summaryrefslogtreecommitdiff
path: root/src
diff options
context:
space:
mode:
Diffstat (limited to 'src')
-rw-r--r--src/usr.bin/openssl/openssl.1457
1 files changed, 120 insertions, 337 deletions
diff --git a/src/usr.bin/openssl/openssl.1 b/src/usr.bin/openssl/openssl.1
index 08769c56e4..184da99a49 100644
--- a/src/usr.bin/openssl/openssl.1
+++ b/src/usr.bin/openssl/openssl.1
@@ -1,4 +1,4 @@
1.\" $OpenBSD: openssl.1,v 1.34 2016/07/17 16:33:17 jmc Exp $ 1.\" $OpenBSD: openssl.1,v 1.35 2016/07/19 20:02:47 jmc Exp $
2.\" ==================================================================== 2.\" ====================================================================
3.\" Copyright (c) 1998-2002 The OpenSSL Project. All rights reserved. 3.\" Copyright (c) 1998-2002 The OpenSSL Project. All rights reserved.
4.\" 4.\"
@@ -112,7 +112,7 @@
112.\" 112.\"
113.\" OPENSSL 113.\" OPENSSL
114.\" 114.\"
115.Dd $Mdocdate: July 17 2016 $ 115.Dd $Mdocdate: July 19 2016 $
116.Dt OPENSSL 1 116.Dt OPENSSL 1
117.Os 117.Os
118.Sh NAME 118.Sh NAME
@@ -309,13 +309,9 @@ This option can be used multiple times to
309.Qq drill down 309.Qq drill down
310into a nested structure. 310into a nested structure.
311.El 311.El
312.\"
313.\" CA
314.\"
315.Sh CA 312.Sh CA
316.nr nS 1 313.nr nS 1
317.Nm "openssl ca" 314.Nm "openssl ca"
318.Bk -words
319.Op Fl batch 315.Op Fl batch
320.Op Fl cert Ar file 316.Op Fl cert Ar file
321.Op Fl config Ar file 317.Op Fl config Ar file
@@ -354,18 +350,16 @@ into a nested structure.
354.Op Fl subj Ar arg 350.Op Fl subj Ar arg
355.Op Fl updatedb 351.Op Fl updatedb
356.Op Fl verbose 352.Op Fl verbose
357.Ek
358.nr nS 0 353.nr nS 0
359.Pp 354.Pp
360The 355The
361.Nm ca 356.Nm ca
362command is a minimal CA application. 357command is a minimal certificate authority (CA) application.
363It can be used to sign certificate requests in a variety of forms 358It can be used to sign certificate requests in a variety of forms
364and generate CRLs. 359and generate certificate revocation lists (CRLs).
365It also maintains a text database of issued certificates and their status. 360It also maintains a text database of issued certificates and their status.
366.Pp 361.Pp
367The options descriptions will be divided into each purpose. 362The options relevant to CAs are as follows:
368.Sh CA OPTIONS
369.Bl -tag -width "XXXX" 363.Bl -tag -width "XXXX"
370.It Fl batch 364.It Fl batch
371This sets the batch mode. 365This sets the batch mode.
@@ -384,7 +378,7 @@ The format of the date is YYMMDDHHMMSSZ
384.It Fl extensions Ar section 378.It Fl extensions Ar section
385The section of the configuration file containing certificate extensions 379The section of the configuration file containing certificate extensions
386to be added when a certificate is issued (defaults to 380to be added when a certificate is issued (defaults to
387.Em x509_extensions 381.Cm x509_extensions
388unless the 382unless the
389.Fl extfile 383.Fl extfile
390option is used). 384option is used).
@@ -408,12 +402,8 @@ If present, this should be the last option; all subsequent arguments
408are assumed to be the names of files containing certificate requests. 402are assumed to be the names of files containing certificate requests.
409.It Fl key Ar keyfile 403.It Fl key Ar keyfile
410The password used to encrypt the private key. 404The password used to encrypt the private key.
411Since on some systems the command line arguments are visible 405Since on some systems the command line arguments are visible,
412(e.g.\& 406this option should be used with caution.
