gnunet-gns-proxy-ca.template 9.2 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303
  1. # X.509 Certificate options
  2. #
  3. # DN options
  4. # The organization of the subject.
  5. organization = "GNU"
  6. # The organizational unit of the subject.
  7. unit = "GNUnet"
  8. # The locality of the subject.
  9. locality = World
  10. # The state of the certificate owner.
  11. # state = "Attiki"
  12. # The country of the subject. Two letter code.
  13. country = ZZ
  14. # The common name of the certificate owner.
  15. cn = "GNS Proxy CA"
  16. # A user id of the certificate owner.
  17. #uid = "clauper"
  18. # Set domain components
  19. #dc = "name"
  20. #dc = "domain"
  21. # If the supported DN OIDs are not adequate you can set
  22. # any OID here.
  23. # For example set the X.520 Title and the X.520 Pseudonym
  24. # by using OID and string pairs.
  25. #dn_oid = "2.5.4.12 Dr."
  26. #dn_oid = "2.5.4.65 jackal"
  27. # This is deprecated and should not be used in new
  28. # certificates.
  29. # pkcs9_email = "none@none.org"
  30. # An alternative way to set the certificate's distinguished name directly
  31. # is with the "dn" option. The attribute names allowed are:
  32. # C (country), street, O (organization), OU (unit), title, CN (common name),
  33. # L (locality), ST (state), placeOfBirth, gender, countryOfCitizenship,
  34. # countryOfResidence, serialNumber, telephoneNumber, surName, initials,
  35. # generationQualifier, givenName, pseudonym, dnQualifier, postalCode, name,
  36. # businessCategory, DC, UID, jurisdictionOfIncorporationLocalityName,
  37. # jurisdictionOfIncorporationStateOrProvinceName,
  38. # jurisdictionOfIncorporationCountryName, XmppAddr, and numeric OIDs.
  39. #dn = "cn = Nikos,st = New\, Something,C=GR,surName=Mavrogiannopoulos,2.5.4.9=Arkadias"
  40. # The serial number of the certificate
  41. # The value is in decimal (e.g. 1963) or hex (e.g. 0x07ab).
  42. # Comment the field for a random serial number.
  43. #serial = 007
  44. # In how many days, counting from today, this certificate will expire.
  45. # Use -1 if there is no expiration date.
  46. expiration_days = 3650
  47. # Alternatively you may set concrete dates and time. The GNU date string
  48. # formats are accepted. See:
  49. # https://www.gnu.org/software/tar/manual/html_node/Date-input-formats.html
  50. #activation_date = "2004-02-29 16:21:42"
  51. #expiration_date = "2025-02-29 16:24:41"
  52. # X.509 v3 extensions
  53. # A dnsname in case of a WWW server.
  54. #dns_name = "www.none.org"
  55. #dns_name = "www.morethanone.org"
  56. # An othername defined by an OID and a hex encoded string
  57. #other_name = "1.3.6.1.5.2.2 302ca00d1b0b56414e5245494e2e4f5247a11b3019a006020400000002a10f300d1b047269636b1b0561646d696e"
  58. #other_name_utf8 = "1.2.4.5.6 A UTF8 string"
  59. #other_name_octet = "1.2.4.5.6 A string that will be encoded as ASN.1 octet string"
  60. # Allows writing an XmppAddr Identifier
  61. #xmpp_name = juliet@im.example.com
  62. # Names used in PKINIT
  63. #krb5_principal = user@REALM.COM
  64. #krb5_principal = HTTP/user@REALM.COM
  65. # A subject alternative name URI
  66. #uri = "https://www.example.com"
  67. # An IP address in case of a server.
  68. #ip_address = "192.168.1.1"
  69. # An email in case of a person
  70. email = "bounce@gnunet.org"
  71. # TLS feature (rfc7633) extension. That can is used to indicate mandatory TLS
  72. # extension features to be provided by the server. In practice this is used
  73. # to require the Status Request (extid: 5) extension from the server. That is,
  74. # to require the server holding this certificate to provide a stapled OCSP response.
