message.
|
---|
67 |
|
---|
68 | =item B<-inform DER|PEM>
|
---|
69 |
|
---|
70 | This specifies the input format. The B<DER> option uses an ASN1 DER encoded
|
---|
71 | form compatible with the PKCS#10. The B<PEM> form is the default format: it
|
---|
72 | consists of the B<DER> format base64 encoded with additional header and
|
---|
73 | footer lines.
|
---|
74 |
|
---|
75 | =item B<-outform DER|PEM>
|
---|
76 |
|
---|
77 | This specifies the output format, the options have the same meaning and default
|
---|
78 | as the B<-inform> option.
|
---|
79 |
|
---|
80 | =item B<-in filename>
|
---|
81 |
|
---|
82 | This specifies the input filename to read a request from or standard input
|
---|
83 | if this option is not specified. A request is only read if the creation
|
---|
84 | options (B<-new> and B<-newkey>) are not specified.
|
---|
85 |
|
---|
86 | =item B<-sigopt nm:v>
|
---|
87 |
|
---|
88 | Pass options to the signature algorithm during sign or verify operations.
|
---|
89 | Names and values of these options are algorithm-specific.
|
---|
90 |
|
---|
91 | =item B<-passin arg>
|
---|
92 |
|
---|
93 | The input file password source. For more information about the format of B<arg>
|
---|
94 | see L<openssl(1)/Pass Phrase Options>.
|
---|
95 |
|
---|
96 | =item B<-out filename>
|
---|
97 |
|
---|
98 | This specifies the output filename to write to or standard output by
|
---|
99 | default.
|
---|
100 |
|
---|
101 | =item B<-passout arg>
|
---|
102 |
|
---|
103 | The output file password source. For more information about the format of B<arg>
|
---|
104 | see L<openssl(1)/Pass Phrase Options>.
|
---|
105 |
|
---|
106 | =item B<-text>
|
---|
107 |
|
---|
108 | Prints out the certificate request in text form.
|
---|
109 |
|
---|
110 | =item B<-subject>
|
---|
111 |
|
---|
112 | Prints out the request subject (or certificate subject if B<-x509> is
|
---|
113 | specified)
|
---|
114 |
|
---|
115 | =item B<-pubkey>
|
---|
116 |
|
---|
117 | Outputs the public key.
|
---|
118 |
|
---|
119 | =item B<-noout>
|
---|
120 |
|
---|
121 | This option prevents output of the encoded version of the request.
|
---|
122 |
|
---|
123 | =item B<-modulus>
|
---|
124 |
|
---|
125 | This option prints out the value of the modulus of the public key
|
---|
126 | contained in the request.
|
---|
127 |
|
---|
128 | =item B<-verify>
|
---|
129 |
|
---|
130 | Verifies the signature on the request.
|
---|
131 |
|
---|
132 | =item B<-new>
|
---|
133 |
|
---|
134 | This option generates a new certificate request. It will prompt
|
---|
135 | the user for the relevant field values. The actual fields
|
---|
136 | prompted for and their maximum and minimum sizes are specified
|
---|
137 | in the configuration file and any requested extensions.
|
---|
138 |
|
---|
139 | If the B<-key> option is not used it will generate a new RSA private
|
---|
140 | key using information specified in the configuration file.
|
---|
141 |
|
---|
142 | =item B<-rand file...>
|
---|
143 |
|
---|
144 | A file or files containing random data used to seed the random number
|
---|
145 | generator.
|
---|
146 | Multiple files can be specified separated by an OS-dependent character.
|
---|
147 | The separator is B<;> for MS-Windows, B<,> for OpenVMS, and B<:> for
|
---|
148 | all others.
|
---|
149 |
|
---|
150 | =item [B<-writerand file>]
|
---|
151 |
|
---|
152 | Writes random data to the specified I<file> upon exit.
|
---|
153 | This can be used with a subsequent B<-rand> flag.