413.Ux
414with the
415.Xr ps 1
416utility) this option should be used with caution.
417.It Fl keyfile Ar file 407.It Fl keyfile Ar file
418The private key to sign requests with. 408The private key to sign requests with.
419.It Fl keyform Ar PEM 409.It Fl keyform Ar PEM
@@ -448,7 +438,7 @@ section).
448The DN of a certificate can contain the EMAIL field if present in the 438The DN of a certificate can contain the EMAIL field if present in the
449request DN, however it is good policy just having the email set into 439request DN, however it is good policy just having the email set into
450the 440the
451.Em altName 441.Cm altName
452extension of the certificate. 442extension of the certificate.
453When this option is set, the EMAIL field is removed from the certificate's 443When this option is set, the EMAIL field is removed from the certificate's
454subject and set only in the, eventually present, extensions. 444subject and set only in the, eventually present, extensions.
@@ -475,11 +465,20 @@ The key password source.
475This option defines the CA 465This option defines the CA
476.Qq policy 466.Qq policy
477to use. 467to use.
478This is a section in the configuration file which decides which fields 468The policy section in the configuration file
479should be mandatory or match the CA certificate. 469consists of a set of variables corresponding to certificate DN fields.
480Check out the 470The values may be one of
481.Sx CA POLICY FORMAT 471.Qq match
482section for more information. 472(the value must match the same field in the CA certificate),
473.Qq supplied
474(the value must be present), or
475.Qq optional
476(the value may be present).
477Any fields not mentioned in the policy section
478are silently deleted, unless the
479.Fl preserveDN
480option is set,
481but this can be regarded more of a quirk than intended behaviour.
483.It Fl preserveDN 482.It Fl preserveDN
484Normally, the DN order of a certificate is the same as the order of the 483Normally, the DN order of a certificate is the same as the order of the
485fields in the relevant policy section. 484fields in the relevant policy section.
@@ -491,9 +490,17 @@ This is not needed for Xenroll.
491.It Fl spkac Ar file 490.It Fl spkac Ar file
492A file containing a single Netscape signed public key and challenge, 491A file containing a single Netscape signed public key and challenge,
493and additional field values to be signed by the CA. 492and additional field values to be signed by the CA.
494See the 493This will usually come from the
495.Sx SPKAC FORMAT 494KEYGEN tag in an HTML form to create a new private key.
496section for information on the required format. 495It is, however, possible to create SPKACs using the
496.Nm spkac
497utility.
498.Pp
499The file should contain the variable SPKAC set to the value of
500the SPKAC and also the required DN components as name value pairs.
501If it's necessary to include the same component twice,
502then it can be preceded by a number and a
503.Sq \&. .
497.It Fl ss_cert Ar file 504.It Fl ss_cert Ar file
498A single self-signed certificate to be signed by the CA. 505A single self-signed certificate to be signed by the CA.
499.It Fl startdate Ar date 506.It Fl startdate Ar date
@@ -501,14 +508,15 @@ This allows the start date to be explicitly set.
501The format of the date is YYMMDDHHMMSSZ 508The format of the date is YYMMDDHHMMSSZ
502.Pq the same as an ASN1 UTCTime structure . 509.Pq the same as an ASN1 UTCTime structure .
503.It Fl status Ar serial 510.It Fl status Ar serial
504Show status of certificate with serial number 511Show the status of the certificate with serial number
505.Ar serial . 512.Ar serial .
506.It Fl updatedb 513.It Fl updatedb
507Update database for expired certificates. 514Update database for expired certificates.
508.It Fl verbose 515.It Fl verbose
509This prints extra details about the operations being performed. 516This prints extra details about the operations being performed.
510.El 517.El
511.Sh CRL OPTIONS 518.Pp
519The options relevant to CRLs are as follows:
512.Bl -tag -width "XXXX" 520.Bl -tag -width "XXXX"
513.It Fl crl_CA_compromise Ar time 521.It Fl crl_CA_compromise Ar time
514This is the same as 522This is the same as
@@ -542,7 +550,7 @@ in delta CRLs which are not currently implemented.
