TranslateProject/translated/tech/20150511 OpenSSL command line Root and Intermediate CA including OCSP, CRL and revocation.md

406 lines
14 KiB
Markdown
Raw Normal View History

OpenSSL命令行生成根CA和中间CA涵盖了OCSP、CRL和证书撤销
2015-05-11 16:53:16 +08:00
================================================================================
这些是关于使用OpenSSL生成证书授权CA、中间证书授权和末端证书的速记随笔内容包括OCSP、CRL和CA颁发者信息以及指定颁发和有效期限。
2015-05-11 16:53:16 +08:00
我们将建立我们自己的根CA我们将使用根CA来生成一个样例中间CA我们将使用中间CA来签署末端用户证书。
2015-05-11 16:53:16 +08:00
### 根CA ###
创建根CA授权目录并切换到该目录
2015-05-11 16:53:16 +08:00
mkdir ~/SSLCA/root/
cd ~/SSLCA/root/
为我们的根CA生成一个8192位长的SHA-256 RSA密钥
2015-05-11 16:53:16 +08:00
openssl genrsa -aes256 -out rootca.key 8192
样例输出:
2015-05-11 16:53:16 +08:00
Generating RSA private key, 8192 bit long modulus
.........++
....................................................................................................................++
e is 65537 (0x10001)
如果你想要用密码保护该密钥,请添加`-aes256`选项。
2015-05-11 16:53:16 +08:00
创建自颁发根CA证书`ca.crt`你需要为你的根CA提供一个身份
2015-05-11 16:53:16 +08:00
openssl req -sha256 -new -x509 -days 1826 -key rootca.key -out rootca.crt
样例输出:
2015-05-11 16:53:16 +08:00
You are about to be asked to enter information that will be incorporated
into your certificate request.
What you are about to enter is what is called a Distinguished Name or a DN.
There are quite a few fields but you can leave some blank
For some fields there will be a default value,
If you enter '.', the field will be left blank.
-----
Country Name (2 letter code) [AU]:NL
State or Province Name (full name) [Some-State]:Zuid Holland
Locality Name (eg, city) []:Rotterdam
Organization Name (eg, company) [Internet Widgits Pty Ltd]:Sparkling Network
Organizational Unit Name (eg, section) []:Sparkling CA
Common Name (e.g. server FQDN or YOUR name) []:Sparkling Root CA
Email Address []:
创建存储CA序列的文件
2015-05-11 16:53:16 +08:00
touch certindex
echo 1000 > certserial
echo 1000 > crlnumber
放置CA配置文件该文件持有CRL和OCSP末端的存根。
2015-05-11 16:53:16 +08:00
# vim ca.conf
[ ca ]
default_ca = myca
[ crl_ext ]
issuerAltName=issuer:copy
authorityKeyIdentifier=keyid:always
[ myca ]
dir = ./
new_certs_dir = $dir
unique_subject = no
certificate = $dir/rootca.crt
database = $dir/certindex
private_key = $dir/rootca.key
serial = $dir/certserial
default_days = 730
default_md = sha1
policy = myca_policy
x509_extensions = myca_extensions
crlnumber = $dir/crlnumber
default_crl_days = 730
[ myca_policy ]
commonName = supplied
stateOrProvinceName = supplied
countryName = optional
emailAddress = optional
organizationName = supplied
organizationalUnitName = optional
[ myca_extensions ]
basicConstraints = critical,CA:TRUE
keyUsage = critical,any
subjectKeyIdentifier = hash
authorityKeyIdentifier = keyid:always,issuer
keyUsage = digitalSignature,keyEncipherment,cRLSign,keyCertSign
extendedKeyUsage = serverAuth
crlDistributionPoints = @crl_section
subjectAltName = @alt_names
authorityInfoAccess = @ocsp_section
[ v3_ca ]
basicConstraints = critical,CA:TRUE,pathlen:0
keyUsage = critical,any
