summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorJason McIntyre <jmc@cvs.openbsd.org>2016-09-15 17:49:04 +0000
committerJason McIntyre <jmc@cvs.openbsd.org>2016-09-15 17:49:04 +0000
commitd0358eaed149ae3570cb03167b58d4cdc90698eb (patch)
treeab6e4455c0f1cf3da3d87bab24d42831adffcf5d
parentcc7754b6311ea3f49a2d14a3381fae053f8e6d82 (diff)
shorten ts;
-rw-r--r--usr.bin/openssl/openssl.1346
1 files changed, 63 insertions, 283 deletions
diff --git a/usr.bin/openssl/openssl.1 b/usr.bin/openssl/openssl.1
index df1b98940a0..004839f448f 100644
--- a/usr.bin/openssl/openssl.1
+++ b/usr.bin/openssl/openssl.1
@@ -1,4 +1,4 @@
-.\" $OpenBSD: openssl.1,v 1.71 2016/09/12 13:34:12 jmc Exp $
+.\" $OpenBSD: openssl.1,v 1.72 2016/09/15 17:49:03 jmc Exp $
.\" ====================================================================
.\" Copyright (c) 1998-2002 The OpenSSL Project. All rights reserved.
.\"
@@ -112,7 +112,7 @@
.\"
.\" OPENSSL
.\"
-.Dd $Mdocdate: September 12 2016 $
+.Dd $Mdocdate: September 15 2016 $
.Dt OPENSSL 1
.Os
.Sh NAME
@@ -355,7 +355,7 @@ and all certificates will be certified automatically.
.It Fl cert Ar file
The CA certificate file.
.It Fl config Ar file
-Specifies the configuration file to use.
+Specify an alternative configuration file.
.It Fl days Ar arg
The number of days to certify the certificate for.
.It Fl enddate Ar date
@@ -3263,9 +3263,6 @@ option, 0 is used for the serial number.
The configuration options are specified in the
.Qq req
section of the configuration file.
-As with all configuration files, if no value is specified in the specific
-section then the initial unnamed or default section is searched too.
-.Pp
The options available are as follows:
.Bl -tag -width "XXXX"
.It Cm attributes
@@ -3378,7 +3375,7 @@ values from
.It Cm utf8
If set to
.Qq yes ,
-field values are interpreted as UTF8 strings, not ASCII.
+field values are interpreted as UTF8 strings.
.It Cm x509_extensions
The configuration file section containing a list of
extensions to add to a certificate generated when the
@@ -3386,7 +3383,7 @@ extensions to add to a certificate generated when the
switch is used.
It can be overridden by the
.Fl extensions
-option.
+command line switch.
.El
.Pp
There are two separate formats for the distinguished name and attribute
@@ -3395,17 +3392,12 @@ If the
.Fl prompt
option is set to
.Qq no ,
-the sections consist of just field names and values,
-which allows external programs to generate a template file
-with all the field names and values and just pass it to
-.Nm req .
-.Pp
-Alternatively if the
+then these sections just consist of field names and values.
+If the
.Fl prompt
option is absent or not set to
.Qq no ,
-then the file contains field prompting information.
-It consists of lines of the form:
+then the file contains field prompting information of the form:
.Bd -unfilled -offset indent
fieldName="prompt"
fieldName_default="default field value"
@@ -4193,7 +4185,7 @@ The
program processes the encoded version of the SSL session structure and
optionally prints out SSL session details
(for example the SSL session master key)
-in human readable format.
+in human-readable format.
.Pp
The options are as follows:
.Bl -tag -width Ds
@@ -4588,13 +4580,9 @@ Run
.Ar number
benchmarks in parallel.
.El
-.\"
-.\" TS
-.\"
.Sh TS
.nr nS 1
.Nm "openssl ts"
-.Bk -words
.Fl query
.Op Fl md4 | md5 | ripemd160 | sha1
.Op Fl cert
@@ -4606,12 +4594,10 @@ benchmarks in parallel.
