123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687 |
- =pod
- =head1 NAME
- openssl-verification-options - generic X.509 certificate verification options
- =head1 SYNOPSIS
- B<openssl>
- I<command>
- [ I<options> ... ]
- [ I<parameters> ... ]
- =head1 DESCRIPTION
- There are many situations where X.509 certificates are verified
- within the OpenSSL libraries and in various OpenSSL commands.
- Certificate verification is implemented by L<X509_verify_cert(3)>.
- It is a complicated process consisting of a number of steps
- and depending on numerous options.
- The most important of them are detailed in the following sections.
- In a nutshell, a valid chain of certifciates needs to be built up and verified
- starting from the I<target certificate> that is to be verified
- and ending in a certificate that due to some policy is trusted.
- Verification is done relative to the given I<purpose>, which is the intended use
- of the target certificate, such as SSL server, or by default for any purpose.
- The details of how each OpenSSL command handles errors
- are documented on the specific command page.
- DANE support is documented in L<openssl-s_client(1)>,
- L<SSL_CTX_dane_enable(3)>, L<SSL_set1_host(3)>,
- L<X509_VERIFY_PARAM_set_flags(3)>, and L<X509_check_host(3)>.
- =head2 Trust Anchors
- In general, according to RFC 4158 and RFC 5280, a I<trust anchor> is
- any public key and related subject distinguished name (DN) that
- for some reason is considered trusted
- and thus is acceptable as the root of a chain of certificates.
- In practice, trust anchors are given in the form of certificates,
- where their essential fields are the public key and the subject DN.
- In addition to the requirements in RFC 5280,
- OpenSSL checks the validity period of such certificates
- and makes use of some further fields.
- In particular, the subject key identifier extension, if present,
- is used for matching trust anchors during chain building.
- In the most simple and common case, trust anchors are by default
- all self-signed "root" CA certificates that are placed in the I<trust store>,
- which is a collection of certificates that are trusted for certain uses.
- This is akin to what is used in the trust stores of Mozilla Firefox,
- or Apple's and Microsoft's certificate stores, ...
- From the OpenSSL perspective, a trust anchor is a certificate
- that should be augmented with an explicit designation for which
- uses of a target certificate the certificate may serve as a trust anchor.
- In PEM encoding, this is indicated by the C<TRUSTED CERTIFICATE> string.
- Such a designation provides a set of positive trust attributes
- explicitly stating trust for the listed purposes
- and/or a set of negative trust attributes
- explicitly rejecting the use for the listed purposes.
- The purposes are encoded using the values defined for the extended key usages
- (EKUs) that may be given in X.509 extensions of end-entity certificates.
- See also the L</Extended Key Usage> section below.
- The currently recognized uses are
- B<clientAuth> (SSL client use), B<serverAuth> (SSL server use),
- B<emailProtection> (S/MIME email use), B<codeSigning> (object signer use),
- B<OCSPSigning> (OCSP responder use), B<OCSP> (OCSP request use),
- B<timeStamping> (TSA server use), and B<anyExtendedKeyUsage>.
- As of OpenSSL 1.1.0, the last of these blocks all uses when rejected or
- enables all uses when trusted.
- A certificate, which may be CA certificate or an end-entity certificate,
- is considered a trust anchor for the given use
- if and only if all the following conditions hold:
- =over 4
- =item *
- It is an an element of the trust store.
- =item *
- It does not have a negative trust attribute rejecting the given use.
- =item *
- It has a positive trust attribute accepting the given use
- or (by default) one of the following compatibilty conditions apply:
- It is self-signed or the B<-partial_chain> option is given
- (which corresponds to the B<X509_V_FLAG_PARTIAL_CHAIN> flag being set).
- =back
- =head2 Certification Path Building
- First, a certificate chain is built up starting from the target certificate
- and ending in a trust anchor.
- The chain is built up iteratively, looking up in turn
- a certificate with suitable key usage that
- matches as an issuer of the current "subject" certificate as described below.
- If there is such a certificate, the first one found that is currently valid
- is taken, otherwise the one that expired most recently of all such certificates.
- For efficiency, no backtracking is performed, thus
- any further candidate issuer certificates that would match equally are ignored.
- When a self-signed certificate has been added, chain construction stops.
- In this case it must fully match a trust anchor, otherwise chain building fails.
- A candidate issuer certificate matches a subject certificate
- if all of the following conditions hold:
- =over 4
- =item *
- Its subject name matches the issuer name of the subject certificate.
