123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678 |
- =pod
- =head1 NAME
- req - PKCS#10 certificate request and certificate generating utility.
- =head1 SYNOPSIS
- B<openssl> B<req>
- [B<-inform PEM|DER>]
- [B<-outform PEM|DER>]
- [B<-in filename>]
- [B<-passin arg>]
- [B<-out filename>]
- [B<-passout arg>]
- [B<-text>]
- [B<-pubkey>]
- [B<-noout>]
- [B<-verify>]
- [B<-modulus>]
- [B<-new>]
- [B<-rand file(s)>]
- [B<-newkey rsa:bits>]
- [B<-newkey alg:file>]
- [B<-nodes>]
- [B<-key filename>]
- [B<-keyform PEM|DER>]
- [B<-keyout filename>]
- [B<-keygen_engine id>]
- [B<-[digest]>]
- [B<-config filename>]
- [B<-subj arg>]
- [B<-multivalue-rdn>]
- [B<-x509>]
- [B<-days n>]
- [B<-set_serial n>]
- [B<-asn1-kludge>]
- [B<-no-asn1-kludge>]
- [B<-newhdr>]
- [B<-extensions section>]
- [B<-reqexts section>]
- [B<-utf8>]
- [B<-nameopt>]
- [B<-reqopt>]
- [B<-subject>]
- [B<-subj arg>]
- [B<-batch>]
- [B<-verbose>]
- [B<-engine id>]
- =head1 DESCRIPTION
- The B<req> command primarily creates and processes certificate requests
- in PKCS#10 format. It can additionally create self signed certificates
- for use as root CAs for example.
- =head1 COMMAND OPTIONS
- =over 4
- =item B<-inform DER|PEM>
- This specifies the input format. The B<DER> option uses an ASN1 DER encoded
- form compatible with the PKCS#10. The B<PEM> form is the default format: it
- consists of the B<DER> format base64 encoded with additional header and
- footer lines.
- =item B<-outform DER|PEM>
- This specifies the output format, the options have the same meaning as the
- B<-inform> option.
- =item B<-in filename>
- This specifies the input filename to read a request from or standard input
- if this option is not specified. A request is only read if the creation
- options (B<-new> and B<-newkey>) are not specified.
- =item B<-passin arg>
- the input file password source. For more information about the format of B<arg>
- see the B<PASS PHRASE ARGUMENTS> section in L<openssl(1)|openssl(1)>.
- =item B<-out filename>
- This specifies the output filename to write to or standard output by
- default.
- =item B<-passout arg>
- the output file password source. For more information about the format of B<arg>
- see the B<PASS PHRASE ARGUMENTS> section in L<openssl(1)|openssl(1)>.
- =item B<-text>
- prints out the certificate request in text form.
- =item B<-subject>
- prints out the request subject (or certificate subject if B<-x509> is
- specified)
- =item B<-pubkey>
- outputs the public key.
- =item B<-noout>
- this option prevents output of the encoded version of the request.
- =item B<-modulus>
- this option prints out the value of the modulus of the public key
- contained in the request.
- =item B<-verify>
- verifies the signature on the request.
- =item B<-new>
- this option generates a new certificate request. It will prompt
- the user for the relevant field values. The actual fields
- prompted for and their maximum and minimum sizes are specified
- in the configuration file and any requested extensions.
- If the B<-key> option is not used it will generate a new RSA private
- key using information specified in the configuration file.
- =item B<-subj arg>
- Replaces subject field of input request with specified data and outputs
- modified request. The arg must be formatted as
- I</type0=value0/type1=value1/type2=...>,
- characters may be escaped by \ (backslash), no spaces are skipped.
- =item B<-rand file(s)>
- a file or files containing random data used to seed the random number
- generator, or an EGD socket (see L<RAND_egd(3)|RAND_egd(3)>).
- Multiple files can be specified separated by a OS-dependent character.
- The separator is B<;> for MS-Windows, B<,> for OpenVMS, and B<:> for
- all others.
- =item B<-newkey arg>
- this option creates a new certificate request and a new private
- key. The argument takes one of several forms. B<rsa:nbits>, where
- B<nbits> is the number of bits, generates an RSA key B<nbits>
- in size. If B<nbits> is omitted, i.e. B<-newkey rsa> specified,
- the default key size, specified in the configuration file is used.