.Op Fl out Ar request.tsq
.Op Fl policy Ar object_id
.Op Fl text
-.Ek
.nr nS 0
.Pp
.nr nS 1
.Nm "openssl ts"
-.Bk -words
.Fl reply
.Op Fl chain Ar certs_file.pem
.Op Fl config Ar configfile
@@ -4626,12 +4612,10 @@ benchmarks in parallel.
.Op Fl text
.Op Fl token_in
.Op Fl token_out
-.Ek
.nr nS 0
.Pp
.nr nS 1
.Nm "openssl ts"
-.Bk -words
.Fl verify
.Op Fl CAfile Ar trusted_certs.pem
.Op Fl CApath Ar trusted_cert_path
@@ -4641,7 +4625,6 @@ benchmarks in parallel.
.Op Fl queryfile Ar request.tsq
.Op Fl token_in
.Op Fl untrusted Ar cert_file.pem
-.Ek
.nr nS 0
.Pp
The
@@ -4649,7 +4632,7 @@ The
command is a basic Time Stamping Authority (TSA) client and server
application as specified in RFC 3161 (Time-Stamp Protocol, TSP).
A TSA can be part of a PKI deployment and its role is to provide long
-term proof of the existence of a certain datum before a particular time.
+term proof of the existence of specific data.
Here is a brief description of the protocol:
.Bl -enum
.It
@@ -4688,35 +4671,23 @@ switch can be used for creating and printing a time stamp
request with the following options:
.Bl -tag -width Ds
.It Fl cert
-The TSA is expected to include its signing certificate in the
-response.
+Expect the TSA to include its signing certificate in the response.
.It Fl config Ar configfile
-The configuration file to use.
-This option overrides the
-.Ev OPENSSL_CONF
-environment variable.
-Only the OID section of the config file is used with the
-.Fl query
-command.
+Specify an alternative configuration file.
+Only the OID section is used.
.It Fl data Ar file_to_hash
The data file for which the time stamp request needs to be created.
-stdin is the default if neither the
-.Fl data
-nor the
-.Fl digest
-option is specified.
+The default is standard input.
.It Fl digest Ar digest_bytes
-It is possible to specify the message imprint explicitly without the data
-file.
+Specify the message imprint explicitly without the data file.
The imprint must be specified in a hexadecimal format,
two characters per byte,
-the bytes optionally separated by colons (e.g. 1A:F6:01:... or 1AF601...).
+the bytes optionally separated by colons.
The number of bytes must match the message digest algorithm in use.
.It Fl in Ar request.tsq
-This option specifies a previously created time stamp request in DER
+A previously created time stamp request in DER
format that will be printed into the output file.
-Useful when you need to examine the content of a request in human-readable
-format.
+Useful for examining the content of a request in human-readable format.
.It Fl md4|md5|ripemd160|sha|sha1
The message digest to apply to the data file.
It supports all the message digest algorithms that are supported by the
@@ -4724,23 +4695,20 @@ It supports all the message digest algorithms that are supported by the
command.
The default is SHA-1.
.It Fl no_nonce
-No nonce is specified in the request if this option is given.
-Otherwise a 64-bit long pseudo-random none is
-included in the request.
-It is recommended to use nonce to protect against replay-attacks.
+Specify no nonce in the request.
+The default, to include a 64-bit long pseudo-random nonce,
+is recommended to protect against replay attacks.
.It Fl out Ar request.tsq
-Name of the output file to which the request will be written.
-The default is stdout.
+The output file to write to,
+or standard output if not specified.
.It Fl policy Ar object_id
The policy that the client expects the TSA to use for creating the
time stamp token.
-Either the dotted OID notation or OID names defined
+Either dotted OID notation or OID names defined
in the config file can be used.
-If no policy is requested the TSA will
-use its own default policy.
+If no policy is requested the TSA uses its own default policy.
.It Fl text
-If this option is specified the output is in human-readable text format
-instead of DER.
+Output in human-readable text format instead of DER.
.El
.Pp
A time stamp response (TimeStampResp) consists of a response status
@@ -4757,7 +4725,7 @@ is not specified the output is always a time stamp response (TimeStampResp),
otherwise it is a time stamp token (ContentInfo).