- =item *
- If the subject certificate has an authority key identifier extension,
- each of its sub-fields equals the corresponding subject key identifier, serial
- number, and issuer field of the candidate issuer certificate,
- as far as the respective fields are present in both certificates.
- item *
- The certificate signature algorithm used to sign the subject certificate
- is supported and
- equals the public key algorithm of the candidate issuer certificate.
- =back
- The lookup first searches for issuer certificates in the trust store.
- If it does not find a match there it consults
- the list of untrusted ("intermediate" CA) certificates, if provided.
- =head2 Certification Path Validation
- When the certificate chain building process was successful
- the chain components and their links are checked thoroughly.
- The first step is to check that each certificate is well-formed.
- Part of these checks are enabled only if the B<-x509_strict> option is given.
- The second step is to check the extensions of every untrusted certificate
- for consistency with the given purpose.
- If the B<-purpose> option is not included then no such checks are done.
- The target certificate must not have an EKU extension that is incompatible with
- the given purpose, and all other certificates must be valid CA certificates.
- The precise extensions required are described in more detail in
- L<openssl-x509(1)/CERTIFICATE EXTENSIONS>.
- The third step is to check the trust settings on the last certificate
- (which typically is a self-signed root CA certificate).
- It must be trusted for the given use.
- For compatibility with previous versions of OpenSSL, a self-signed certificate
- with no trust attributes is considered to be valid for all uses.
- The fourth, and final, step is to check the validity of the certificate chain.
- For each element in the chain, including the root CA certificate,
- the validity period as specified by the C<notBefore> and C<notAfter> fields
- is checked against the current system time.
- The B<-attime> flag may be used to use a reference time other than "now."
- The certificate signature is checked as well
- (except for the signature of the typically self-signed root CA certificate,
- which is verified only if the B<-check_ss_sig> option is given).
- When verifying a certificate signature
- the keyUsage extension (if present) of the candidate issuer certificate
- is checked to permit digitalSignature for signing proxy certificates
- or to permit keyCertSign for signing other certificates, respectively.
- If all operations complete successfully then certificate is considered
- valid. If any operation fails then the certificate is not valid.
- =head1 OPTIONS
- =head2 Trusted Certificate Options
- The following options specify how to supply the certificates
- that can be used as trust anchors for certain uses.
- As mentioned, a collection of such certificates is called a I<trust store>.
- Note that OpenSSL does not provide a default set of trust anchors. Many
- Linux distributions include a system default and configure OpenSSL to point
- to that. Mozilla maintains an influential trust store that can be found at
- L<https://www.mozilla.org/en-US/about/governance/policies/security-group/certs/>.
- The certificates to add to the trust store
- can be specified using following options.
- =over 4
- =item B<-CAfile> I<file>
- Load the specified file which contains a certificate
- or several of them in case the input is in PEM or PKCS#12 format.
- PEM-encoded certificates may also have trust attributes set.
- =item B<-no-CAfile>
- Do not load the default file of trusted certificates.
- =item B<-CApath> I<dir>
- Use the specified directory as a collection of trusted certificates,
- i.e., a trust store.
- Files should be named with the hash value of the X.509 SubjectName of each
- certificate. This is so that the library can extract the IssuerName,
- hash it, and directly lookup the file to get the issuer certificate.
- See L<openssl-rehash(1)> for information on creating this type of directory.
- =item B<-no-CApath>
- Do not use the default directory of trusted certificates.
- =item B<-CAstore> I<uri>
- Use I<uri> as a store of CA certificates.
- The URI may indicate a single certificate, as well as a collection of them.
- With URIs in the C<file:> scheme, this acts as B<-CAfile> or
- B<-CApath>, depending on if the URI indicates a single file or
- directory.
- See L<ossl_store-file(7)> for more information on the C<file:> scheme.
- These certificates are also used when building the server certificate
- chain (for example with L<openssl-s_server(1)>) or client certificate
- chain (for example with L<openssl-s_time(1)>).
- =item B<-no-CAstore>
- Do not use the default store of trusted CA certificates.
- =back
- =head2 Verification Options
- The certificate verification can be fine-tuned with the following flags.
- =over 4
- =item B<-verbose>
- Print extra information about the operations being performed.
- =item B<-attime> I<timestamp>
- Perform validation checks using time specified by I<timestamp> and not
- current system time. I<timestamp> is the number of seconds since
- January 1, 1970 (i.e., the Unix Epoch).
- =item B<-no_check_time>
- This option suppresses checking the validity period of certificates and CRLs
- against the current time. If option B<-attime> is used to specify
- a verification time, the check is not suppressed.
- =item B<-x509_strict>
- This disables non-compliant workarounds for broken certificates.