|
---|
154 |
|
---|
155 | =item B<-newkey arg>
|
---|
156 |
|
---|
157 | This option creates a new certificate request and a new private
|
---|
158 | key. The argument takes one of several forms. B<rsa:nbits>, where
|
---|
159 | B<nbits> is the number of bits, generates an RSA key B<nbits>
|
---|
160 | in size. If B<nbits> is omitted, i.e. B<-newkey rsa> specified,
|
---|
161 | the default key size, specified in the configuration file is used.
|
---|
162 |
|
---|
163 | All other algorithms support the B<-newkey alg:file> form, where file may be
|
---|
164 | an algorithm parameter file, created by the B<genpkey -genparam> command
|
---|
165 | or and X.509 certificate for a key with appropriate algorithm.
|
---|
166 |
|
---|
167 | B<param:file> generates a key using the parameter file or certificate B<file>,
|
---|
168 | the algorithm is determined by the parameters. B<algname:file> use algorithm
|
---|
169 | B<algname> and parameter file B<file>: the two algorithms must match or an
|
---|
170 | error occurs. B<algname> just uses algorithm B<algname>, and parameters,
|
---|
171 | if necessary should be specified via B<-pkeyopt> parameter.
|
---|
172 |
|
---|
173 | B<dsa:filename> generates a DSA key using the parameters
|
---|
174 | in the file B<filename>. B<ec:filename> generates EC key (usable both with
|
---|
175 | ECDSA or ECDH algorithms), B<gost2001:filename> generates GOST R
|
---|
176 | 34.10-2001 key (requires B<ccgost> engine configured in the configuration
|
---|
177 | file). If just B<gost2001> is specified a parameter set should be
|
---|
178 | specified by B<-pkeyopt paramset:X>
|
---|
179 |
|
---|
180 |
|
---|
181 | =item B<-pkeyopt opt:value>
|
---|
182 |
|
---|
183 | Set the public key algorithm option B<opt> to B<value>. The precise set of
|
---|
184 | options supported depends on the public key algorithm used and its
|
---|
185 | implementation. See B<KEY GENERATION OPTIONS> in the B<genpkey> manual page
|
---|
186 | for more details.
|
---|
187 |
|
---|
188 | =item B<-key filename>
|
---|
189 |
|
---|
190 | This specifies the file to read the private key from. It also
|
---|
191 | accepts PKCS#8 format private keys for PEM format files.
|
---|
192 |
|
---|
193 | =item B<-keyform PEM|DER>
|
---|
194 |
|
---|
195 | The format of the private key file specified in the B<-key>
|
---|
196 | argument. PEM is the default.
|
---|
197 |
|
---|
198 | =item B<-keyout filename>
|
---|
199 |
|
---|
200 | This gives the filename to write the newly created private key to.
|
---|
201 | If this option is not specified then the filename present in the
|
---|
202 | configuration file is used.
|
---|
203 |
|
---|
204 | =item B<-nodes>
|
---|
205 |
|
---|
206 | If this option is specified then if a private key is created it
|
---|
207 | will not be encrypted.
|
---|
208 |
|
---|
209 | =item B<-I<digest>>
|
---|
210 |
|
---|
211 | This specifies the message digest to sign the request.
|
---|
212 | Any digest supported by the OpenSSL B<dgst> command can be used.
|
---|
213 | This overrides the digest algorithm specified in
|
---|
214 | the configuration file.
|
---|
215 |
|
---|
216 | Some public key algorithms may override this choice. For instance, DSA
|
---|
217 | signatures always use SHA1, GOST R 34.10 signatures always use
|
---|
218 | GOST R 34.11-94 (B<-md_gost94>), Ed25519 and Ed448 never use any digest.
|
---|
219 |
|
---|
220 | =item B<-config filename>
|
---|
221 |
|
---|
222 | This allows an alternative configuration file to be specified.
|
---|
223 | Optional; for a description of the default value,
|
---|
224 | see L<openssl(1)/COMMAND SUMMARY>.
|
---|
225 |
|
---|
226 | =item B<-subj arg>
|
---|
227 |
|
---|
228 | Sets subject name for new request or supersedes the subject name
|
---|
229 | when processing a request.