subjectKeyIdentifier = hash
authorityKeyIdentifier = keyid:always,issuer
keyUsage = digitalSignature,keyEncipherment,cRLSign,keyCertSign
extendedKeyUsage = serverAuth
crlDistributionPoints = @crl_section
subjectAltName = @alt_names
authorityInfoAccess = @ocsp_section
[alt_names]
DNS.0 = Sparkling Intermidiate CA 1
DNS.1 = Sparkling CA Intermidiate 1
[crl_section]
URI.0 = http://pki.sparklingca.com/SparklingRoot.crl
URI.1 = http://pki.backup.com/SparklingRoot.crl
[ocsp_section]
caIssuers;URI.0 = http://pki.sparklingca.com/SparklingRoot.crt
caIssuers;URI.1 = http://pki.backup.com/SparklingRoot.crt
OCSP;URI.0 = http://pki.sparklingca.com/ocsp/
OCSP;URI.1 = http://pki.backup.com/ocsp/
如果你需要设置某个特定的证书生效/过期日期,请添加以下内容到`[myca]`
2015-05-11 16:53:16 +08:00
# format: YYYYMMDDHHMMSS
default_enddate = 20191222035911
default_startdate = 20181222035911
### 创建中间1 CA ###
2015-05-11 16:53:16 +08:00
生成中间CA的私钥
2015-05-11 16:53:16 +08:00
openssl genrsa -out intermediate1.key 4096
生成intermediate1 CA的CSR
2015-05-11 16:53:16 +08:00
openssl req -new -sha256 -key intermediate1.key -out intermediate1.csr
样例输出:
2015-05-11 16:53:16 +08:00
You are about to be asked to enter information that will be incorporated
into your certificate request.
What you are about to enter is what is called a Distinguished Name or a DN.
There are quite a few fields but you can leave some blank
For some fields there will be a default value,
If you enter '.', the field will be left blank.
-----
Country Name (2 letter code) [AU]:NL
State or Province Name (full name) [Some-State]:Zuid Holland
Locality Name (eg, city) []:Rotterdam
Organization Name (eg, company) [Internet Widgits Pty Ltd]:Sparkling Network
Organizational Unit Name (eg, section) []:Sparkling CA
Common Name (e.g. server FQDN or YOUR name) []:Sparkling Intermediate CA
Email Address []:
Please enter the following 'extra' attributes
to be sent with your certificate request
A challenge password []:
An optional company name []:
确保中间CA的主体CN和根CA不同。
2015-05-11 16:53:16 +08:00
用根CA签署intermediate1 CSR
2015-05-11 16:53:16 +08:00
openssl ca -batch -config ca.conf -notext -in intermediate1.csr -out intermediate1.crt
样例输出:
2015-05-11 16:53:16 +08:00
Using configuration from ca.conf
Check that the request matches the signature
Signature ok
The Subject's Distinguished Name is as follows
countryName :PRINTABLE:'NL'
stateOrProvinceName :ASN.1 12:'Zuid Holland'
localityName :ASN.1 12:'Rotterdam'
organizationName :ASN.1 12:'Sparkling Network'
organizationalUnitName:ASN.1 12:'Sparkling CA'
commonName :ASN.1 12:'Sparkling Intermediate CA'
Certificate is to be certified until Mar 30 15:07:43 2017 GMT (730 days)
Write out database with 1 new entries
Data Base Updated
生成CRL同时采用PEM和DER格式
2015-05-11 16:53:16 +08:00
openssl ca -config ca.conf -gencrl -keyfile rootca.key -cert rootca.crt -out rootca.crl.pem
openssl crl -inform PEM -in rootca.crl.pem -outform DER -out rootca.crl
每次使用该CA签署证书后请生成CRL。
2015-05-11 16:53:16 +08:00
如果你需要撤销该中间证书:
2015-05-11 16:53:16 +08:00
openssl ca -config ca.conf -revoke intermediate1.crt -keyfile rootca.key -cert rootca.crt