- Thus errors are thrown on certificates not compliant with RFC 5280.
- When this option is set,
- among others, the following certificate well-formedness conditions are checked:
- =over 4
- =item -
- The basicConstraints of CA certificates must be marked critical.
- =item -
- CA certificates must explicitly include the keyUsage extension.
- =item -
- If a pathlenConstraint is given the key usage keyCertSign must be allowed.
- =item -
- The pathlenConstraint must not be given for non-CA certificates.
- =item -
- The issuer name of any certificate must not be empty.
- =item -
- The subject name of CA certs, certs with keyUsage crlSign, and certs
- without subjectAlternativeName must not be empty.
- =item -
- If a subjectAlternativeName extension is given it must not be empty.
- =item -
- The signatureAlgorithm field and the cert signature must be consistent.
- =item -
- Any given authorityKeyIdentifier and any given subjectKeyIdentifier
- must not be marked critical.
- =item -
- The authorityKeyIdentifier must be given for X.509v3 certs unless they
- are self-signed.
- =item -
- The subjectKeyIdentifier must be given for all X.509v3 CA certs.
- =back
- =item B<-ignore_critical>
- Normally if an unhandled critical extension is present that is not
- supported by OpenSSL the certificate is rejected (as required by RFC5280).
- If this option is set critical extensions are ignored.
- =item B<-issuer_checks>
- Ignored.
- =item B<-crl_check>
- Checks end entity certificate validity by attempting to look up a valid CRL.
- If a valid CRL cannot be found an error occurs.
- =item B<-crl_check_all>
- Checks the validity of B<all> certificates in the chain by attempting
- to look up valid CRLs.
- =item B<-use_deltas>
- Enable support for delta CRLs.
- =item B<-extended_crl>
- Enable extended CRL features such as indirect CRLs and alternate CRL
- signing keys.
- =item B<-suiteB_128_only>, B<-suiteB_128>, B<-suiteB_192>
- Enable the Suite B mode operation at 128 bit Level of Security, 128 bit or
- 192 bit, or only 192 bit Level of Security respectively.
- See RFC6460 for details. In particular the supported signature algorithms are
- reduced to support only ECDSA and SHA256 or SHA384 and only the elliptic curves
- P-256 and P-384.
- =item B<-auth_level> I<level>
- Set the certificate chain authentication security level to I<level>.
- The authentication security level determines the acceptable signature and
- public key strength when verifying certificate chains. For a certificate
- chain to validate, the public keys of all the certificates must meet the
- specified security I<level>. The signature algorithm security level is
- enforced for all the certificates in the chain except for the chain's
- I<trust anchor>, which is either directly trusted or validated by means
- other than its signature. See L<SSL_CTX_set_security_level(3)> for the
- definitions of the available levels. The default security level is -1,
- or "not set". At security level 0 or lower all algorithms are acceptable.
- Security level 1 requires at least 80-bit-equivalent security and is broadly
- interoperable, though it will, for example, reject MD5 signatures or RSA
- keys shorter than 1024 bits.
- =item B<-partial_chain>
- Allow verification to succeed if an incomplete chain can be built.
- That is, a chain ending in a certificate that normally would not be trusted
- (because it has no matching positive trust attributes and is not self-signed)
- but is an element of the trust store.
- This certificate may be self-issued or belong to an intermediate CA.
- =item B<-check_ss_sig>
- Verify the signature of
- the last certificate in a chain if the certificate is supposedly self-signed.
- This is prohibited and will result in an error if it is a non-conforming CA
- certificate with key usage restrictions not including the keyCertSign bit.
- This verification is disabled by default because it doesn't add any security.
- =item B<-allow_proxy_certs>
- Allow the verification of proxy certificates.
- =item B<-trusted_first>
- As of OpenSSL 1.1.0 this option is on by default and cannot be disabled.
- When constructing the certificate chain, the trusted certificates specified
- via B<-CAfile>, B<-CApath>, B<-CAstore> or B<-trusted> are always used
- before any certificates specified via B<-untrusted>.
- =item B<-no_alt_chains>
- As of OpenSSL 1.1.0, since B<-trusted_first> always on, this option has no
- effect.
- =item B<-trusted> I<file>
- Parse I<file> as a set of one or more certificates.
- Each of them qualifies as trusted if has a suitable positive trust attribute
- or it is self-signed or the B<-partial_chain> option is specified.
- This option implies the B<-no-CAfile>, B<-no-CApath>, and B<-no-CAstore> options
- and it cannot be used with the B<-CAfile>, B<-CApath> or B<-CAstore> options, so
- only certificates specified using the B<-trusted> option are trust anchors.