  75. # You can have multiple lines for multiple TLS features.
  76. # To ask for OCSP status request use:
  77. #tls_feature = 5
  78. # Challenge password used in certificate requests
  79. challenge_password = 123456
  80. # Password when encrypting a private key
  81. #password = secret
  82. # An URL that has CRLs (certificate revocation lists)
  83. # available. Needed in CA certificates.
  84. #crl_dist_points = "https://www.getcrl.crl/getcrl/"
  85. # Whether this is a CA certificate or not
  86. ca
  87. # Subject Unique ID (in hex)
  88. #subject_unique_id = 00153224
  89. # Issuer Unique ID (in hex)
  90. #issuer_unique_id = 00153225
  91. #### Key usage
  92. # The following key usage flags are used by CAs and end certificates
  93. # Whether this certificate will be used to sign data (needed
  94. # in TLS DHE ciphersuites). This is the digitalSignature flag
  95. # in RFC5280 terminology.
  96. signing_key
  97. # Whether this certificate will be used to encrypt data (needed
  98. # in TLS RSA ciphersuites). Note that it is preferred to use different
  99. # keys for encryption and signing. This is the keyEncipherment flag
  100. # in RFC5280 terminology.
  101. encryption_key
  102. # Whether this key will be used to sign other certificates. The
  103. # keyCertSign flag in RFC5280 terminology.
  104. cert_signing_key
  105. # Whether this key will be used to sign CRLs. The
  106. # cRLSign flag in RFC5280 terminology.
  107. #crl_signing_key
  108. # The keyAgreement flag of RFC5280. It's purpose is loosely
  109. # defined. Not use it unless required by a protocol.
  110. #key_agreement
  111. # The dataEncipherment flag of RFC5280. It's purpose is loosely
  112. # defined. Not use it unless required by a protocol.
  113. #data_encipherment
  114. # The nonRepudiation flag of RFC5280. It's purpose is loosely
  115. # defined. Not use it unless required by a protocol.
  116. #non_repudiation
  117. #### Extended key usage (key purposes)
  118. # The following extensions are used in an end certificate
  119. # to clarify its purpose. Some CAs also use it to indicate
  120. # the types of certificates they are purposed to sign.
  121. # Whether this certificate will be used for a TLS client;
  122. # this sets the id-kp-clientAuth (1.3.6.1.5.5.7.3.2) of
  123. # extended key usage.
  124. #tls_www_client
  125. # Whether this certificate will be used for a TLS server;
  126. # this sets the id-kp-serverAuth (1.3.6.1.5.5.7.3.1) of
  127. # extended key usage.
  128. tls_www_server
  129. # Whether this key will be used to sign code. This sets the
  130. # id-kp-codeSigning (1.3.6.1.5.5.7.3.3) of extended key usage
  131. # extension.
  132. #code_signing_key
  133. # Whether this key will be used to sign OCSP data. This sets the
  134. # id-kp-OCSPSigning (1.3.6.1.5.5.7.3.9) of extended key usage extension.
  135. #ocsp_signing_key
  136. # Whether this key will be used for time stamping. This sets the
  137. # id-kp-timeStamping (1.3.6.1.5.5.7.3.8) of extended key usage extension.
  138. #time_stamping_key
  139. # Whether this key will be used for email protection. This sets the
  140. # id-kp-emailProtection (1.3.6.1.5.5.7.3.4) of extended key usage extension.
  141. #email_protection_key
  142. # Whether this key will be used for IPsec IKE operations (1.3.6.1.5.5.7.3.17).