|
---|
230 | The arg must be formatted as I</type0=value0/type1=value1/type2=...>.
|
---|
231 | Keyword characters may be escaped by \ (backslash), and whitespace is retained.
|
---|
232 | Empty values are permitted, but the corresponding type will not be included
|
---|
233 | in the request.
|
---|
234 |
|
---|
235 | =item B<-multivalue-rdn>
|
---|
236 |
|
---|
237 | This option causes the -subj argument to be interpreted with full
|
---|
238 | support for multivalued RDNs. Example:
|
---|
239 |
|
---|
240 | I</DC=org/DC=OpenSSL/DC=users/UID=123456+CN=John Doe>
|
---|
241 |
|
---|
242 | If -multi-rdn is not used then the UID value is I<123456+CN=John Doe>.
|
---|
243 |
|
---|
244 | =item B<-x509>
|
---|
245 |
|
---|
246 | This option outputs a self signed certificate instead of a certificate
|
---|
247 | request. This is typically used to generate a test certificate or
|
---|
248 | a self signed root CA. The extensions added to the certificate
|
---|
249 | (if any) are specified in the configuration file. Unless specified
|
---|
250 | using the B<set_serial> option, a large random number will be used for
|
---|
251 | the serial number.
|
---|
252 |
|
---|
253 | If existing request is specified with the B<-in> option, it is converted
|
---|
254 | to the self signed certificate otherwise new request is created.
|
---|
255 |
|
---|
256 | =item B<-days n>
|
---|
257 |
|
---|
258 | When the B<-x509> option is being used this specifies the number of
|
---|
259 | days to certify the certificate for, otherwise it is ignored. B<n> should
|
---|
260 | be a positive integer. The default is 30 days.
|
---|
261 |
|
---|
262 | =item B<-set_serial n>
|
---|
263 |
|
---|
264 | Serial number to use when outputting a self signed certificate. This
|
---|
265 | may be specified as a decimal value or a hex value if preceded by B<0x>.
|
---|
266 |
|
---|
267 | =item B<-addext ext>
|
---|
268 |
|
---|
269 | Add a specific extension to the certificate (if the B<-x509> option is
|
---|
270 | present) or certificate request. The argument must have the form of
|
---|
271 | a key=value pair as it would appear in a config file.
|
---|
272 |
|
---|
273 | This option can be given multiple times.
|
---|
274 |
|
---|
275 | =item B<-extensions section>
|
---|
276 |
|
---|
277 | =item B<-reqexts section>
|
---|
278 |
|
---|
279 | These options specify alternative sections to include certificate
|
---|
280 | extensions (if the B<-x509> option is present) or certificate
|
---|
281 | request extensions. This allows several different sections to
|
---|
282 | be used in the same configuration file to specify requests for
|
---|
283 | a variety of purposes.
|
---|
284 |
|
---|
285 | =item B<-precert>
|
---|
286 |
|
---|
287 | A poison extension will be added to the certificate, making it a
|
---|
288 | "pre-certificate" (see RFC6962). This can be submitted to Certificate
|
---|
289 | Transparency logs in order to obtain signed certificate timestamps (SCTs).
|
---|
290 | These SCTs can then be embedded into the pre-certificate as an extension, before
|
---|
291 | removing the poison and signing the certificate.
|
---|
292 |
|
---|
293 | This implies the B<-new> flag.
|
---|
294 |
|
---|
295 | =item B<-utf8>
|
---|
296 |
|
---|
297 | This option causes field values to be interpreted as UTF8 strings, by
|
---|
298 | default they are interpreted as ASCII. This means that the field
|
---|
299 | values, whether prompted from a terminal or obtained from a
|
---|
300 | configuration file, must be valid UTF8 strings.
|
---|
301 |
|
---|
302 | =item B<-nameopt option>
|
---|
303 |
|
---|
304 | Option which determines how the subject or issuer names are displayed. The
|
---|
305 | B<option> argument can be a single option or multiple options separated by
|
---|
306 | commas. Alternatively the B<-nameopt> switch may be used more than once to
|
---|
307 | set multiple options. See the L<x509(1)> manual page for details.