542.It Fl crldays Ar num 550.It Fl crldays Ar num
543The number of days before the next CRL is due. 551The number of days before the next CRL is due.
544This is the days from now to place in the CRL 552This is the days from now to place in the CRL
545.Em nextUpdate 553.Cm nextUpdate
546field. 554field.
547.It Fl crlexts Ar section 555.It Fl crlexts Ar section
548The 556The
@@ -577,31 +585,22 @@ characters may be escaped by
577.Pq backslash , 585.Pq backslash ,
578no spaces are skipped. 586no spaces are skipped.
579.El 587.El
580.Sh CA CONFIGURATION FILE OPTIONS
581The section of the configuration file containing options for
582.Nm ca
583is found as follows:
584If the
585.Fl name
586command line option is used, then it names the section to be used.
587Otherwise the section to be used must be named in the
588.Em default_ca
589option of the
590.Em ca
591section of the configuration file (or in the default section of the
592configuration file).
593Besides
594.Em default_ca ,
595the following options are read directly from the
596.Em ca
597section:
598.Pp
599.Bl -tag -width Ds -offset indent -compact
600.It preserve
601.It msie_hack
602.El
603.Pp 588.Pp
604This is probably a bug and may change in future releases. 589Many of the options can be set in the
590.Cm ca
591section of the configuration file
592(or in the default section of the configuration file),
593specified using
594.Cm default_ca
595or
596.Fl name .
597The options
598.Cm preserve
599and
600.Cm msie_hack
601are read directly from the
602.Cm ca
603section.
605.Pp 604.Pp
606Many of the configuration file options are identical to command line 605Many of the configuration file options are identical to command line
607options. 606options.
@@ -612,44 +611,66 @@ the configuration file or the command line equivalent
612.Pq if any 611.Pq if any
613used. 612used.
614.Bl -tag -width "XXXX" 613.Bl -tag -width "XXXX"
615.It Ar certificate 614.It Cm certificate
616The same as 615The same as
617.Fl cert . 616.Fl cert .
618It gives the file containing the CA certificate. 617It gives the file containing the CA certificate.
619Mandatory. 618Mandatory.
620.It Ar copy_extensions 619.It Cm copy_extensions
621Determines how extensions in certificate requests should be handled. 620Determines how extensions in certificate requests should be handled.
622If set to 621If set to
623.Ar none 622.Cm none
624or this option is not present, then extensions are 623or this option is not present, then extensions are
625ignored and not copied to the certificate. 624ignored and not copied to the certificate.
626If set to 625If set to
627.Ar copy , 626.Cm copy ,
628then any extensions present in the request that are not already present 627then any extensions present in the request that are not already present
629are copied to the certificate. 628are copied to the certificate.
630If set to 629If set to
631.Ar copyall , 630.Cm copyall ,
632then all extensions in the request are copied to the certificate: 631then all extensions in the request are copied to the certificate:
633if the extension is already present in the certificate it is deleted first. 632if the extension is already present in the certificate it is deleted first.
634See the 633.Pp
635.Sx CA WARNINGS 634The
636section before using this option. 635.Cm copy_extensions
636option should be used with caution.
637If care is not taken, it can be a security risk.
638For example, if a certificate request contains a
639.Cm basicConstraints
640extension with CA:TRUE and the
641.Cm copy_extensions
642value is set to
643.Cm copyall
644and the user does not spot
645this when the certificate is displayed, then this will hand the requestor
646a valid CA certificate.
647.Pp
648This situation can be avoided by setting
649.Cm copy_extensions
650to
651.Cm copy
652and including
653.Cm basicConstraints
654with CA:FALSE in the configuration file.
655Then if the request contains a
656.Cm basicConstraints
657extension, it will be ignored.
637.Pp 658.Pp
638The main use of this option is to allow a certificate request to supply 659The main use of this option is to allow a certificate request to supply
639values for certain extensions such as 660values for certain extensions such as
640.Em subjectAltName . 661.Cm subjectAltName .