- All other algorithms support the B<-newkey alg:file> form, where file may be
- an algorithm parameter file, created by the B<genpkey -genparam> command
- or and X.509 certificate for a key with approriate algorithm.
- B<param:file> generates a key using the parameter file or certificate B<file>,
- the algorithm is determined by the parameters. B<algname:file> use algorithm
- B<algname> and parameter file B<file>: the two algorithms must match or an
- error occurs. B<algname> just uses algorithm B<algname>, and parameters,
- if neccessary should be specified via B<-pkeyopt> parameter.
- B<dsa:filename> generates a DSA key using the parameters
- in the file B<filename>. B<ec:filename> generates EC key (usable both with
- ECDSA or ECDH algorithms), B<gost2001:filename> generates GOST R
- 34.10-2001 key (requires B<ccgost> engine configured in the configuration
- file). If just B<gost2001> is specified a parameter set should be
- specified by B<-pkeyopt paramset:X>
- =item B<-pkeyopt opt:value>
- set the public key algorithm option B<opt> to B<value>. The precise set of
- options supported depends on the public key algorithm used and its
- implementation. See B<KEY GENERATION OPTIONS> in the B<genpkey> manual page
- for more details.
- =item B<-key filename>
- This specifies the file to read the private key from. It also
- accepts PKCS#8 format private keys for PEM format files.
- =item B<-keyform PEM|DER>
- the format of the private key file specified in the B<-key>
- argument. PEM is the default.
- =item B<-keyout filename>
- this gives the filename to write the newly created private key to.
- If this option is not specified then the filename present in the
- configuration file is used.
- =item B<-nodes>
- if this option is specified then if a private key is created it
- will not be encrypted.
- =item B<-[digest]>
- this specifies the message digest to sign the request with (such as
- B<-md5>, B<-sha1>). This overrides the digest algorithm specified in
- the configuration file.
- Some public key algorithms may override this choice. For instance, DSA
- signatures always use SHA1, GOST R 34.10 signatures always use
- GOST R 34.11-94 (B<-md_gost94>).
- =item B<-config filename>
- this allows an alternative configuration file to be specified,
- this overrides the compile time filename or any specified in
- the B<OPENSSL_CONF> environment variable.
- =item B<-subj arg>
- sets subject name for new request or supersedes the subject name
- when processing a request.
- The arg must be formatted as I</type0=value0/type1=value1/type2=...>,
- characters may be escaped by \ (backslash), no spaces are skipped.
- =item B<-multivalue-rdn>
- this option causes the -subj argument to be interpreted with full
- support for multivalued RDNs. Example:
- I</DC=org/DC=OpenSSL/DC=users/UID=123456+CN=John Doe>
- If -multi-rdn is not used then the UID value is I<123456+CN=John Doe>.
- =item B<-x509>
- this option outputs a self signed certificate instead of a certificate
- request. This is typically used to generate a test certificate or
- a self signed root CA. The extensions added to the certificate
- (if any) are specified in the configuration file. Unless specified
- using the B<set_serial> option B<0> will be used for the serial
- number.
- =item B<-days n>
- when the B<-x509> option is being used this specifies the number of
- days to certify the certificate for. The default is 30 days.
- =item B<-set_serial n>
- serial number to use when outputting a self signed certificate. This
- may be specified as a decimal value or a hex value if preceded by B<0x>.
- It is possible to use negative serial numbers but this is not recommended.
- =item B<-extensions section>
- =item B<-reqexts section>
- these options specify alternative sections to include certificate
- extensions (if the B<-x509> option is present) or certificate
- request extensions. This allows several different sections to
- be used in the same configuration file to specify requests for
- a variety of purposes.
- =item B<-utf8>
- this option causes field values to be interpreted as UTF8 strings, by
- default they are interpreted as ASCII. This means that the field
- values, whether prompted from a terminal or obtained from a
- configuration file, must be valid UTF8 strings.
- =item B<-nameopt option>
- option which determines how the subject or issuer names are displayed. The
- B<option> argument can be a single option or multiple options separated by
- commas. Alternatively the B<-nameopt> switch may be used more than once to
- set multiple options. See the L<x509(1)|x509(1)> manual page for details.