|
---|
308 |
|
---|
309 | =item B<-reqopt>
|
---|
310 |
|
---|
311 | Customise the output format used with B<-text>. The B<option> argument can be
|
---|
312 | a single option or multiple options separated by commas.
|
---|
313 |
|
---|
314 | See discussion of the B<-certopt> parameter in the L<x509(1)>
|
---|
315 | command.
|
---|
316 |
|
---|
317 | =item B<-newhdr>
|
---|
318 |
|
---|
319 | Adds the word B<NEW> to the PEM file header and footer lines on the outputted
|
---|
320 | request. Some software (Netscape certificate server) and some CAs need this.
|
---|
321 |
|
---|
322 | =item B<-batch>
|
---|
323 |
|
---|
324 | Non-interactive mode.
|
---|
325 |
|
---|
326 | =item B<-verbose>
|
---|
327 |
|
---|
328 | Print extra details about the operations being performed.
|
---|
329 |
|
---|
330 | =item B<-engine id>
|
---|
331 |
|
---|
332 | Specifying an engine (by its unique B<id> string) will cause B<req>
|
---|
333 | to attempt to obtain a functional reference to the specified engine,
|
---|
334 | thus initialising it if needed. The engine will then be set as the default
|
---|
335 | for all available algorithms.
|
---|
336 |
|
---|
337 | =item B<-keygen_engine id>
|
---|
338 |
|
---|
339 | Specifies an engine (by its unique B<id> string) which would be used
|
---|
340 | for key generation operations.
|
---|
341 |
|
---|
342 | =back
|
---|
343 |
|
---|
344 | =head1 CONFIGURATION FILE FORMAT
|
---|
345 |
|
---|
346 | The configuration options are specified in the B<req> section of
|
---|
347 | the configuration file. As with all configuration files if no
|
---|
348 | value is specified in the specific section (i.e. B<req>) then
|
---|
349 | the initial unnamed or B<default> section is searched too.
|
---|
350 |
|
---|
351 | The options available are described in detail below.
|
---|
352 |
|
---|
353 | =over 4
|
---|
354 |
|
---|
355 | =item B<input_password output_password>
|
---|
356 |
|
---|
357 | The passwords for the input private key file (if present) and
|
---|
358 | the output private key file (if one will be created). The
|
---|
359 | command line options B<passin> and B<passout> override the
|
---|
360 | configuration file values.
|
---|
361 |
|
---|
362 | =item B<default_bits>
|
---|
363 |
|
---|
364 | Specifies the default key size in bits.
|
---|
365 |
|
---|
366 | This option is used in conjunction with the B<-new> option to generate
|
---|
367 | a new key. It can be overridden by specifying an explicit key size in
|
---|
368 | the B<-newkey> option. The smallest accepted key size is 512 bits. If
|
---|
369 | no key size is specified then 2048 bits is used.
|
---|
370 |
|
---|
371 | =item B<default_keyfile>
|
---|
372 |
|
---|
373 | This is the default filename to write a private key to. If not
|
---|
374 | specified the key is written to standard output. This can be
|
---|
375 | overridden by the B<-keyout> option.
|
---|
376 |
|
---|
377 | =item B<oid_file>
|
---|
378 |
|
---|
379 | This specifies a file containing additional B<OBJECT IDENTIFIERS>.
|
---|
380 | Each line of the file should consist of the numerical form of the
|
---|
381 | object identifier followed by white space then the short name followed
|
---|
382 | by white space and finally the long name.
|
---|
383 |
|
---|
384 | =item B<oid_section>
|
---|
385 |
|
---|
386 | This specifies a section in the configuration file containing extra
|
---|
387 | object identifiers. Each line should consist of the short name of the
|
---|
388 | object identifier followed by B<=> and the numerical form. The short
|
---|
389 | and long names are the same when this option is used.