641.It Ar crl_extensions 662.It Cm crl_extensions
642The same as 663The same as
643.Fl crlexts . 664.Fl crlexts .
644.It Ar crlnumber 665.It Cm crlnumber
645A text file containing the next CRL number to use in hex. 666A text file containing the next CRL number to use in hex.
646The CRL number will be inserted in the CRLs only if this file exists. 667The CRL number will be inserted in the CRLs only if this file exists.
647If this file is present, it must contain a valid CRL number. 668If this file is present, it must contain a valid CRL number.
648.It Ar database 669.It Cm database
649The text database file to use. 670The text database file to use.
650Mandatory. 671Mandatory.
651This file must be present, though initially it will be empty. 672This file must be present, though initially it will be empty.
652.It Ar default_crl_hours , default_crl_days 673.It Cm default_crl_hours , default_crl_days
653The same as the 674The same as the
654.Fl crlhours 675.Fl crlhours
655and 676and
@@ -657,32 +678,32 @@ and
657options. 678options.
658These will only be used if neither command line option is present. 679These will only be used if neither command line option is present.
659At least one of these must be present to generate a CRL. 680At least one of these must be present to generate a CRL.
660.It Ar default_days 681.It Cm default_days
661The same as the 682The same as the
662.Fl days 683.Fl days
663option. 684option.
664The number of days to certify a certificate for. 685The number of days to certify a certificate for.
665.It Ar default_enddate 686.It Cm default_enddate
666The same as the 687The same as the
667.Fl enddate 688.Fl enddate
668option. 689option.
669Either this option or 690Either this option or
670.Ar default_days 691.Cm default_days
671.Pq or the command line equivalents 692.Pq or the command line equivalents
672must be present. 693must be present.
673.It Ar default_md 694.It Cm default_md
674The same as the 695The same as the
675.Fl md 696.Fl md
676option. 697option.
677The message digest to use. 698The message digest to use.
678Mandatory. 699Mandatory.
679.It Ar default_startdate 700.It Cm default_startdate
680The same as the 701The same as the
681.Fl startdate 702.Fl startdate
682option. 703option.
683The start date to certify a certificate for. 704The start date to certify a certificate for.
684If not set, the current time is used. 705If not set, the current time is used.
685.It Ar email_in_dn 706.It Cm email_in_dn
686The same as 707The same as
687.Fl noemailDN . 708.Fl noemailDN .
688If the EMAIL field is to be removed from the DN of the certificate, 709If the EMAIL field is to be removed from the DN of the certificate,
@@ -690,10 +711,10 @@ simply set this to
690.Qq no . 711.Qq no .
691If not present, the default is to allow for the EMAIL field in the 712If not present, the default is to allow for the EMAIL field in the
692certificate's DN. 713certificate's DN.
693.It Ar msie_hack 714.It Cm msie_hack
694The same as 715The same as
695.Fl msie_hack . 716.Fl msie_hack .
696.It Ar name_opt , cert_opt 717.It Cm name_opt , cert_opt
697These options allow the format used to display the certificate details 718These options allow the format used to display the certificate details
698when asking the user to confirm signing. 719when asking the user to confirm signing.
699All the options supported by the 720All the options supported by the
@@ -703,38 +724,38 @@ utilities'
703and 724and
704.Fl certopt 725.Fl certopt
705switches can be used here, except that 726switches can be used here, except that
706.Ar no_signame 727.Cm no_signame
707and 728and
708.Ar no_sigdump 729.Cm no_sigdump
709are permanently set and cannot be disabled 730are permanently set and cannot be disabled
710(this is because the certificate signature cannot be displayed because 731(this is because the certificate signature cannot be displayed because
711the certificate has not been signed at this point). 732the certificate has not been signed at this point).
712.Pp 733.Pp
713For convenience, the value 734For convenience, the value
714.Em ca_default 735.Cm ca_default
715is accepted by both to produce a reasonable output. 736is accepted by both to produce a reasonable output.