  143. #ipsec_ike_key
  144. ## adding custom key purpose OIDs
  145. # for microsoft smart card logon
  146. # key_purpose_oid = 1.3.6.1.4.1.311.20.2.2
  147. # for email protection
  148. # key_purpose_oid = 1.3.6.1.5.5.7.3.4
  149. # for any purpose (must not be used in intermediate CA certificates)
  150. # key_purpose_oid = 2.5.29.37.0
  151. ### end of key purpose OIDs
  152. ### Adding arbitrary extensions
  153. # This requires to provide the extension OIDs, as well as the extension data in
  154. # hex format. The following two options are available since GnuTLS 3.5.3.
  155. #add_extension = "1.2.3.4 0x0AAB01ACFE"
  156. # As above but encode the data as an octet string
  157. #add_extension = "1.2.3.4 octet_string(0x0AAB01ACFE)"
  158. # For portability critical extensions shouldn't be set to certificates.
  159. #add_critical_extension = "5.6.7.8 0x1AAB01ACFE"
  160. # When generating a certificate from a certificate
  161. # request, then honor the extensions stored in the request
  162. # and store them in the real certificate.
  163. #honor_crq_extensions
  164. # Alternatively only specific extensions can be copied.
  165. #honor_crq_ext = 2.5.29.17
  166. #honor_crq_ext = 2.5.29.15
  167. # Path length constraint. Sets the maximum number of
  168. # certificates that can be used to certify this certificate.
  169. # (i.e. the certificate chain length)
  170. #path_len = -1
  171. #path_len = 2
  172. # OCSP URI
  173. # ocsp_uri = https://my.ocsp.server/ocsp
  174. # CA issuers URI
  175. # ca_issuers_uri = https://my.ca.issuer
  176. # Certificate policies
  177. #policy1 = 1.3.6.1.4.1.5484.1.10.99.1.0
  178. #policy1_txt = "This is a long policy to summarize"
  179. #policy1_url = https://www.example.com/a-policy-to-read
  180. #policy2 = 1.3.6.1.4.1.5484.1.10.99.1.1
  181. #policy2_txt = "This is a short policy"
  182. #policy2_url = https://www.example.com/another-policy-to-read
  183. # The number of additional certificates that may appear in a
  184. # path before the anyPolicy is no longer acceptable.
  185. #inhibit_anypolicy_skip_certs 1
  186. # Name constraints
  187. # DNS
  188. #nc_permit_dns = example.com
  189. #nc_exclude_dns = test.example.com
  190. # EMAIL
  191. #nc_permit_email = "nmav@ex.net"
  192. # Exclude subdomains of example.com
  193. #nc_exclude_email = .example.com
  194. # Exclude all e-mail addresses of example.com
  195. #nc_exclude_email = example.com
  196. # IP
  197. #nc_permit_ip = 192.168.0.0/16
  198. #nc_exclude_ip = 192.168.5.0/24
  199. #nc_permit_ip = fc0a:eef2:e7e7:a56e::/64
  200. # Options for proxy certificates
  201. #proxy_policy_language = 1.3.6.1.5.5.7.21.1
  202. # Options for generating a CRL
  203. # The number of days the next CRL update will be due.
  204. # next CRL update will be in 43 days
  205. #crl_next_update = 43
  206. # this is the 5th CRL by this CA
  207. # The value is in decimal (e.g. 1963) or hex (e.g. 0x07ab).
  208. # Comment the field for a time-based number.
  209. # Time-based CRL numbers generated in GnuTLS 3.6.3 and later
  210. # are significantly larger than those generated in previous
  211. # versions. Since CRL numbers need to be monotonic, you need
  212. # to specify the CRL number here manually if you intend to
  213. # downgrade to an earlier version than 3.6.3 after publishing
  214. # the CRL as it is not possible to specify CRL numbers greater
  215. # than 2**63-2 using hex notation in those versions.
  216. #crl_number = 5
  217. # Specify the update dates more precisely.
  218. #crl_this_update_date = "2004-02-29 16:21:42"
  219. #crl_next_update_date = "2025-02-29 16:24:41"
  220. # The date that the certificates will be made seen as
  221. # being revoked.
  222. #crl_revocation_date = "2025-02-29 16:24:41"