|
---|
390 |
|
---|
391 | =item B<RANDFILE>
|
---|
392 |
|
---|
393 | At startup the specified file is loaded into the random number generator,
|
---|
394 | and at exit 256 bytes will be written to it.
|
---|
395 | It is used for private key generation.
|
---|
396 |
|
---|
397 | =item B<encrypt_key>
|
---|
398 |
|
---|
399 | If this is set to B<no> then if a private key is generated it is
|
---|
400 | B<not> encrypted. This is equivalent to the B<-nodes> command line
|
---|
401 | option. For compatibility B<encrypt_rsa_key> is an equivalent option.
|
---|
402 |
|
---|
403 | =item B<default_md>
|
---|
404 |
|
---|
405 | This option specifies the digest algorithm to use. Any digest supported by the
|
---|
406 | OpenSSL B<dgst> command can be used. This option can be overridden on the
|
---|
407 | command line. Certain signing algorithms (i.e. Ed25519 and Ed448) will ignore
|
---|
408 | any digest that has been set.
|
---|
409 |
|
---|
410 | =item B<string_mask>
|
---|
411 |
|
---|
412 | This option masks out the use of certain string types in certain
|
---|
413 | fields. Most users will not need to change this option.
|
---|
414 |
|
---|
415 | It can be set to several values B<default> which is also the default
|
---|
416 | option uses PrintableStrings, T61Strings and BMPStrings if the
|
---|
417 | B<pkix> value is used then only PrintableStrings and BMPStrings will
|
---|
418 | be used. This follows the PKIX recommendation in RFC2459. If the
|
---|
419 | B<utf8only> option is used then only UTF8Strings will be used: this
|
---|
420 | is the PKIX recommendation in RFC2459 after 2003. Finally the B<nombstr>
|
---|
421 | option just uses PrintableStrings and T61Strings: certain software has
|
---|
422 | problems with BMPStrings and UTF8Strings: in particular Netscape.
|
---|
423 |
|
---|
424 | =item B<req_extensions>
|
---|
425 |
|
---|
426 | This specifies the configuration file section containing a list of
|
---|
427 | extensions to add to the certificate request. It can be overridden
|
---|
428 | by the B<-reqexts> command line switch. See the
|
---|
429 | L<x509v3_config(5)> manual page for details of the
|
---|
430 | extension section format.
|
---|
431 |
|
---|
432 | =item B<x509_extensions>
|
---|
433 |
|
---|
434 | This specifies the configuration file section containing a list of
|
---|
435 | extensions to add to certificate generated when the B<-x509> switch
|
---|
436 | is used. It can be overridden by the B<-extensions> command line switch.
|
---|
437 |
|
---|
438 | =item B<prompt>
|
---|
439 |
|
---|
440 | If set to the value B<no> this disables prompting of certificate fields
|
---|
441 | and just takes values from the config file directly. It also changes the
|
---|
442 | expected format of the B<distinguished_name> and B<attributes> sections.
|
---|
443 |
|
---|
444 | =item B<utf8>
|
---|
445 |
|
---|
446 | If set to the value B<yes> then field values to be interpreted as UTF8
|
---|
447 | strings, by default they are interpreted as ASCII. This means that
|
---|
448 | the field values, whether prompted from a terminal or obtained from a
|
---|
449 | configuration file, must be valid UTF8 strings.
|
---|
450 |
|
---|
451 | =item B<attributes>
|
---|
452 |
|
---|
453 | This specifies the section containing any request attributes: its format
|
---|
454 | is the same as B<distinguished_name>. Typically these may contain the
|
---|
455 | challengePassword or unstructuredName types. They are currently ignored
|
---|
456 | by OpenSSL's request signing utilities but some CAs might want them.
|
---|
457 |
|
---|
458 | =item B<distinguished_name>
|
---|
459 |
|
---|
460 | This specifies the section containing the distinguished name fields to
|
---|
461 | prompt for when generating a certificate or certificate request. The format
|
---|
462 | is described in the next section.