.Bl -tag -width Ds
.It Fl chain Ar certs_file.pem
-The collection of certificates, in PEM format,
+The collection of PEM certificates
that will be included in the response
in addition to the signer certificate if the
.Fl cert
@@ -4768,24 +4736,18 @@ The
.Fl reply
command does not build a certificate chain automatically.
.It Fl config Ar configfile
-The configuration file to use.
-This option overrides the
-.Ev OPENSSL_CONF
-environment variable.
-See
-.Sx TS CONFIGURATION FILE OPTIONS
-for configurable variables.
+Specify an alternative configuration file.
.It Fl in Ar response.tsr
-Specifies a previously created time stamp response or time stamp token, if
+Specify a previously created time stamp response (or time stamp token, if
.Fl token_in
-is also specified,
+is also specified)
in DER format that will be written to the output file.
This option does not require a request;
it is useful, for example,
-when you need to examine the content of a response or token
-or you want to extract the time stamp token from a response.
+to examine the content of a response or token
+or to extract the time stamp token from a response.
If the input is a token and the output is a time stamp response a default
-.Dq granted
+.Qq granted
status info is added to the token.
.It Fl inkey Ar private.pem
The signer private key of the TSA in PEM format.
@@ -4802,22 +4764,16 @@ The default is stdout.
.It Fl passin Ar arg
The key password source.
.It Fl policy Ar object_id
-The default policy to use for the response unless the client
-explicitly requires a particular TSA policy.
-The OID can be specified either in dotted notation or with its name.
-Overrides the
-.Cm default_policy
-config file option.
+The default policy to use for the response.
+Either dotted OID notation or OID names defined
+in the config file can be used.
+If no policy is requested the TSA uses its own default policy.
.It Fl queryfile Ar request.tsq
-The name of the file containing a DER-encoded time stamp request.
+The file containing a DER-encoded time stamp request.
.It Fl section Ar tsa_section
-The name of the config file section containing the settings for the
-response generation.
-If not specified the default TSA section is used; see
-.Sx TS CONFIGURATION FILE OPTIONS
-for details.
+The config file section containing the settings for response generation.
.It Fl signer Ar tsa_cert.pem
-The signer certificate of the TSA in PEM format.
+The PEM signer certificate of the TSA.
The TSA signing certificate must have exactly one extended key usage
assigned to it: timeStamping.
The extended key usage must also be critical,
@@ -4826,16 +4782,13 @@ Overrides the
.Cm signer_cert
variable of the config file.
.It Fl text
-If this option is specified the output is human-readable text format
-instead of DER.
+Output in human-readable text format instead of DER.
.It Fl token_in
-This flag can be used together with the
-.Fl in
-option and indicates that the input is a DER-encoded time stamp token
-(ContentInfo) instead of a time stamp response (TimeStampResp).
+The input is a DER-encoded time stamp token (ContentInfo)
+instead of a time stamp response (TimeStampResp).
.It Fl token_out
-The output is a time stamp token (ContentInfo) instead of time stamp
-response (TimeStampResp).
+The output is a time stamp token (ContentInfo)
+instead of a time stamp response (TimeStampResp).
.El
.Pp
The
@@ -4847,18 +4800,16 @@ The
command does not use the configuration file.
.Bl -tag -width Ds
.It Fl CAfile Ar trusted_certs.pem
-The name of the file containing a set of trusted self-signed CA
-certificates in PEM format.
-See the similar option of
+The file containing a set of trusted self-signed PEM CA certificates.
+See
.Nm verify
for additional details.
Either this option or
.Fl CApath
must be specified.
.It Fl CApath Ar trusted_cert_path
-The name of the directory containing the trused CA certificates of the
-client.
-See the similar option of
+The directory containing the trused CA certificates of the client.
+See
.Nm verify
for additional details.
Either this option or
@@ -4894,42 +4845,24 @@ and
.Fl digest
options must not be specified with this one.
.It Fl token_in
-This flag can be used together with the
-.Fl in
-option and indicates that the input is a DER-encoded time stamp token
-(ContentInfo) instead of a time stamp response (TimeStampResp).
