You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
-`cross-csr`: creates a CSR for signing by a third party, outputting a PEM CSR.
14
14
-`cross-certificate`: issues a certificate for one root, signed by another root. This is distinct from an intermediate because there is no path length constraint and there are no EKUs.
15
15
-`key`: generates a signing key on HSM, outputting a PEM public key
16
-
-`ocsp-response`: creates a OCSP response for the provided certificate and signs it using a signing key already on a HSM, outputting a base64 encoded response
17
16
-`crl`: creates a CRL with the IDP extension and `onlyContainsCACerts = true` from the provided profile and signs it using a signing key already on a HSM, outputting a PEM CRL
18
17
19
18
These modes are set in the `ceremony-type` field of the configuration file.
@@ -128,7 +127,6 @@ certificate-profile:
128
127
country: US
129
128
not-before: 2020-01-01 12:00:00
130
129
not-after: 2040-01-01 12:00:00
131
-
ocsp-url: http://good-guys.com/ocsp
132
130
crl-url: http://good-guys.com/crl
133
131
issuer-url: http://good-guys.com/root
134
132
policies:
@@ -193,7 +191,6 @@ certificate-profile:
193
191
country: US
194
192
not-before: 2020-01-01 12:00:00
195
193
not-after: 2040-01-01 12:00:00
196
-
ocsp-url: http://good-guys.com/ocsp
197
194
crl-url: http://good-guys.com/crl
198
195
issuer-url: http://good-guys.com/root
199
196
policies:
@@ -296,61 +293,6 @@ outputs:
296
293
297
294
This config generates an ECDSA P-384 key in the HSM with the object label `intermediate signing key`. The public key is written to `/home/user/intermediate-signing-pub.pem`.
298
295
299
-
### OCSP Response ceremony
300
-
301
-
- `ceremony-type`: string describing the ceremony type, `ocsp-response`.
302
-
- `pkcs11`: object containing PKCS#11 related fields.
303
-
304
-
| Field | Description |
305
-
| --- | --- |
306
-
| `module` | Path to the PKCS#11 module to use to communicate with a HSM. |
307
-
| `pin` | Specifies the login PIN, should only be provided if the HSM device requires one to interact with the slot. |
308
-
| `signing-key-slot` | Specifies which HSM object slot the signing key is in. |
309
-
| `signing-key-label` | Specifies the HSM object label for the signing keypair's public key. |
310
-
311
-
- `inputs`: object containing paths for inputs
312
-
313
-
| Field | Description |
314
-
| --- | --- |
315
-
| `certificate-path` | Path to PEM certificate to create a response for. |
316
-
| `issuer-certificate-path` | Path to PEM issuer certificate. |
317
-
| `delegated-issuer-certificate-path` | Path to PEM delegated issuer certificate, if one is being used. |
318
-
319
-
- `outputs`: object containing paths to write outputs.
320
-
321
-
| Field | Description |
322
-
| --- | --- |
323
-
| `response-path` | Path to store signed base64 encoded response. |
324
-
325
-
- `ocsp-profile`: object containing profile for the OCSP response.
326
-
327
-
| Field | Description |
328
-
| --- | --- |
329
-
| `this-update` | Specifies the OCSP response thisUpdate date, in the format `2006-01-02 15:04:05`. The time will be interpreted as UTC. |
330
-
| `next-update` | Specifies the OCSP response nextUpdate date, in the format `2006-01-02 15:04:05`. The time will be interpreted as UTC. |
331
-
| `status` | Specifies the OCSP response status, either `good` or `revoked`. |
332
-
333
-
Example:
334
-
335
-
```yaml
336
-
ceremony-type: ocsp-response
337
-
pkcs11:
338
-
module: /usr/lib/opensc-pkcs11.so
339
-
signing-key-slot: 0
340
-
signing-key-label: root signing key
341
-
inputs:
342
-
certificate-path: /home/user/certificate.pem
343
-
issuer-certificate-path: /home/user/root-cert.pem
344
-
outputs:
345
-
response-path: /home/user/ocsp-resp.b64
346
-
ocsp-profile:
347
-
this-update: 2020-01-01 12:00:00
348
-
next-update: 2021-01-01 12:00:00
349
-
status: good
350
-
```
351
-
352
-
This config generates a OCSP response signed by a key in the HSM, identified by the object label `root signing key` and object ID `ffff`. The response will be for the certificate in `/home/user/certificate.pem`, and will be written to `/home/user/ocsp-resp.b64`.
353
-
354
296
### CRL ceremony
355
297
356
298
- `ceremony-type`: string describing the ceremony type, `crl`.
@@ -419,7 +361,6 @@ The certificate profile defines a restricted set of fields that are used to gene
419
361
| `country` | Specifies the subject country |
420
362
| `not-before` | Specifies the certificate notBefore date, in the format `2006-01-02 15:04:05`. The time will be interpreted as UTC. |
421
363
| `not-after` | Specifies the certificate notAfter date, in the format `2006-01-02 15:04:05`. The time will be interpreted as UTC. |
422
-
| `ocsp-url` | Specifies the AIA OCSP responder URL |
423
364
| `crl-url` | Specifies the cRLDistributionPoints URL |
424
365
| `issuer-url` | Specifies the AIA caIssuer URL |
425
366
| `policies` | Specifies contents of a certificatePolicies extension. Should contain a list of policies with the field `oid`, indicating the policy OID. |
0 commit comments