|
---|
463 |
|
---|
464 | =back
|
---|
465 |
|
---|
466 | =head1 DISTINGUISHED NAME AND ATTRIBUTE SECTION FORMAT
|
---|
467 |
|
---|
468 | There are two separate formats for the distinguished name and attribute
|
---|
469 | sections. If the B<prompt> option is set to B<no> then these sections
|
---|
470 | just consist of field names and values: for example,
|
---|
471 |
|
---|
472 | CN=My Name
|
---|
473 | OU=My Organization
|
---|
474 | [email protected]
|
---|
475 |
|
---|
476 | This allows external programs (e.g. GUI based) to generate a template file
|
---|
477 | with all the field names and values and just pass it to B<req>. An example
|
---|
478 | of this kind of configuration file is contained in the B<EXAMPLES> section.
|
---|
479 |
|
---|
480 | Alternatively if the B<prompt> option is absent or not set to B<no> then the
|
---|
481 | file contains field prompting information. It consists of lines of the form:
|
---|
482 |
|
---|
483 | fieldName="prompt"
|
---|
484 | fieldName_default="default field value"
|
---|
485 | fieldName_min= 2
|
---|
486 | fieldName_max= 4
|
---|
487 |
|
---|
488 | "fieldName" is the field name being used, for example commonName (or CN).
|
---|
489 | The "prompt" string is used to ask the user to enter the relevant
|
---|
490 | details. If the user enters nothing then the default value is used if no
|
---|
491 | default value is present then the field is omitted. A field can
|
---|
492 | still be omitted if a default value is present if the user just
|
---|
493 | enters the '.' character.
|
---|
494 |
|
---|
495 | The number of characters entered must be between the fieldName_min and
|
---|
496 | fieldName_max limits: there may be additional restrictions based
|
---|
497 | on the field being used (for example countryName can only ever be
|
---|
498 | two characters long and must fit in a PrintableString).
|
---|
499 |
|
---|
500 | Some fields (such as organizationName) can be used more than once
|
---|
501 | in a DN. This presents a problem because configuration files will
|
---|
502 | not recognize the same name occurring twice. To avoid this problem
|
---|
503 | if the fieldName contains some characters followed by a full stop
|
---|
504 | they will be ignored. So for example a second organizationName can
|
---|
505 | be input by calling it "1.organizationName".
|
---|
506 |
|
---|
507 | The actual permitted field names are any object identifier short or
|
---|
508 | long names. These are compiled into OpenSSL and include the usual
|
---|
509 | values such as commonName, countryName, localityName, organizationName,
|
---|
510 | organizationalUnitName, stateOrProvinceName. Additionally emailAddress
|
---|
511 | is included as well as name, surname, givenName, initials, and dnQualifier.
|
---|
512 |
|
---|
513 | Additional object identifiers can be defined with the B<oid_file> or
|
---|
514 | B<oid_section> options in the configuration file. Any additional fields
|
---|
515 | will be treated as though they were a DirectoryString.