- =item B<-reqopt>
- customise the output format used with B<-text>. The B<option> argument can be
- a single option or multiple options separated by commas.
- See discission of the B<-certopt> parameter in the L<B<x509>|x509(1)>
- command.
- =item B<-asn1-kludge>
- by default the B<req> command outputs certificate requests containing
- no attributes in the correct PKCS#10 format. However certain CAs will only
- accept requests containing no attributes in an invalid form: this
- option produces this invalid format.
- More precisely the B<Attributes> in a PKCS#10 certificate request
- are defined as a B<SET OF Attribute>. They are B<not OPTIONAL> so
- if no attributes are present then they should be encoded as an
- empty B<SET OF>. The invalid form does not include the empty
- B<SET OF> whereas the correct form does.
- It should be noted that very few CAs still require the use of this option.
- =item B<-no-asn1-kludge>
- Reverses effect of B<-asn1-kludge>
- =item B<-newhdr>
- Adds the word B<NEW> to the PEM file header and footer lines on the outputed
- request. Some software (Netscape certificate server) and some CAs need this.
- =item B<-batch>
- non-interactive mode.
- =item B<-verbose>
- print extra details about the operations being performed.
- =item B<-engine id>
- specifying an engine (by its unique B<id> string) will cause B<req>
- to attempt to obtain a functional reference to the specified engine,
- thus initialising it if needed. The engine will then be set as the default
- for all available algorithms.
- =item B<-keygen_engine id>
- specifies an engine (by its unique B<id> string) which would be used
- for key generation operations.
- =back
- =head1 CONFIGURATION FILE FORMAT
- The configuration options are specified in the B<req> section of
- the configuration file. As with all configuration files if no
- value is specified in the specific section (i.e. B<req>) then
- the initial unnamed or B<default> section is searched too.
- The options available are described in detail below.
- =over 4
- =item B<input_password output_password>
- The passwords for the input private key file (if present) and
- the output private key file (if one will be created). The
- command line options B<passin> and B<passout> override the
- configuration file values.
- =item B<default_bits>
- This specifies the default key size in bits. If not specified then
- 512 is used. It is used if the B<-new> option is used. It can be
- overridden by using the B<-newkey> option.
- =item B<default_keyfile>
- This is the default filename to write a private key to. If not
- specified the key is written to standard output. This can be
- overridden by the B<-keyout> option.
- =item B<oid_file>
- This specifies a file containing additional B<OBJECT IDENTIFIERS>.
- Each line of the file should consist of the numerical form of the
- object identifier followed by white space then the short name followed
- by white space and finally the long name.
- =item B<oid_section>
- This specifies a section in the configuration file containing extra
- object identifiers. Each line should consist of the short name of the
- object identifier followed by B<=> and the numerical form. The short
- and long names are the same when this option is used.
- =item B<RANDFILE>
- This specifies a filename in which random number seed information is
- placed and read from, or an EGD socket (see L<RAND_egd(3)|RAND_egd(3)>).
- It is used for private key generation.
- =item B<encrypt_key>
- If this is set to B<no> then if a private key is generated it is
- B<not> encrypted. This is equivalent to the B<-nodes> command line
- option. For compatibility B<encrypt_rsa_key> is an equivalent option.
- =item B<default_md>
- This option specifies the digest algorithm to use. Possible values
- include B<md5 sha1 mdc2>. If not present then MD5 is used. This
- option can be overridden on the command line.
- =item B<string_mask>
- This option masks out the use of certain string types in certain
- fields. Most users will not need to change this option.
- It can be set to several values B<default> which is also the default
- option uses PrintableStrings, T61Strings and BMPStrings if the
- B<pkix> value is used then only PrintableStrings and BMPStrings will
- be used. This follows the PKIX recommendation in RFC2459. If the
- B<utf8only> option is used then only UTF8Strings will be used: this
- is the PKIX recommendation in RFC2459 after 2003. Finally the B<nombstr>
- option just uses PrintableStrings and T61Strings: certain software has
- problems with BMPStrings and UTF8Strings: in particular Netscape.
- =item B<req_extensions>
- this specifies the configuration file section containing a list of
- extensions to add to the certificate request. It can be overridden
- by the B<-reqexts> command line switch. See the
- L<x509v3_config(5)|x509v3_config(5)> manual page for details of the
- extension section format.