+The input is a DER-encoded time stamp token (ContentInfo)
+instead of a time stamp response (TimeStampResp).
.It Fl untrusted Ar cert_file.pem
-Set of additional untrusted certificates in PEM format which may be
-needed when building the certificate chain for the TSA's signing
-certificate.
+Additional untrusted PEM certificates which may be needed
+when building the certificate chain for the TSA's signing certificate.
This file must contain the TSA signing certificate and
all intermediate CA certificates unless the response includes them.
.El
-.Sh TS CONFIGURATION FILE OPTIONS
-The
-.Fl query
-and
-.Fl reply
-options make use of a configuration file defined by the
-.Ev OPENSSL_CONF
-environment variable.
-The
-.Fl query
-option uses only the symbolic OID names section
-and it can work without it.
-However, the
-.Fl reply
-option needs the config file for its operation.
.Pp
-When there is a command line switch equivalent of a variable the
-switch always overrides the settings in the config file.
+Options specified on the command line always override
+the settings in the config file:
.Bl -tag -width Ds
.It Cm tsa Ar section , Cm default_tsa
This is the main section and it specifies the name of another section
that contains all the options for the
.Fl reply
option.
-This default section can be overridden with the
+This section can be overridden with the
.Fl section
command line switch.
.It Cm oid_file
@@ -4941,11 +4874,11 @@ See
.Nm ca
for a description.
.It Cm serial
-The name of the file containing the hexadecimal serial number of the
+The file containing the hexadecimal serial number of the
last time stamp response created.
This number is incremented by 1 for each response.
-If the file does not exist at the time of response
-generation a new file is created with serial number 1.
+If the file does not exist at the time of response generation
+a new file is created with serial number 1.
This parameter is mandatory.
.It Cm signer_cert
TSA signing certificate, in PEM format.
@@ -4953,7 +4886,7 @@ The same as the
.Fl signer
command line option.
.It Cm certs
-A file containing a set of PEM-encoded certificates that need to be
+A set of PEM-encoded certificates that need to be
included in the response.
The same as the
.Fl chain
@@ -4982,10 +4915,10 @@ For example, secs:1, millisecs:500, microsecs:100.
If any of the components is missing,
zero is assumed for that field.
.It Cm clock_precision_digits
-Specifies the maximum number of digits, which represent the fraction of
-seconds, that need to be included in the time field.
+The maximum number of digits, which represent the fraction of seconds,
+that need to be included in the time field.
The trailing zeroes must be removed from the time,
-so there might actually be fewer digits,
+so there might actually be fewer digits
or no fraction of seconds at all.
The maximum value is 6;
the default is 0.
@@ -5013,159 +4946,6 @@ If this variable is set to no,
only the signing certificate identifier is included.
The default is no.
.El
-.Sh TS ENVIRONMENT VARIABLES
-.Ev OPENSSL_CONF
-contains the path of the configuration file and can be
-overridden by the
-.Fl config
-command line option.
-.Sh TS EXAMPLES
-All the examples below presume that
-.Ev OPENSSL_CONF
-is set to a proper configuration file,
-e.g. the example configuration file
-.Pa openssl/apps/openssl.cnf
-will do.
-.Pp
-To create a time stamp request for design1.txt with SHA-1
-without nonce and policy and no certificate is required in the response:
-.Bd -literal -offset indent
-$ openssl ts -query -data design1.txt -no_nonce \e
- -out design1.tsq
-.Ed
-.Pp
-To create a similar time stamp request but specifying the message imprint
-explicitly:
-.Bd -literal -offset indent
-$ openssl ts -query \e
- -digest b7e5d3f93198b38379852f2c04e78d73abdd0f4b \e
- -no_nonce -out design1.tsq
-.Ed
-.Pp
-To print the content of the previous request in human readable format:
-.Bd -literal -offset indent
-$ openssl ts -query -in design1.tsq -text
-.Ed
-.Pp
-To create a time stamp request which includes the MD5 digest
-of design2.txt, requests the signer certificate and nonce,
-specifies a policy ID
-(assuming the tsa_policy1 name is defined in the
-OID section of the config file):
-.Bd -literal -offset indent
-$ openssl ts -query -data design2.txt -md5 \e
- -policy tsa_policy1 -cert -out design2.tsq
-.Ed
-.Pp
-Before generating a response,
-a signing certificate must be created for the TSA that contains the
-.Cm timeStamping
-critical extended key usage extension
-without any other key usage extensions.