- This option may be used multiple times.
- =item B<-untrusted> I<file>
- Parse I<file> as a set of one or more certificates.
- All certificates (typically of intermediate CAs) are considered untrusted
- and may be used to
- construct a certificate chain from the target certificate to a trust anchor.
- This option may be used multiple times.
- =item B<-policy> I<arg>
- Enable policy processing and add I<arg> to the user-initial-policy-set (see
- RFC5280). The policy I<arg> can be an object name an OID in numeric form.
- This argument can appear more than once.
- =item B<-explicit_policy>
- Set policy variable require-explicit-policy (see RFC5280).
- =item B<-policy_check>
- Enables certificate policy processing.
- =item B<-policy_print>
- Print out diagnostics related to policy processing.
- =item B<-inhibit_any>
- Set policy variable inhibit-any-policy (see RFC5280).
- =item B<-inhibit_map>
- Set policy variable inhibit-policy-mapping (see RFC5280).
- =item B<-purpose> I<purpose>
- The intended use for the certificate. If this option is not specified, this
- command will not consider certificate purpose during chain verification.
- Currently accepted uses are B<sslclient>, B<sslserver>, B<nssslserver>,
- B<smimesign>, B<smimeencrypt>, B<crlsign>, B<ocsphelper>, B<timestampsign>,
- and <any>.
- =item B<-verify_depth> I<num>
- Limit the certificate chain to I<num> intermediate CA certificates.
- A maximal depth chain can have up to I<num>+2 certificates, since neither the
- end-entity certificate nor the trust-anchor certificate count against the
- B<-verify_depth> limit.
- =item B<-verify_email> I<email>
- Verify if I<email> matches the email address in Subject Alternative Name or
- the email in the subject Distinguished Name.
- =item B<-verify_hostname> I<hostname>
- Verify if I<hostname> matches DNS name in Subject Alternative Name or
- Common Name in the subject certificate.
- =item B<-verify_ip> I<ip>
- Verify if I<ip> matches the IP address in Subject Alternative Name of
- the subject certificate.
- =item B<-verify_name> I<name>
- Use default verification policies like trust model and required certificate
- policies identified by I<name>.
- The trust model determines which auxiliary trust or reject OIDs are applicable
- to verifying the given certificate chain.
- They can be given using the B<-addtrust> and B<-addreject> options
- for L<openssl-x509(1)>.
- Supported policy names include: B<default>, B<pkcs7>, B<smime_sign>,
- B<ssl_client>, B<ssl_server>.
- These mimics the combinations of purpose and trust settings used in SSL, CMS
- and S/MIME.
- As of OpenSSL 1.1.0, the trust model is inferred from the purpose when not
- specified, so the B<-verify_name> options are functionally equivalent to the
- corresponding B<-purpose> settings.
- =back
- =head2 Extended Verification Options
- Sometimes there may be more than one certificate chain leading to an
- end-entity certificate.
- This usually happens when a root or intermediate CA signs a certificate
- for another a CA in other organization.
- Another reason is when a CA might have intermediates that use two different
- signature formats, such as a SHA-1 and a SHA-256 digest.
- The following options can be used to provide data that will allow the
- OpenSSL command to generate an alternative chain.
- =over 4
- =item B<-xkey> I<infile>, B<-xcert> I<infile>, B<-xchain>
- Specify an extra certificate, private key and certificate chain. These behave
- in the same manner as the B<-cert>, B<-key> and B<-cert_chain> options. When
- specified, the callback returning the first valid chain will be in use by the
- client.
- =item B<-xchain_build>
- Specify whether the application should build the certificate chain to be
- provided to the server for the extra certificates via the B<-xkey>,
- B<-xcert>, and B<-xchain> options.
- =item B<-xcertform> B<DER>|B<PEM>|B<P12>
- The input format for the extra certificate.
- This option has no effect and is retained for backward compatibility only.
- =item B<-xkeyform> B<DER>|B<PEM>|B<P12>
- The input format for the extra key.
- This option has no effect and is retained for backward compatibility only.
- =back
- =head2 Certificate Extensions
- Options like B<-purpose> lead to checking the certificate extensions,
- which determine what the target certificate and intermediate CA certificates
- can be used for.
- =head3 Basic Constraints
- The basicConstraints extension CA flag is used to determine whether the
- certificate can be used as a CA. If the CA flag is true then it is a CA,
- if the CA flag is false then it is not a CA. B<All> CAs should have the
- CA flag set to true.