- =item B<x509_extensions>
- this specifies the configuration file section containing a list of
- extensions to add to certificate generated when the B<-x509> switch
- is used. It can be overridden by the B<-extensions> command line switch.
- =item B<prompt>
- if set to the value B<no> this disables prompting of certificate fields
- and just takes values from the config file directly. It also changes the
- expected format of the B<distinguished_name> and B<attributes> sections.
- =item B<utf8>
- if set to the value B<yes> then field values to be interpreted as UTF8
- strings, by default they are interpreted as ASCII. This means that
- the field values, whether prompted from a terminal or obtained from a
- configuration file, must be valid UTF8 strings.
- =item B<attributes>
- this specifies the section containing any request attributes: its format
- is the same as B<distinguished_name>. Typically these may contain the
- challengePassword or unstructuredName types. They are currently ignored
- by OpenSSL's request signing utilities but some CAs might want them.
- =item B<distinguished_name>
- This specifies the section containing the distinguished name fields to
- prompt for when generating a certificate or certificate request. The format
- is described in the next section.
- =back
- =head1 DISTINGUISHED NAME AND ATTRIBUTE SECTION FORMAT
- There are two separate formats for the distinguished name and attribute
- sections. If the B<prompt> option is set to B<no> then these sections
- just consist of field names and values: for example,
- CN=My Name
- OU=My Organization
- emailAddress=someone@somewhere.org
- This allows external programs (e.g. GUI based) to generate a template file
- with all the field names and values and just pass it to B<req>. An example
- of this kind of configuration file is contained in the B<EXAMPLES> section.
- Alternatively if the B<prompt> option is absent or not set to B<no> then the
- file contains field prompting information. It consists of lines of the form:
- fieldName="prompt"
- fieldName_default="default field value"
- fieldName_min= 2
- fieldName_max= 4
- "fieldName" is the field name being used, for example commonName (or CN).
- The "prompt" string is used to ask the user to enter the relevant
- details. If the user enters nothing then the default value is used if no
- default value is present then the field is omitted. A field can
- still be omitted if a default value is present if the user just
- enters the '.' character.
- The number of characters entered must be between the fieldName_min and
- fieldName_max limits: there may be additional restrictions based
- on the field being used (for example countryName can only ever be
- two characters long and must fit in a PrintableString).
- Some fields (such as organizationName) can be used more than once
- in a DN. This presents a problem because configuration files will
- not recognize the same name occurring twice. To avoid this problem
- if the fieldName contains some characters followed by a full stop
- they will be ignored. So for example a second organizationName can
- be input by calling it "1.organizationName".
- The actual permitted field names are any object identifier short or
- long names. These are compiled into OpenSSL and include the usual
- values such as commonName, countryName, localityName, organizationName,
- organizationUnitName, stateOrProvinceName. Additionally emailAddress
- is include as well as name, surname, givenName initials and dnQualifier.
- Additional object identifiers can be defined with the B<oid_file> or
- B<oid_section> options in the configuration file. Any additional fields
- will be treated as though they were a DirectoryString.