-You can add the
-.Dq extendedKeyUsage = critical,timeStamping
-line to the user certificate section
-of the config file to generate a proper certificate.
-See the
-.Nm req ,
-.Nm ca ,
-and
-.Nm x509
-commands for instructions.
-The examples below assume that cacert.pem contains the certificate of the CA,
-tsacert.pem is the signing certificate issued by cacert.pem and
-tsakey.pem is the private key of the TSA.
-.Pp
-To create a time stamp response for a request:
-.Bd -literal -offset indent
-$ openssl ts -reply -queryfile design1.tsq -inkey tsakey.pem \e
- -signer tsacert.pem -out design1.tsr
-.Ed
-.Pp
-If you want to use the settings in the config file you could just write:
-.Bd -literal -offset indent
-$ openssl ts -reply -queryfile design1.tsq -out design1.tsr
-.Ed
-.Pp
-To print a time stamp reply to stdout in human readable format:
-.Bd -literal -offset indent
-$ openssl ts -reply -in design1.tsr -text
-.Ed
-.Pp
-To create a time stamp token instead of time stamp response:
-.Bd -literal -offset indent
-$ openssl ts -reply -queryfile design1.tsq \e
- -out design1_token.der -token_out
-.Ed
-.Pp
-To print a time stamp token to stdout in human readable format:
-.Bd -literal -offset indent
-$ openssl ts -reply -in design1_token.der -token_in \e
- -text -token_out
-.Ed
-.Pp
-To extract the time stamp token from a response:
-.Bd -literal -offset indent
-$ openssl ts -reply -in design1.tsr -out design1_token.der \e
- -token_out
-.Ed
-.Pp
-To add
-.Dq granted
-status info to a time stamp token thereby creating a valid response:
-.Bd -literal -offset indent
-$ openssl ts -reply -in design1_token.der \e
- -token_in -out design1.tsr
-.Ed
-.Pp
-To verify a time stamp reply against a request:
-.Bd -literal -offset indent
-$ openssl ts -verify -queryfile design1.tsq -in design1.tsr \e
- -CAfile cacert.pem -untrusted tsacert.pem
-.Ed
-.Pp
-To verify a time stamp reply that includes the certificate chain:
-.Bd -literal -offset indent
-$ openssl ts -verify -queryfile design2.tsq -in design2.tsr \e
- -CAfile cacert.pem
-.Ed
-.Pp
-To verify a time stamp token against the original data file:
-.Bd -literal -offset indent
-$ openssl ts -verify -data design2.txt -in design2.tsr \e
- -CAfile cacert.pem
-.Ed
-.Pp
-To verify a time stamp token against a message imprint:
-.Bd -literal -offset indent
-$ openssl ts -verify \e
- -digest b7e5d3f93198b38379852f2c04e78d73abdd0f4b \e
- -in design2.tsr -CAfile cacert.pem
-.Ed
-.Sh TS BUGS
-No support for time stamps over SMTP, though it is quite easy
-to implement an automatic email-based TSA with
-.Xr procmail
-and
-.Xr perl 1 .
-Pure TCP/IP is not supported.
-.Pp
-The file containing the last serial number of the TSA is not
-locked when being read or written.
-This is a problem if more than one instance of
-.Nm OpenSSL
-is trying to create a time stamp
-response at the same time.
-.Pp
-Look for the FIXME word in the source files.
-.Pp
-The source code should really be reviewed by somebody else, too.
-.Pp
-More testing is needed.
-.Sh TS AUTHORS
-.An Zoltan Glozik Aq Mt zglozik@opentsa.org ,
-OpenTSA project
-.Pq Lk http://www.opentsa.org .
.\"
.\" SPKAC
.\"