### 配置中间CA 1 ###
2015-05-11 16:53:16 +08:00
为该中间CA创建一个新文件夹然后进入该文件夹
2015-05-11 16:53:16 +08:00
mkdir ~/SSLCA/intermediate1/
cd ~/SSLCA/intermediate1/
从根CA拷贝中间证书和密钥
2015-05-11 16:53:16 +08:00
cp ~/SSLCA/root/intermediate1.key ./
cp ~/SSLCA/root/intermediate1.crt ./
创建索引文件:
2015-05-11 16:53:16 +08:00
touch certindex
echo 1000 > certserial
echo 1000 > crlnumber
创建一个新的`ca.conf`文件:
2015-05-11 16:53:16 +08:00
# vim ca.conf
[ ca ]
default_ca = myca
[ crl_ext ]
issuerAltName=issuer:copy
authorityKeyIdentifier=keyid:always
[ myca ]
dir = ./
new_certs_dir = $dir
unique_subject = no
certificate = $dir/intermediate1.crt
database = $dir/certindex
private_key = $dir/intermediate1.key
serial = $dir/certserial
default_days = 365
default_md = sha1
policy = myca_policy
x509_extensions = myca_extensions
crlnumber = $dir/crlnumber
default_crl_days = 365
[ myca_policy ]
commonName = supplied
stateOrProvinceName = supplied
countryName = optional
emailAddress = optional
organizationName = supplied
organizationalUnitName = optional
[ myca_extensions ]
basicConstraints = critical,CA:FALSE
keyUsage = critical,any
subjectKeyIdentifier = hash
authorityKeyIdentifier = keyid:always,issuer
keyUsage = digitalSignature,keyEncipherment
extendedKeyUsage = serverAuth
crlDistributionPoints = @crl_section
subjectAltName = @alt_names
authorityInfoAccess = @ocsp_section
[alt_names]
DNS.0 = example.com
DNS.1 = example.org
[crl_section]
URI.0 = http://pki.sparklingca.com/SparklingIntermidiate1.crl
URI.1 = http://pki.backup.com/SparklingIntermidiate1.crl
[ocsp_section]
caIssuers;URI.0 = http://pki.sparklingca.com/SparklingIntermediate1.crt
caIssuers;URI.1 = http://pki.backup.com/SparklingIntermediate1.crt
OCSP;URI.0 = http://pki.sparklingca.com/ocsp/
OCSP;URI.1 = http://pki.backup.com/ocsp/
修改`[alt_names]`部分,添加你需要的主体备选名。如果你不需要主体备选名,请移除该部分包括`subjectAltName = @alt_names`的行。
2015-05-11 16:53:16 +08:00
如果你需要设置一个指定的生效/到期日期,请添加以下内容到`[myca]`
2015-05-11 16:53:16 +08:00
# format: YYYYMMDDHHMMSS
default_enddate = 20191222035911
default_startdate = 20181222035911
生成一个空白CRL同时以PEM和DER格式
2015-05-11 16:53:16 +08:00
openssl ca -config ca.conf -gencrl -keyfile rootca.key -cert rootca.crt -out rootca.crl.pem
openssl crl -inform PEM -in rootca.crl.pem -outform DER -out rootca.crl
### 生成末端用户证书 ###
2015-05-11 16:53:16 +08:00
我们使用这个新的中间CA来生成一个末端用户证书请重复以下操作来使用该CA为每个用户签署。
2015-05-11 16:53:16 +08:00
mkdir enduser-certs
生成末端用户的私钥:
2015-05-11 16:53:16 +08:00
openssl genrsa -out enduser-certs/enduser-example.com.key 4096
生成末端用户的CSR
2015-05-11 16:53:16 +08:00
openssl req -new -sha256 -key enduser-certs/enduser-example.com.key -out enduser-certs/enduser-example.com.csr
样例输出:
2015-05-11 16:53:16 +08:00
You are about to be asked to enter information that will be incorporated
into your certificate request.
What you are about to enter is what is called a Distinguished Name or a DN.
There are quite a few fields but you can leave some blank
For some fields there will be a default value,
If you enter '.', the field will be left blank.