- =head1 EXAMPLES
- Examine and verify certificate request:
- openssl req -in req.pem -text -verify -noout
- Create a private key and then generate a certificate request from it:
- openssl genrsa -out key.pem 1024
- openssl req -new -key key.pem -out req.pem
- The same but just using req:
- openssl req -newkey rsa:1024 -keyout key.pem -out req.pem
- Generate a self signed root certificate:
- openssl req -x509 -newkey rsa:1024 -keyout key.pem -out req.pem
- Example of a file pointed to by the B<oid_file> option:
- 1.2.3.4 shortName A longer Name
- 1.2.3.6 otherName Other longer Name
- Example of a section pointed to by B<oid_section> making use of variable
- expansion:
- testoid1=1.2.3.5
- testoid2=${testoid1}.6
- Sample configuration file prompting for field values:
- [ req ]
- default_bits = 1024
- default_keyfile = privkey.pem
- distinguished_name = req_distinguished_name
- attributes = req_attributes
- x509_extensions = v3_ca
- dirstring_type = nobmp
- [ req_distinguished_name ]
- countryName = Country Name (2 letter code)
- countryName_default = AU
- countryName_min = 2
- countryName_max = 2
- localityName = Locality Name (eg, city)
- organizationalUnitName = Organizational Unit Name (eg, section)
- commonName = Common Name (eg, YOUR name)
- commonName_max = 64
- emailAddress = Email Address
- emailAddress_max = 40
- [ req_attributes ]
- challengePassword = A challenge password
- challengePassword_min = 4
- challengePassword_max = 20
- [ v3_ca ]
- subjectKeyIdentifier=hash
- authorityKeyIdentifier=keyid:always,issuer:always
- basicConstraints = CA:true
- Sample configuration containing all field values:
- RANDFILE = $ENV::HOME/.rnd
- [ req ]
- default_bits = 1024
- default_keyfile = keyfile.pem
- distinguished_name = req_distinguished_name
- attributes = req_attributes
- prompt = no
- output_password = mypass
- [ req_distinguished_name ]
- C = GB
- ST = Test State or Province
- L = Test Locality
- O = Organization Name
- OU = Organizational Unit Name
- CN = Common Name
- emailAddress = test@email.address
- [ req_attributes ]
- challengePassword = A challenge password
- =head1 NOTES
- The header and footer lines in the B<PEM> format are normally:
- -----BEGIN CERTIFICATE REQUEST-----
- -----END CERTIFICATE REQUEST-----
- some software (some versions of Netscape certificate server) instead needs:
- -----BEGIN NEW CERTIFICATE REQUEST-----
- -----END NEW CERTIFICATE REQUEST-----
- which is produced with the B<-newhdr> option but is otherwise compatible.
- Either form is accepted transparently on input.
- The certificate requests generated by B<Xenroll> with MSIE have extensions
- added. It includes the B<keyUsage> extension which determines the type of
- key (signature only or general purpose) and any additional OIDs entered
- by the script in an extendedKeyUsage extension.
- =head1 DIAGNOSTICS
- The following messages are frequently asked about:
- Using configuration from /some/path/openssl.cnf
- Unable to load config info
- This is followed some time later by...
- unable to find 'distinguished_name' in config
- problems making Certificate Request
- The first error message is the clue: it can't find the configuration
- file! Certain operations (like examining a certificate request) don't
- need a configuration file so its use isn't enforced. Generation of
- certificates or requests however does need a configuration file. This
- could be regarded as a bug.
- Another puzzling message is this:
- Attributes:
- a0:00
- this is displayed when no attributes are present and the request includes
- the correct empty B<SET OF> structure (the DER encoding of which is 0xa0
- 0x00). If you just see:
- Attributes:
- then the B<SET OF> is missing and the encoding is technically invalid (but
- it is tolerated). See the description of the command line option B<-asn1-kludge>
- for more information.
- =head1 ENVIRONMENT VARIABLES
- The variable B<OPENSSL_CONF> if defined allows an alternative configuration
- file location to be specified, it will be overridden by the B<-config> command
- line switch if it is present. For compatibility reasons the B<SSLEAY_CONF>
- environment variable serves the same purpose but its use is discouraged.
- =head1 BUGS
- OpenSSL's handling of T61Strings (aka TeletexStrings) is broken: it effectively
- treats them as ISO-8859-1 (Latin 1), Netscape and MSIE have similar behaviour.
- This can cause problems if you need characters that aren't available in
- PrintableStrings and you don't want to or can't use BMPStrings.
- As a consequence of the T61String handling the only correct way to represent
- accented characters in OpenSSL is to use a BMPString: unfortunately Netscape
- currently chokes on these. If you have to use accented characters with Netscape
- and MSIE then you currently need to use the invalid T61String form.
- The current prompting is not very friendly. It doesn't allow you to confirm what
- you've just entered. Other things like extensions in certificate requests are
- statically defined in the configuration file. Some of these: like an email
- address in subjectAltName should be input by the user.
- =head1 SEE ALSO
- L<x509(1)|x509(1)>, L<ca(1)|ca(1)>, L<genrsa(1)|genrsa(1)>,
- L<gendsa(1)|gendsa(1)>, L<config(5)|config(5)>,
- L<x509v3_config(5)|x509v3_config(5)>
- =cut
|