Managing Certificate Authority: Difference between revisions

From VVCWiki
Jump to navigationJump to search
(server)
(No difference)

Revision as of 01:34, 26 January 2009

This article should help you to run your own certificate authority (CA).

Creating CA

We will keep all files related to our CA in directory /root/CA

openssl.conf

First, we will create OpenSSL configuration file. It can be stored anywere and referenced by environment variable

export OPENSSL_CONF=/root/CA/openssl.conf

Here is my file

[ ca ]
default_ca      = CA_default

[ CA_default ]
dir             = /root/CA
new_certs_dir   = $dir/certs
database        = $dir/index.txt
unique_subject  = no
certificate     = $dir/cacert.pem
private_key     = $dir/private/cakey.pem
serial          = $dir/serial
crl             = $dir/crl.pem
RANDFILE        = $dir/private/.rand
x509_extensions = usr_cert
name_opt        = ca_default
cert_opt        = ca_default
copy_extensions = copy
default_days    = 365
default_crl_days= 35
default_md      = sha1
preserve        = no
policy          = policy_any

[ policy_any ]
countryName             = supplied
stateOrProvinceName     = supplied
localityName            = supplied
organizationName        = optional
organizationalUnitName  = optional
commonName              = supplied
emailAddress            = supplied

[ req ]
default_bits            = 1024
default_md              = sha1
distinguished_name      = req_distinguished_name
prompt                  = no
x509_extensions         = v3_ca

[ req_distinguished_name ]
countryName             = US
stateOrProvinceName     = Virginia
localityName            = Leesburg
organizationName        = Vadym Chepkov
organizationalUnitName  = Vadym Chepkov CA
commonName              = Vadym Chepkov CA
emailAddress            = vvc@chepkov.com

[ v3_ca ]
subjectKeyIdentifier=hash
authorityKeyIdentifier=keyid:always,issuer:always
keyUsage = critical,keyCertSign,cRLSign
basicConstraints = critical,CA:TRUE,pathlen:1
subjectAltName=email:copy
issuerAltName=issuer:copy
authorityInfoAccess = caIssuers;URI:http://www.chepkov.com/ca.html
crlDistributionPoints=URI:http://www.chepkov.com/vvc-ca.crl

[ intermediate_ca ]
subjectKeyIdentifier=hash
authorityKeyIdentifier=keyid:always,issuer:always
keyUsage = critical,keyCertSign,cRLSign
basicConstraints = critical,CA:TRUE,pathlen:0
subjectAltName=email:copy
issuerAltName=issuer:copy
authorityInfoAccess = caIssuers;URI:http://www.chepkov.com/ca.html
crlDistributionPoints=URI:http://www.chepkov.com/vvc-ca.crl

[ usr_cert ]
basicConstraints = critical,CA:FALSE
keyUsage  = critical,digitalSignature,keyAgreement
subjectKeyIdentifier=hash
authorityKeyIdentifier=keyid,issuer
issuerAltName=issuer:copy
authorityInfoAccess = caIssuers;URI:http://www.chepkov.com/ca.html
crlDistributionPoints=URI:http://www.chepkov.com/vvc-ca.crl

[ server ]
basicConstraints = critical,CA:FALSE
subjectKeyIdentifier=hash
authorityKeyIdentifier=keyid,issuer:always
extendedKeyUsage=serverAuth
keyUsage = critical,digitalSignature, keyEncipherment
authorityInfoAccess = caIssuers;URI:http://www.chepkov.com/ca.html
crlDistributionPoints=URI:http://www.chepkov.com/vvc-ca.crl

Creating initial database

cd /root/CA
mkdir certs private
chmod 700 private
echo 01 > serial
touch index.txt index.txt.attr

Creating CA private key

openssl genrsa -out private/cakey.pem 2048

Creating CA certificate request

openssl req -new -key private/cakey.pem -out ca.csr

Self-signing CA certificate

openssl ca -selfsign -in ca.csr -keyfile private/cakey.pem -out cacert.pem -extensions v3_ca -verbose -enddate 361231235959Z

Signing Certificate Request

openssl ca -days 730 -in server.csr -out server.crt -extensions server

Make sure expiration day of the certificate does not exceed expiration day of your certificate authority. You don't have to specify days argument if you want to use default from openssl.conf

Revoking a certificate

openssl ca -revoke cert.pem

Generating Certificate Revocation List (CRL)

openssl ca -gencrl -out crl.pem
openssl crl -in crl.pem -out crl.crl -outform DER