1 # openssl.cnf - OpenSSL configuration file for the ZHW PKI
2 # Mario Strasser <mario.strasser@zhwin.ch>
4 # $Id: openssl.cnf,v 1.1 2005/03/24 11:24:07 as Exp $
7 # This definitions were set by the ca_init script DO NOT change
9 CAHOME = /etc/openssl/research
10 RANDFILE = $CAHOME/.rand
12 # Extra OBJECT IDENTIFIER info:
13 oid_section = new_oids
16 SmartcardLogin = 1.3.6.1.4.1.311.20.2
17 ClientAuthentication = 1.3.6.1.4.1.311.20.2.2
19 ####################################################################
22 default_ca = root_ca # The default ca section
24 ####################################################################
29 certs = $dir/certs # Where the issued certs are kept
30 crl_dir = $dir/crl # Where the issued crl are kept
31 database = $dir/index.txt # database index file.
32 new_certs_dir = $dir/newcerts # default place for new certs.
34 certificate = $dir/researchCert.pem # The CA certificate
35 serial = $dir/serial # The current serial number
36 crl = $dir/crl.pem # The current CRL
37 crlnumber = $dir/crlnumber # The current CRL serial number
38 private_key = $dir/researchKey.pem # The private key
39 RANDFILE = $dir/.rand # private random number file
41 x509_extensions = host_ext # The extentions to add to the cert
43 crl_extensions = crl_ext # The extentions to add to the CRL
45 default_days = 1825 # how long to certify for
46 default_crl_days= 30 # how long before next CRL
47 default_md = sha1 # which md to use.
48 preserve = no # keep passed DN ordering
49 email_in_dn = no # allow/forbid EMail in DN
51 policy = policy_match # specifying how similar the request must look
53 ####################################################################
58 stateOrProvinceName = optional
59 localityName = optional
60 organizationName = match
61 organizationalUnitName = optional
64 emailAddress = optional
66 # the 'anything' policy
68 countryName = optional
69 stateOrProvinceName = optional
70 localityName = optional
71 organizationName = optional
72 organizationalUnitName = optional
74 emailAddress = optional
76 ####################################################################
80 default_keyfile = privkey.pem
81 distinguished_name = req_distinguished_name
82 attributes = req_attributes
83 x509_extensions = ca_ext # The extentions to add to the self signed cert
84 # req_extensions = v3_req # The extensions to add to a certificate request
87 # This sets a mask for permitted string types. There are several options.
88 # default: PrintableString, T61String, BMPString.
89 # pkix : PrintableString, BMPString.
90 # utf8only: only UTF8Strings.
91 # nombstr : PrintableString, T61String (no BMPStrings or UTF8Strings).
92 # MASK:XXXX a literal mask value.
93 # WARNING: current versions of Netscape crash on BMPStrings or UTF8Strings
94 # so use this option with caution!
97 # req_extensions = v3_req # The extensions to add to a certificate request
99 ####################################################################
101 [ req_distinguished_name ]
102 countryName = Country Name (2 letter code)
103 countryName_default = CH
107 #stateOrProvinceName = State or Province Name (full name)
108 #stateOrProvinceName_default = ZH
110 #localityName = Locality Name (eg, city)
111 #localityName_default = Winterthur
113 organizationName = Organization Name (eg, company)
114 organizationName_default = Linux strongSwan
116 0.organizationalUnitName = Organizational Unit Name (eg, section)
117 0.organizationalUnitName_default = Research
119 #1.organizationalUnitName = Type (eg, Staff)
120 #1.organizationalUnitName_default = Staff
124 commonName = Common Name (eg, YOUR name)
125 commonName_default = $ENV::COMMON_NAME
128 #0.emailAddress = Email Address (eg, foo@bar.com)
129 #0.emailAddress_min = 0
130 #0.emailAddress_max = 40
132 #1.emailAddress = Second Email Address (eg, foo@bar.com)
133 #1.emailAddress_min = 0
134 #1.emailAddress_max = 40
136 ####################################################################
140 ####################################################################
144 basicConstraints = CA:FALSE
145 keyUsage = digitalSignature, keyEncipherment, keyAgreement
146 subjectKeyIdentifier = hash
147 authorityKeyIdentifier = keyid, issuer:always
148 subjectAltName = DNS:$ENV::COMMON_NAME
149 #extendedKeyUsage = OCSPSigning
150 crlDistributionPoints = URI:http://crl.strongswan.org/research.crl
152 ####################################################################
156 basicConstraints = CA:FALSE
157 keyUsage = digitalSignature, keyEncipherment, keyAgreement
158 subjectKeyIdentifier = hash
159 authorityKeyIdentifier = keyid, issuer:always
160 subjectAltName = email:$ENV::COMMON_NAME
161 crlDistributionPoints = URI:http://crl.strongswan.org/research.crl
163 ####################################################################
167 basicConstraints = critical, CA:TRUE
168 keyUsage = cRLSign, keyCertSign
169 subjectKeyIdentifier = hash
170 authorityKeyIdentifier = keyid, issuer:always
172 ####################################################################
177 # Only issuerAltName and authorityKeyIdentifier make any sense in a CRL.
179 #issuerAltName = issuer:copy
180 authorityKeyIdentifier = keyid:always, issuer:always