716.Pp 737.Pp
717If neither option is present, the format used in earlier versions of 738If neither option is present, the format used in earlier versions of
718.Nm OpenSSL 739.Nm openssl
719is used. 740is used.
720Use of the old format is 741Use of the old format is
721.Em strongly 742.Em strongly
722discouraged because it only displays fields mentioned in the 743discouraged because it only displays fields mentioned in the
723.Ar policy 744.Cm policy
724section, 745section,
725mishandles multicharacter string types and does not display extensions. 746mishandles multicharacter string types and does not display extensions.
726.It Ar new_certs_dir 747.It Cm new_certs_dir
727The same as the 748The same as the
728.Fl outdir 749.Fl outdir
729command line option. 750command line option.
730It specifies the directory where new certificates will be placed. 751It specifies the directory where new certificates will be placed.
731Mandatory. 752Mandatory.
732.It Ar oid_file 753.It Cm oid_file
733This specifies a file containing additional object identifiers. 754This specifies a file containing additional object identifiers.
734Each line of the file should consist of the numerical form of the 755Each line of the file should consist of the numerical form of the
735object identifier followed by whitespace, then the short name followed 756object identifier followed by whitespace, then the short name followed
736by whitespace and finally the long name. 757by whitespace and finally the long name.
737.It Ar oid_section 758.It Cm oid_section
738This specifies a section in the configuration file containing extra 759This specifies a section in the configuration file containing extra
739object identifiers. 760object identifiers.
740Each line should consist of the short name of the object identifier 761Each line should consist of the short name of the object identifier
@@ -742,283 +763,38 @@ followed by
742.Sq = 763.Sq =
743and the numerical form. 764and the numerical form.
744The short and long names are the same when this option is used. 765The short and long names are the same when this option is used.
745.It Ar policy 766.It Cm policy
746The same as 767The same as
747.Fl policy . 768.Fl policy .
748Mandatory. 769Mandatory.
749See the 770.It Cm preserve
750.Sx CA POLICY FORMAT
751section for more information.
752.It Ar preserve
753The same as 771The same as
754.Fl preserveDN . 772.Fl preserveDN .
755.It Ar private_key 773.It Cm private_key
756Same as the 774Same as the
757.Fl keyfile 775.Fl keyfile
758option. 776option.
759The file containing the CA private key. 777The file containing the CA private key.
760Mandatory. 778Mandatory.
761.It Ar serial 779.It Cm serial
762A text file containing the next serial number to use in hex. 780A text file containing the next serial number to use in hex.
763Mandatory. 781Mandatory.
764This file must be present and contain a valid serial number. 782This file must be present and contain a valid serial number.
765.It Ar unique_subject 783.It Cm unique_subject
766If the value 784If the value
767.Ar yes 785.Cm yes
768is given, the valid certificate entries in the 786is given, the valid certificate entries in the
769database must have unique subjects. 787database must have unique subjects.
770If the value 788If the value
771.Ar no 789.Cm no
772is given, 790is given,
773several valid certificate entries may have the exact same subject. 791several valid certificate entries may have the exact same subject.
774The default value is 792The default value is
775.Ar yes . 793.Cm yes .
776.It Ar x509_extensions 794.It Cm x509_extensions
777The same as 795The same as
778.Fl extensions . 796.Fl extensions .
779.El 797.El
780.Sh CA POLICY FORMAT
781The policy section consists of a set of variables corresponding to
782certificate DN fields.
783If the value is
784.Qq match ,
785then the field value must match the same field in the CA certificate.
786If the value is
787.Qq supplied ,
788then it must be present.
789If the value is
790.Qq optional ,
791then it may be present.
792Any fields not mentioned in the policy section
793are silently deleted, unless the
794.Fl preserveDN
795option is set,
796but this can be regarded more of a quirk than intended behaviour.
797.Sh SPKAC FORMAT
798The input to the
799.Fl spkac
800command line option is a Netscape signed public key and challenge.
801This will usually come from the
802.Em KEYGEN
803tag in an HTML form to create a new private key.