|
---|
516 |
|
---|
517 |
|
---|
518 | =head1 EXAMPLES
|
---|
519 |
|
---|
520 | Examine and verify certificate request:
|
---|
521 |
|
---|
522 | openssl req -in req.pem -text -verify -noout
|
---|
523 |
|
---|
524 | Create a private key and then generate a certificate request from it:
|
---|
525 |
|
---|
526 | openssl genrsa -out key.pem 2048
|
---|
527 | openssl req -new -key key.pem -out req.pem
|
---|
528 |
|
---|
529 | The same but just using req:
|
---|
530 |
|
---|
531 | openssl req -newkey rsa:2048 -keyout key.pem -out req.pem
|
---|
532 |
|
---|
533 | Generate a self signed root certificate:
|
---|
534 |
|
---|
535 | openssl req -x509 -newkey rsa:2048 -keyout key.pem -out req.pem
|
---|
536 |
|
---|
537 | Example of a file pointed to by the B<oid_file> option:
|
---|
538 |
|
---|
539 | 1.2.3.4 shortName A longer Name
|
---|
540 | 1.2.3.6 otherName Other longer Name
|
---|
541 |
|
---|
542 | Example of a section pointed to by B<oid_section> making use of variable
|
---|
543 | expansion:
|
---|
544 |
|
---|
545 | testoid1=1.2.3.5
|
---|
546 | testoid2=${testoid1}.6
|
---|
547 |
|
---|
548 | Sample configuration file prompting for field values:
|
---|
549 |
|
---|
550 | [ req ]
|
---|
551 | default_bits = 2048
|
---|
552 | default_keyfile = privkey.pem
|
---|
553 | distinguished_name = req_distinguished_name
|
---|
554 | attributes = req_attributes
|
---|
555 | req_extensions = v3_ca
|
---|
556 |
|
---|
557 | dirstring_type = nobmp
|
---|
558 |
|
---|
559 | [ req_distinguished_name ]
|
---|
560 | countryName = Country Name (2 letter code)
|
---|
561 | countryName_default = AU
|
---|
562 | countryName_min = 2
|
---|
563 | countryName_max = 2
|
---|
564 |
|
---|
565 | localityName = Locality Name (eg, city)
|
---|
566 |
|
---|
567 | organizationalUnitName = Organizational Unit Name (eg, section)
|
---|
568 |
|
---|
569 | commonName = Common Name (eg, YOUR name)
|
---|
570 | commonName_max = 64
|
---|
571 |
|
---|
572 | emailAddress = Email Address
|
---|
573 | emailAddress_max = 40
|
---|
574 |
|
---|
575 | [ req_attributes ]
|
---|
576 | challengePassword = A challenge password
|
---|
577 | challengePassword_min = 4
|
---|
578 | challengePassword_max = 20
|
---|
579 |
|
---|
580 | [ v3_ca ]
|
---|
581 |
|
---|
582 | subjectKeyIdentifier=hash
|
---|
583 | authorityKeyIdentifier=keyid:always,issuer:always
|
---|
584 | basicConstraints = critical, CA:true
|
---|
585 |
|
---|
586 | Sample configuration containing all field values:
|
---|
587 |
|
---|
588 |
|
---|
589 | RANDFILE = $ENV::HOME/.rnd
|
---|
590 |
|
---|
591 | [ req ]
|
---|
592 | default_bits = 2048
|
---|
593 | default_keyfile = keyfile.pem
|
---|
594 | distinguished_name = req_distinguished_name
|
---|
595 | attributes = req_attributes
|
---|
596 | prompt = no
|
---|
597 | output_password = mypass
|
---|
598 |
|
---|
599 | [ req_distinguished_name ]
|
---|
600 | C = GB
|
---|
601 | ST = Test State or Province
|
---|
602 | L = Test Locality
|
---|
603 | O = Organization Name
|
---|
604 | OU = Organizational Unit Name
|
---|
605 | CN = Common Name
|
---|
606 | emailAddress = [email protected]
|
---|
607 |
|
---|
608 | [ req_attributes ]
|
---|
609 | challengePassword = A challenge password
|
---|
610 |
|
---|
611 | Example of giving the most common attributes (subject and extensions)
|
---|
612 | on the command line:
|
---|
613 |
|
---|
614 | openssl req -new -subj "/C=GB/CN=foo" \
|
---|
615 | -addext "subjectAltName = DNS:foo.co.uk" \
|
---|
616 | -addext "certificatePolicies = 1.2.3.4" \
|
---|
617 | -newkey rsa:2048 -keyout key.pem -out req.pem
|
---|
618 |
|
---|
619 |
|
---|
620 | =head1 NOTES
|
---|
621 |
|
---|
622 | The header and footer lines in the B<PEM> format are normally:
|
---|
623 |
|
---|
624 | -----BEGIN CERTIFICATE REQUEST-----
|
---|
625 | -----END CERTIFICATE REQUEST-----
|
---|
626 |
|
---|
627 | some software (some versions of Netscape certificate server) instead needs:
|
---|
628 |
|
---|
629 | -----BEGIN NEW CERTIFICATE REQUEST-----
|
---|
630 | -----END NEW CERTIFICATE REQUEST-----
|
---|
631 |
|
---|
632 | which is produced with the B<-newhdr> option but is otherwise compatible.
