[rsyslog-notify] Forum Thread: Re: GNUTLS certtool --template example? - (Mode 'reply')

noreply at adiscon.com noreply at adiscon.com
Wed Apr 13 22:25:17 CEST 2016


User: basictheprogram 
Forumlink: http://kb.monitorware.com/viewtopic.php?p=26490#p26490

Message: 
----------
1500+ views and counting, but not follow ups?

The Sample Screen Session does not completely match the interactive prompts
of GNUTLS certtool v3.4.10 so I am kind of guessing on things.

Here's what I have for generating a  machine certificate. This is a jinja2
template for processing with Ansible.

[code:27q9icks]
# X.509 Certificate options
#
# DN options

# The organization of the subject.
organization = "{{ gnutls_cert_organization }}"

# The organizational unit of the subject.
unit = "{{ gnutls_cert_unit }}"

# The locality of the subject.
locality = "{{ gnutls_cert_locality }}"

# The state of the certificate owner.
state = "{{ gnutls_cert_state }}"

# The country of the subject. Two letter code.
country = {{ gnutls_cert_country }}

# The common name of the certificate owner.
cn = "{{ inventory_hostname }}"

# A user id of the certificate owner.
#uid = "clauper"

# If the supported DN OIDs are not adequate you can set
# any OID here.
# For example set the X.520 Title and the X.520 Pseudonym
# by using OID and string pairs.
#dn_oid = "2.5.4.12" "Dr." "2.5.4.65" "jackal"

# This is deprecated and should not be used in new
# certificates.
# pkcs9_email = "none at none.org"

# The serial number of the certificate
serial = {{ gnutls_cert_serial }}

# In how many days, counting from today, this certificate will expire.
expiration_days = {{ gnutls_cert_expiration_days }}


# X.509 v3 extensions

# A dnsname in case of a WWW server.
dns_name = "{{ inventory_hostname }}"

# An IP address in case of a server.
#ip_address = "192.168.1.1"

# An email in case of a person
email = "{{ gnutls_cert_email }}"

# An URL that has CRLs (certificate revocation lists)
# available. Needed in CA certificates.
#crl_dist_points = "http://www.getcrl.crl/getcrl/"

# Whether this is a CA certificate or not
#ca

# Whether this certificate will be used for a TLS client
tls_www_client

# Whether this certificate will be used for a TLS server
tls_www_server

# Whether this certificate will be used to sign data (needed
# in TLS DHE ciphersuites).
#signing_key

# Whether this certificate will be used to encrypt data (needed
# in TLS RSA ciphersuites). Note that it is preferred to use different
# keys for encryption and signing.
#encryption_key

# Whether this key will be used to sign other certificates.
#cert_signing_key

# Whether this key will be used to sign CRLs.
#crl_signing_key

# Whether this key will be used to sign code.
#code_signing_key

# Whether this key will be used to sign OCSP data.
#ocsp_signing_key

# Whether this key will be used for time stamping.
#time_stamping_key

# Whether this key will be used for IPsec IKE operations.
#ipsec_ike_key

#a space separated list of key purpose OIDs to be added
#key_purpose_oids = "1.3.6.1.5.5.7.3.1"
"1.2.3.4.5.6"

# Things for PKCS #10 certificate Requests

# A challenge password for the request.
#challenge_password = "My challenge password"

# When generating certificate use extensions found in certificate
request.
#honor_crq_extensions

# Other things.

# A password to be used while encrypting/decrypting.
#password = "my pass"

# The next update (in days from now) for a CRL
#crl_next_update = 30

# The CRL number extension
#crl_number = 1

# A name for a PKCS #12 key
#pkcs12_key_name = "Anonymous key"
[/code:27q9icks]


More information about the rsyslog-notify mailing list