804It is, however, possible to create SPKACs using the
805.Nm spkac
806utility.
807.Pp
808The file should contain the variable SPKAC set to the value of
809the SPKAC and also the required DN components as name value pairs.
810If it's necessary to include the same component twice,
811then it can be preceded by a number and a
812.Sq \&. .
813.Sh CA EXAMPLES
814.Sy Note :
815these examples assume that the
816.Nm ca
817directory structure is already set up and the relevant files already exist.
818This usually involves creating a CA certificate and private key with
819.Cm req ,
820a serial number file and an empty index file and placing them in
821the relevant directories.
822.Pp
823To use the sample configuration file below, the directories
824.Pa demoCA ,
825.Pa demoCA/private
826and
827.Pa demoCA/newcerts
828would be created.
829The CA certificate would be copied to
830.Pa demoCA/cacert.pem
831and its private key to
832.Pa demoCA/private/cakey.pem .
833A file
834.Pa demoCA/serial
835would be created containing, for example,
836.Qq 01
837and the empty index file
838.Pa demoCA/index.txt .
839.Pp
840Sign a certificate request:
841.Pp
842.Dl $ openssl ca -in req.pem -out newcert.pem
843.Pp
844Sign a certificate request, using CA extensions:
845.Pp
846.Dl $ openssl ca -in req.pem -extensions v3_ca -out newcert.pem
847.Pp
848Generate a CRL:
849.Pp
850.Dl $ openssl ca -gencrl -out crl.pem
851.Pp
852Sign several requests:
853.Pp
854.Dl $ openssl ca -infiles req1.pem req2.pem req3.pem
855.Pp
856Certify a Netscape SPKAC:
857.Pp
858.Dl $ openssl ca -spkac spkac.txt
859.Pp
860A sample SPKAC file
861.Pq the SPKAC line has been truncated for clarity :
862.Bd -literal -offset indent
863SPKAC=MIG0MGAwXDANBgkqhkiG9w0BAQEFAANLADBIAkEAn7PDhCeV/xIxUg8V70YRxK
864CN=Steve Test
865emailAddress=steve@openssl.org
8660.OU=OpenSSL Group
8671.OU=Another Group
868.Ed
869.Pp
870A sample configuration file with the relevant sections for
871.Nm ca :
872.Bd -literal
873\& [ ca ]
874\& default_ca = CA_default # The default ca section
875
876\& [ CA_default ]
877
878\& dir = ./demoCA # top dir
879\& database = $dir/index.txt # index file
880\& new_certs_dir = $dir/newcerts # new certs dir
881
882\& certificate = $dir/cacert.pem # The CA cert
883\& serial = $dir/serial # serial no file
884\& private_key = $dir/private/cakey.pem# CA private key
885
886\& default_days = 365 # how long to certify for
887\& default_crl_days= 30 # how long before next CRL
888\& default_md = md5 # md to use
889
890\& policy = policy_any # default policy
891\& email_in_dn = no # Don't add the email into cert DN
892
893\& name_opt = ca_default # Subject name display option
894\& cert_opt = ca_default # Certificate display option
895\& copy_extensions = none #Don't copy extensions from request
896
897\& [ policy_any ]
898\& countryName = supplied
899\& stateOrProvinceName = optional
900\& organizationName = optional
901\& organizationalUnitName = optional
902\& commonName = supplied
903\& emailAddress = optional
904.Ed
905.Sh CA FILES
906.Sy Note :
907the location of all files can change either by compile time options,
908configuration file entries, environment variables, or command line options.
909The values below reflect the default values.
910.Bd -literal -offset indent
911/etc/ssl/openssl.cnf - master configuration file
912\&./demoCA - main CA directory
913\&./demoCA/cacert.pem - CA certificate
914\&./demoCA/private/cakey.pem - CA private key
915\&./demoCA/serial - CA serial number file
916\&./demoCA/serial.old - CA serial number backup file
917\&./demoCA/index.txt - CA text database file
918\&./demoCA/index.txt.old - CA text database backup file
919\&./demoCA/certs - certificate output file
920.Ed
921.Sh CA ENVIRONMENT VARIABLES
922.Ev OPENSSL_CONF
923reflects the location of the master configuration file;
924it can be overridden by the
925.Fl config
926command line option.
