added OCSP signing certificates for the research and sales CAs
[strongswan.git] / testing / hosts / winnetou / etc / openssl / sales / openssl.cnf
1 # openssl.cnf -  OpenSSL configuration file for the ZHW PKI
2 # Mario Strasser <mario.strasser@zhwin.ch>
3 #
4 # $Id: openssl.cnf,v 1.1 2005/03/24 11:24:07 as Exp $
5 #       
6
7 # This definitions were set by the ca_init script DO NOT change
8 # them manualy.
9 CAHOME                  = /etc/openssl/sales 
10 RANDFILE                = $CAHOME/.rand
11
12 # Extra OBJECT IDENTIFIER info:
13 oid_section             = new_oids
14
15 [ new_oids ]
16 SmartcardLogin          = 1.3.6.1.4.1.311.20.2
17 ClientAuthentication    = 1.3.6.1.4.1.311.20.2.2
18
19 ####################################################################
20
21 [ ca ]
22 default_ca      = root_ca               # The default ca section
23
24 ####################################################################
25
26 [ root_ca ]                             
27
28 dir             = $CAHOME
29 certs           = $dir/certs              # Where the issued certs are kept
30 crl_dir         = $dir/crl                # Where the issued crl are kept
31 database        = $dir/index.txt          # database index file.
32 new_certs_dir   = $dir/newcerts           # default place for new certs.
33
34 certificate     = $dir/salesCert.pem      # The CA certificate
35 serial          = $dir/serial             # The current serial number
36 crl             = $dir/crl.pem            # The current CRL
37 private_key     = $dir/salesKey.pem       # The private key
38 RANDFILE        = $dir/.rand              # private random number file
39
40 x509_extensions = host_ext                # The extentions to add to the cert
41
42 crl_extensions  = crl_ext                 # The extentions to add to the CRL
43
44 default_days    = 1825                    # how long to certify for
45 default_crl_days= 30                      # how long before next CRL
46 default_md      = sha1                    # which md to use.
47 preserve        = no                      # keep passed DN ordering
48 email_in_dn     = no                      # allow/forbid EMail in DN
49
50 policy          = policy_match            # specifying how similar the request must look
51
52 ####################################################################
53
54 # the 'match' policy
55 [ policy_match ]
56 countryName             = match
57 stateOrProvinceName     = optional
58 localityName            = optional
59 organizationName        = match
60 organizationalUnitName  = optional
61 userId                  = optional
62 commonName              = supplied
63 emailAddress            = optional
64
65 # the 'anything' policy
66 [ policy_anything ]
67 countryName             = optional
68 stateOrProvinceName     = optional
69 localityName            = optional
70 organizationName        = optional
71 organizationalUnitName  = optional
72 commonName              = supplied
73 emailAddress            = optional
74
75 ####################################################################
76
77 [ req ]
78 default_bits            = 1024
79 default_keyfile         = privkey.pem
80 distinguished_name      = req_distinguished_name
81 attributes              = req_attributes
82 x509_extensions         = ca_ext        # The extentions to add to the self signed cert
83 # req_extensions        = v3_req        # The extensions to add to a certificate request
84
85
86 # This sets a mask for permitted string types. There are several options. 
87 # default: PrintableString, T61String, BMPString.
88 # pkix   : PrintableString, BMPString.
89 # utf8only: only UTF8Strings.
90 # nombstr : PrintableString, T61String (no BMPStrings or UTF8Strings).
91 # MASK:XXXX a literal mask value.
92 # WARNING: current versions of Netscape crash on BMPStrings or UTF8Strings
93 # so use this option with caution!
94 string_mask                     = nombstr
95
96 # req_extensions = v3_req # The extensions to add to a certificate request
97
98 ####################################################################
99
100 [ req_distinguished_name ]
101 countryName                     = Country Name (2 letter code)
102 countryName_default             = CH
103 countryName_min                 = 2
104 countryName_max                 = 2
105
106 #stateOrProvinceName            = State or Province Name (full name)
107 #stateOrProvinceName_default    = ZH
108
109 #localityName                   = Locality Name (eg, city)
110 #localityName_default           = Winterthur
111
112 organizationName                = Organization Name (eg, company)
113 organizationName_default        = Linux strongSwan
114
115 0.organizationalUnitName                = Organizational Unit Name (eg, section)
116 0.organizationalUnitName_default        = Sales
117
118 #1.organizationalUnitName       = Type (eg, Staff)
119 #1.organizationalUnitName_default = Staff
120
121 #userId                         = UID 
122
123 commonName                      = Common Name (eg, YOUR name)
124 commonName_default              = $ENV::COMMON_NAME
125 commonName_max                  = 64
126
127 #0.emailAddress                 = Email Address (eg, foo@bar.com)
128 #0.emailAddress_min              = 0
129 #0.emailAddress_max              = 40
130
131 #1.emailAddress                  = Second Email Address (eg, foo@bar.com)
132 #1.emailAddress_min              = 0
133 #1.emailAddress_max              = 40
134
135 ####################################################################
136
137 [ req_attributes ]
138
139 ####################################################################
140
141 [ host_ext ]
142
143 basicConstraints                = CA:FALSE
144 keyUsage                        = digitalSignature, keyEncipherment, keyAgreement
145 subjectKeyIdentifier            = hash
146 authorityKeyIdentifier          = keyid, issuer:always
147 subjectAltName                  = DNS:$ENV::COMMON_NAME
148 #extendedKeyUsage               = OCSPSigning
149 crlDistributionPoints           = URI:http://crl.strongswan.org/sales.crl
150
151 ####################################################################
152
153 [ user_ext ]
154
155 basicConstraints                = CA:FALSE
156 keyUsage                        = digitalSignature, keyEncipherment, keyAgreement
157 subjectKeyIdentifier            = hash
158 authorityKeyIdentifier          = keyid, issuer:always
159 subjectAltName                  = email:$ENV::COMMON_NAME 
160 crlDistributionPoints           = URI:http://crl.strongswan.org/sales.crl
161
162 ####################################################################
163
164 [ ca_ext ]
165
166 basicConstraints                = critical, CA:TRUE
167 keyUsage                        = cRLSign, keyCertSign
168 subjectKeyIdentifier           = hash
169 authorityKeyIdentifier         = keyid, issuer:always
170
171 ####################################################################
172
173 [ crl_ext ]
174
175 # CRL extensions.
176 # Only issuerAltName and authorityKeyIdentifier make any sense in a CRL.
177
178 #issuerAltName                  = issuer:copy
179 authorityKeyIdentifier          = keyid:always, issuer:always
180
181 # eof