|
---|
633 | Either form is accepted transparently on input.
|
---|
634 |
|
---|
635 | The certificate requests generated by B<Xenroll> with MSIE have extensions
|
---|
636 | added. It includes the B<keyUsage> extension which determines the type of
|
---|
637 | key (signature only or general purpose) and any additional OIDs entered
|
---|
638 | by the script in an extendedKeyUsage extension.
|
---|
639 |
|
---|
640 | =head1 DIAGNOSTICS
|
---|
641 |
|
---|
642 | The following messages are frequently asked about:
|
---|
643 |
|
---|
644 | Using configuration from /some/path/openssl.cnf
|
---|
645 | Unable to load config info
|
---|
646 |
|
---|
647 | This is followed some time later by...
|
---|
648 |
|
---|
649 | unable to find 'distinguished_name' in config
|
---|
650 | problems making Certificate Request
|
---|
651 |
|
---|
652 | The first error message is the clue: it can't find the configuration
|
---|
653 | file! Certain operations (like examining a certificate request) don't
|
---|
654 | need a configuration file so its use isn't enforced. Generation of
|
---|
655 | certificates or requests however does need a configuration file. This
|
---|
656 | could be regarded as a bug.
|
---|
657 |
|
---|
658 | Another puzzling message is this:
|
---|
659 |
|
---|
660 | Attributes:
|
---|
661 | a0:00
|
---|
662 |
|
---|
663 | this is displayed when no attributes are present and the request includes
|
---|
664 | the correct empty B<SET OF> structure (the DER encoding of which is 0xa0
|
---|
665 | 0x00). If you just see:
|
---|
666 |
|
---|
667 | Attributes:
|
---|
668 |
|
---|
669 | then the B<SET OF> is missing and the encoding is technically invalid (but
|
---|
670 | it is tolerated). See the description of the command line option B<-asn1-kludge>
|
---|
671 | for more information.
|
---|
672 |
|
---|
673 | =head1 BUGS
|
---|
674 |
|
---|
675 | OpenSSL's handling of T61Strings (aka TeletexStrings) is broken: it effectively
|
---|
676 | treats them as ISO-8859-1 (Latin 1), Netscape and MSIE have similar behaviour.
|
---|
677 | This can cause problems if you need characters that aren't available in
|
---|
678 | PrintableStrings and you don't want to or can't use BMPStrings.
|
---|
679 |
|
---|
680 | As a consequence of the T61String handling the only correct way to represent
|
---|
681 | accented characters in OpenSSL is to use a BMPString: unfortunately Netscape
|
---|
682 | currently chokes on these. If you have to use accented characters with Netscape
|
---|
683 | and MSIE then you currently need to use the invalid T61String form.
|
---|
684 |
|
---|
685 | The current prompting is not very friendly. It doesn't allow you to confirm what
|
---|
686 | you've just entered. Other things like extensions in certificate requests are
|
---|
687 | statically defined in the configuration file. Some of these: like an email
|
---|
688 | address in subjectAltName should be input by the user.
|
---|
689 |
|
---|
690 | =head1 SEE ALSO
|
---|
691 |
|
---|
692 | L<x509(1)>, L<ca(1)>, L<genrsa(1)>,
|
---|
693 | L<gendsa(1)>, L<config(5)>,
|
---|
694 | L<x509v3_config(5)>
|
---|
695 |
|
---|
696 | =head1 COPYRIGHT
|
---|
697 |
|
---|
698 | Copyright 2000-2021 The OpenSSL Project Authors. All Rights Reserved.
|
---|
699 |
|
---|
700 | Licensed under the OpenSSL license (the "License"). You may not use
|
---|
701 | this file except in compliance with the License. You can obtain a copy
|
---|
702 | in the file LICENSE in the source distribution or at
|
---|
703 | L<https://www.openssl.org/source/license.html>.
|
---|
704 |
|
---|
705 | =cut
|
---|