- If the basicConstraints extension is absent,
- which includes the case that it is an X.509v1 certificate,
- then the certificate is considered to be a "possible CA" and
- other extensions are checked according to the intended use of the certificate.
- The treatment of certificates without basicConstraints as a CA
- is presently supported, but this could change in the future.
- =head3 Key Usage
- If the keyUsage extension is present then additional restraints are
- made on the uses of the certificate. A CA certificate B<must> have the
- keyCertSign bit set if the keyUsage extension is present.
- =head3 Extended Key Usage
- The extKeyUsage (EKU) extension places additional restrictions on the
- certificate uses. If this extension is present (whether critical or not)
- the key can only be used for the purposes specified.
- A complete description of each check is given below. The comments about
- basicConstraints and keyUsage and X.509v1 certificates above apply to B<all>
- CA certificates.
- =over 4
- =item B<SSL Client>
- The extended key usage extension must be absent or include the "web client
- authentication" OID. The keyUsage extension must be absent or it must have the
- digitalSignature bit set. The Netscape certificate type must be absent
- or it must have the SSL client bit set.
- =item B<SSL Client CA>
- The extended key usage extension must be absent or include the "web client
- authentication" OID.
- The Netscape certificate type must be absent or it must have the SSL CA bit set.
- This is used as a work around if the basicConstraints extension is absent.
- =item B<SSL Server>
- The extended key usage extension must be absent or include the "web server
- authentication" and/or one of the SGC OIDs. The keyUsage extension must be
- absent or it
- must have the digitalSignature, the keyEncipherment set or both bits set.
- The Netscape certificate type must be absent or have the SSL server bit set.
- =item B<SSL Server CA>
- The extended key usage extension must be absent or include the "web server
- authentication" and/or one of the SGC OIDs. The Netscape certificate type must
- be absent or the SSL CA bit must be set.
- This is used as a work around if the basicConstraints extension is absent.
- =item B<Netscape SSL Server>
- For Netscape SSL clients to connect to an SSL server it must have the
- keyEncipherment bit set if the keyUsage extension is present. This isn't
- always valid because some cipher suites use the key for digital signing.
- Otherwise it is the same as a normal SSL server.
- =item B<Common S/MIME Client Tests>
- The extended key usage extension must be absent or include the "email
- protection" OID. The Netscape certificate type must be absent or should have the
- S/MIME bit set. If the S/MIME bit is not set in the Netscape certificate type
- then the SSL client bit is tolerated as an alternative but a warning is shown.
- This is because some Verisign certificates don't set the S/MIME bit.
- =item B<S/MIME Signing>
- In addition to the common S/MIME client tests the digitalSignature bit or
- the nonRepudiation bit must be set if the keyUsage extension is present.
- =item B<S/MIME Encryption>
- In addition to the common S/MIME tests the keyEncipherment bit must be set
- if the keyUsage extension is present.
- =item B<S/MIME CA>
- The extended key usage extension must be absent or include the "email
- protection" OID. The Netscape certificate type must be absent or must have the
- S/MIME CA bit set.
- This is used as a work around if the basicConstraints extension is absent.
- =item B<CRL Signing>
- The keyUsage extension must be absent or it must have the CRL signing bit
- set.
- =item B<CRL Signing CA>
- The normal CA tests apply. Except in this case the basicConstraints extension
- must be present.
- =back
- =head1 BUGS
- The issuer checks still suffer from limitations in the underlying X509_LOOKUP
- API. One consequence of this is that trusted certificates with matching
- subject name must appear in a file (as specified by the B<-CAfile> option),
- a directory (as specified by B<-CApath>),
- or a store (as specified by B<-CAstore>).
- If there are multiple such matches, possibly in multiple locations,
- only the first one (in the mentioned order of locations) is recognised.
- =head1 SEE ALSO
- L<X509_verify_cert(3)>,
- L<openssl-verify(1)>,
- L<openssl-ocsp(1)>,
- L<openssl-ts(1)>,
- L<openssl-s_client(1)>,
- L<openssl-s_server(1)>,
- L<openssl-smime(1)>,
- L<openssl-cmp(1)>,
- L<openssl-cms(1)>
- =head1 HISTORY
- The checks enabled by B<-x509_strict> have been extended in OpenSSL 3.0.
- =head1 COPYRIGHT
- Copyright 2000-2021 The OpenSSL Project Authors. All Rights Reserved.
- Licensed under the Apache License 2.0 (the "License"). You may not use
- this file except in compliance with the License. You can obtain a copy
- in the file LICENSE in the source distribution or at
- L<https://www.openssl.org/source/license.html>.
- =cut
|