mk-ca-bundle.1 4.9 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121
  1. .\" **************************************************************************
  2. .\" * _ _ ____ _
  3. .\" * Project ___| | | | _ \| |
  4. .\" * / __| | | | |_) | |
  5. .\" * | (__| |_| | _ <| |___
  6. .\" * \___|\___/|_| \_\_____|
  7. .\" *
  8. .\" * Copyright (C) 2008 - 2022, Daniel Stenberg, <daniel@haxx.se>, et al.
  9. .\" *
  10. .\" * This software is licensed as described in the file COPYING, which
  11. .\" * you should have received as part of this distribution. The terms
  12. .\" * are also available at https://curl.se/docs/copyright.html.
  13. .\" *
  14. .\" * You may opt to use, copy, modify, merge, publish, distribute and/or sell
  15. .\" * copies of the Software, and permit persons to whom the Software is
  16. .\" * furnished to do so, under the terms of the COPYING file.
  17. .\" *
  18. .\" * This software is distributed on an "AS IS" basis, WITHOUT WARRANTY OF ANY
  19. .\" * KIND, either express or implied.
  20. .\" *
  21. .\" * SPDX-License-Identifier: curl
  22. .\" *
  23. .\" **************************************************************************
  24. .\"
  25. .TH mk-ca-bundle 1 "24 Oct 2016" "version 1.27" "mk-ca-bundle manual"
  26. .SH NAME
  27. mk-ca-bundle \- convert mozilla's certdata.txt to PEM format
  28. .SH SYNOPSIS
  29. mk-ca-bundle [options]
  30. .I [outputfile]
  31. .SH DESCRIPTION
  32. The mk-ca-bundle tool downloads the certdata.txt file from Mozilla's source
  33. tree over HTTPS, then parses certdata.txt and extracts certificates into PEM
  34. format. By default, only CA root certificates trusted to issue SSL server
  35. authentication certificates are extracted. These are then processed with the
  36. OpenSSL commandline tool to produce the final ca-bundle file.
  37. The default \fIoutputfile\fP name is \fBca-bundle.crt\fP. By setting it to '-'
  38. (a single dash) you will get the output sent to STDOUT instead of a file.
  39. The PEM format this scripts uses for output makes the result readily available
  40. for use by just about all OpenSSL or GnuTLS powered applications, such as
  41. curl, wget and more.
  42. .SH OPTIONS
  43. The following options are supported:
  44. .IP -b
  45. backup an existing version of \fIoutputfilename\fP
  46. .IP "-d [name]"
  47. specify which Mozilla tree to pull certdata.txt from (or a custom URL). Valid
  48. names are: aurora, beta, central, mozilla, nss, release (default). They are
  49. shortcuts for which source tree to get the cert data from.
  50. .IP -f
  51. force rebuild even if certdata.txt is current (Added in version 1.17)
  52. .IP -i
  53. print version info about used modules
  54. .IP -k
  55. Allow insecure data transfer. By default (since 1.27) this command will fail
  56. if the HTTPS transfer fails. This overrides that decision (and opens for
  57. man-in-the-middle attacks).
  58. .IP -l
  59. print license info about certdata.txt
  60. .IP -m
  61. (Added in 1.26) Include meta data comments in the output. The meta data is
  62. specific information about each certificate that is stored in the original
  63. file as comments and using this option will make those comments get passed on
  64. to the output file. The meta data is not parsed in any way by mk-ca-bundle.
  65. .IP -n
  66. no download of certdata.txt (to use existing)
  67. .IP "-p [purposes]:[levels]"
  68. list of Mozilla trust purposes and levels for certificates to include in output.
  69. Takes the form of a comma separated list of purposes, a colon, and a comma
  70. separated list of levels. The default is to include all certificates trusted
  71. to issue SSL Server certificates (SERVER_AUTH:TRUSTED_DELEGATOR).
  72. (Added in version 1.21, Perl only)
  73. Valid purposes are:
  74. .RS
  75. ALL, DIGITAL_SIGNATURE, NON_REPUDIATION, KEY_ENCIPHERMENT,
  76. DATA_ENCIPHERMENT, KEY_AGREEMENT, KEY_CERT_SIGN, CRL_SIGN,
  77. SERVER_AUTH (default), CLIENT_AUTH, CODE_SIGNING, EMAIL_PROTECTION,
  78. IPSEC_END_SYSTEM, IPSEC_TUNNEL, IPSEC_USER, TIME_STAMPING, STEP_UP_APPROVED
  79. .RE
  80. .IP
  81. Valid trust levels are:
  82. .RS
  83. ALL, TRUSTED_DELEGATOR (default), NOT_TRUSTED, MUST_VERIFY_TRUST, TRUSTED
  84. .RE
  85. .IP -q
  86. be really quiet (no progress output at all)
  87. .IP -t
  88. include plain text listing of certificates
  89. .IP "-s [algorithms]"
  90. comma separated list of signature algorithms with which to hash/fingerprint
  91. each certificate and output when run in plain text mode.
  92. (Added in version 1.21, Perl only)
  93. Valid algorithms are:
  94. .RS
  95. ALL, NONE, MD5 (default), SHA1, SHA256, SHA384, SHA512
  96. .RE
  97. .IP -u
  98. unlink (remove) certdata.txt after processing
  99. .IP -v
  100. be verbose and print out processed CAs
  101. .SH EXIT STATUS
  102. Returns 0 on success. Returns 1 if it fails to download data.
  103. .SH CERTDATA FORMAT
  104. The file format used by Mozilla for this trust information seems to be documented here:
  105. .nf
  106. https://p11-glue.freedesktop.org/doc/storing-trust-policy/storing-trust-existing.html
  107. .fi
  108. .SH SEE ALSO
  109. .BR curl (1)
  110. .SH HISTORY
  111. \fBmk-ca-bundle\fP is a command line tool that is shipped as part of every
  112. curl and libcurl release (see https://curl.se/). It was originally based
  113. on the parse-certs script written by Roland Krikava and was later much
  114. improved by Guenter Knauf. This manual page was initially written by Jan
  115. Schaumann \&<jschauma@netmeister.org>.