927.Sh CA RESTRICTIONS
928The text database index file is a critical part of the process,
929and if corrupted it can be difficult to fix.
930It is theoretically possible to rebuild the index file from all the
931issued certificates and a current CRL; however there is no option to do this.
932.Pp
933V2 CRL features like delta CRLs are not currently supported.
934.Pp
935Although several requests can be input and handled at once, it is only
936possible to include one SPKAC or self-signed certificate.
937.Sh CA BUGS
938The use of an in-memory text database can cause problems when large
939numbers of certificates are present because, as the name implies,
940the database has to be kept in memory.
941.Pp
942It is not possible to certify two certificates with the same DN; this
943is a side effect of how the text database is indexed and it cannot easily
944be fixed without introducing other problems.
945Some S/MIME clients can use two certificates with the same DN for separate
946signing and encryption keys.
947.Pp
948The
949.Nm ca
950command really needs rewriting or the required functionality
951exposed at either a command or interface level so a more friendly utility
952.Pq perl script or GUI
953can handle things properly.
954.Pp
955Any fields in a request that are not present in a policy are silently
956deleted.
957This does not happen if the
958.Fl preserveDN
959option is used.
960To enforce the absence of the EMAIL field within the DN, as suggested
961by RFCs, regardless of the contents of the request's subject the
962.Fl noemailDN
963option can be used.
964The behaviour should be more friendly and configurable.
965.Pp
966Cancelling some commands by refusing to certify a certificate can
967create an empty file.
968.Sh CA WARNINGS
969The
970.Nm ca
971command is quirky and at times downright unfriendly.
972.Pp
973The
974.Nm ca
975utility was originally meant as an example of how to do things in a CA.
976It was not supposed to be used as a full blown CA itself:
977nevertheless some people are using it for this purpose.
978.Pp
979The
980.Nm ca
981command is effectively a single user command: no locking is done on the
982various files, and attempts to run more than one
983.Nm ca
984command on the same database can have unpredictable results.
985.Pp
986The
987.Ar copy_extensions
988option should be used with caution.
989If care is not taken, it can be a security risk.
990For example, if a certificate request contains a
991.Em basicConstraints
992extension with CA:TRUE and the
993.Ar copy_extensions
994value is set to
995.Ar copyall
996and the user does not spot
997this when the certificate is displayed, then this will hand the requestor
998a valid CA certificate.
999.Pp
1000This situation can be avoided by setting
1001.Ar copy_extensions
1002to
1003.Ar copy
1004and including
1005.Em basicConstraints
1006with CA:FALSE in the configuration file.
1007Then if the request contains a
1008.Em basicConstraints
1009extension, it will be ignored.
1010.Pp
1011It is advisable to also include values for other extensions such
1012as
1013.Ar keyUsage
1014to prevent a request supplying its own values.
1015.Pp
1016Additional restrictions can be placed on the CA certificate itself.
1017For example if the CA certificate has:
1018.Pp
1019.D1 basicConstraints = CA:TRUE, pathlen:0
1020.Pp
1021then even if a certificate is issued with CA:TRUE it will not be valid.
1022.\" 798.\"
1023.\" CIPHERS 799.\" CIPHERS
1024.\" 800.\"
@@ -9352,6 +9128,13 @@ This can be used to send the data via a pipe for example.
9352.It Ar stdin 9128.It Ar stdin
9353Read the password from standard input. 9129Read the password from standard input.
9354.El 9130.El
9131.Sh ENVIRONMENT
9132The following environment variables affect the execution of
9133.Nm openssl :
9134.Bl -tag -width "OPENSSL_CONFXXX"
9135.It Ev OPENSSL_CONF
9136The location of the master configuration file.
9137.El
9355.\" 9138.\"
9356.\" FILES 9139.\" FILES
9357.\" 9140.\"