-----
Country Name (2 letter code) [AU]:NL
State or Province Name (full name) [Some-State]:Noord Holland
Locality Name (eg, city) []:Amsterdam
Organization Name (eg, company) [Internet Widgits Pty Ltd]:Example Inc
Organizational Unit Name (eg, section) []:IT Dept
Common Name (e.g. server FQDN or YOUR name) []:example.com
Email Address []:
Please enter the following 'extra' attributes
to be sent with your certificate request
A challenge password []:
An optional company name []:
使用Intermediate 1 CA签署末端用户的CSR
2015-05-11 16:53:16 +08:00
openssl ca -batch -config ca.conf -notext -in enduser-certs/enduser-example.com.csr -out enduser-certs/enduser-example.com.crt
样例输出:
2015-05-11 16:53:16 +08:00
Using configuration from ca.conf
Check that the request matches the signature
Signature ok
The Subject's Distinguished Name is as follows
countryName :PRINTABLE:'NL'
stateOrProvinceName :ASN.1 12:'Noord Holland'
localityName :ASN.1 12:'Amsterdam'
organizationName :ASN.1 12:'Example Inc'
organizationalUnitName:ASN.1 12:'IT Dept'
commonName :ASN.1 12:'example.com'
Certificate is to be certified until Mar 30 15:18:26 2016 GMT (365 days)
Write out database with 1 new entries
Data Base Updated
生成CRL同时以PEM和DER格式
2015-05-11 16:53:16 +08:00
openssl ca -config ca.conf -gencrl -keyfile intermediate1.key -cert intermediate1.crt -out intermediate1.crl.pem
openssl crl -inform PEM -in intermediate1.crl.pem -outform DER -out intermediate1.crl
每次你使用该CA签署证书后都需要生成CRL。
2015-05-11 16:53:16 +08:00
如果你需要撤销该末端用户证书:
2015-05-11 16:53:16 +08:00
openssl ca -config ca.conf -revoke enduser-certs/enduser-example.com.crt -keyfile intermediate1.key -cert intermediate1.crt
样例输出:
2015-05-11 16:53:16 +08:00
Using configuration from ca.conf
Revoking Certificate 1000.
Data Base Updated
通过联结根证书和intermediate 1证书来创建证书链文件。
2015-05-11 16:53:16 +08:00
cat ../root/rootca.crt intermediate1.crt > enduser-certs/enduser-example.com.chain
发送以下文件给末端用户:
2015-05-11 16:53:16 +08:00
enduser-example.com.crt
enduser-example.com.key
enduser-example.com.chain
你也可以只发送给他们.crt文件让末端用户提供他们自己的CSR。不要把它从服务器删除否则你就不能撤销了。
2015-05-11 16:53:16 +08:00
### 合法化证书 ###
2015-05-11 16:53:16 +08:00
你可以使用以下命令来针对链验证末端用户证书:
2015-05-11 16:53:16 +08:00
openssl verify -CAfile enduser-certs/enduser-example.com.chain enduser-certs/enduser-example.com.crt
enduser-certs/enduser-example.com.crt: OK
你也可以针对CRL来验证。首先将PEM、CRL和链连结
2015-05-11 16:53:16 +08:00
cat ../root/rootca.crt intermediate1.crt intermediate1.crl.pem > enduser-certs/enduser-example.com.crl.chain
验证证书:
2015-05-11 16:53:16 +08:00
openssl verify -crl_check -CAfile enduser-certs/enduser-example.com.crl.chain enduser-certs/enduser-example.com.crt
没有撤销时的输出:
2015-05-11 16:53:16 +08:00
enduser-certs/enduser-example.com.crt: OK
撤销后的输出:
2015-05-11 16:53:16 +08:00
enduser-certs/enduser-example.com.crt: CN = example.com, ST = Noord Holland, C = NL, O = Example Inc, OU = IT Dept
error 23 at 0 depth lookup:certificate revoked
--------------------------------------------------------------------------------
via: https://raymii.org/s/tutorials/OpenSSL_command_line_Root_and_Intermediate_CA_including_OCSP_CRL%20and_revocation.html
作者Remy van Elst
译者:[GOLinux](https://github.com/GOLinux)
2015-05-11 16:53:16 +08:00
校对:[校对者ID](https://github.com/校对者ID)
本文由 [LCTT](https://github.com/LCTT/TranslateProject) 原创翻译,[Linux中国](https://linux.cn/) 荣誉推出