Poster of Linux kernelThe best gift for a Linux geek
IPSEC_OPENAC

IPSEC_OPENAC

Section: Maintenance Commands (8) Updated: 22 September 2007
Local index Up
 

NAME

ipsec openac - Generation of X.509 attribute certificates  

SYNOPSIS

ipsec openac [ --help ] [ --version ] [ --optionsfrom filename ]
   [ --quiet ] [ --debug level ]
   [ --days days ] [ --hours hours ]
   [ --startdate YYYYMMDDHHMMSSZ ] [ --stopdate YYYYMMDDHHMMSSZ ]
   --cert certfile --key keyfile [ --password password ]
   --usercert certfile --groups attr1,attr2,... --out filename  

DESCRIPTION

openac is intended to be used by an Authorization Authority (AA) to generate and sign X.509 attribute certificates. Currently only the inclusion of one ore several group attributes is supported. An attribute certificate is linked to a holder by including the issuer and serial number of the holder's X.509 certificate.  

OPTIONS

--help
display the usage message.
--version
display the version of openac.
--optionsfrom filename
adds the contents of the file to the argument list. If filename is a relative path then the file is searched in the directory /etc/openac.
--quiet
By default openac logs all control output both to syslog and stderr. With the --quiet option no output is written to stderr.
--days days
Validity of the X.509 attribute certificate in days. If neiter the --days nor the --hours option is specified then a default validity interval of 1 day is assumed. The --days option can be combined with the --hours option.
--hours hours
Validity of the X.509 attribute certificate in hours. If neiter the --hours nor the --days option is specified then a default validity interval of 24 hours is assumed. The --hours option can be combined with the --days option.
--startdate YYYYMMDDHHMMSSZ
defines the notBefore date when the X.509 attribute certificate becomes valid. The date YYYYMMDDHHMMSS must be specified in UTC (Zulu time). If the --startdate option is not specified then the current date is taken as a default.

--stopdate YYYYMMDDHHMMSSZ
defines the notAfter date when the X.509 attribute certificate will expire. The date YYYYMMDDHHMMSS must be specified in UTC (Zulu time). If the --stopdate option is not specified then the default notAfter value is computed by adding the validity interval specified by the --days and/or --days options to the notBefore date.
--cert certfile
specifies the file containing the X.509 certificate of the Authorization Authority. The certificate is stored either in PEM or DER format.
--key keyfile
specifies the encrypted file containing the private RSA key of the Authoritzation Authority. The private key is stored in PKCS#1 format.
--password password
specifies the password with which the private RSA keyfile defined by the --key option has been protected. If the option is missing then the password is prompted for on the command line.
--usercert certfile
specifies file containing the X.509 certificate of the user to which the generated attribute certificate will apply. The certificate file is stored either in PEM or DER format.
--groups attr1,attr2
specifies a comma-separated list of group attributes that will go into the X.509 attribute certificate.
--out filename
specifies the file where the generated X.509 attribute certificate will be stored to.
 

Debugging

openac produces a prodigious amount of debugging information. To do so, it must be compiled with -DDEBUG. There are several classes of debugging output, and openac may be directed to produce a selection of them. All lines of debugging output are prefixed with ``| '' to distinguish them from error messages.

When openac is invoked, it may be given arguments to specify which classes to output. The current options are:

--debug level
sets the debug level to 0 (none), 1 (normal), 2 (more), 3 (raw), and 4 (private), the default level being 1.
 

EXIT STATUS

The execution of openac terminates with one of the following two exit codes:

0
means that the attribute certificate was successfully generated and stored.
1
means that something went wrong.
 

FILES

/etc/openac/serial   serial number of latest attribute certificate  

SEE ALSO

The X.509 attribute certificates generated with openac can be used to enforce group policies defined by ipsec.conf(5). Use ipsec_auto(8) to load and list X.509 attribute certificates.

For more information on X.509 attribute certificates, refer to the following IETF RFC:

RFC 3281 An Internet Attribute Certificate Profile for Authorization
 

HISTORY

The openac program was originally written by Ariane Seiler and Ueli Galizzi. The software was recoded by Andreas Steffen using strongSwan's X.509 library and the ASN.1 code synthesis functions written by Christoph Gysin and Christoph Zwahlen. All authors were with the Zurich University of Applied Sciences in Winterthur, Switzerland.

 

BUGS

Bugs should be reported to the <users@lists.strongswan.org> mailing list.


 

Index

NAME
SYNOPSIS
DESCRIPTION
OPTIONS
Debugging
EXIT STATUS
FILES
SEE ALSO
HISTORY
BUGS

This document was created by man2html, using the manual pages.
Time: 22:02:05 GMT, April 16, 2011