📄 xca.sgml
字号:
The <tt>Country code</tt> field must either be empty or exactly containtwo letters representing your country code; e.g. <em>DE</em> for Germany.If you want to create a SSL-server certificate the <tt>Common name</tt>must contain the <em>DNS</em> name of the server.<p>Keys can be generated here <em>on the fly</em> by pressing the button.The newly generated key will be stored in the database, even if you cancel the Wizard. The drop-down list of the keysdoes only contain keys that were not used by an other certificate orrequest. The Keylist is not available for creating or changing templates.<p>This page does not appear when signing a request, because the request doescontain all needed data from this page.<sect1>X509v3 Extensions<p>The following 3 pages do contain all fields for adjusting the certificate extensions.It is not in the focus of this document to explain them in detail.The most important are the <tt>Basic Constraints</tt> and the <tt>Validity</tt> range.<p>For more information consult the documents in <ref id="otherdoc">.Expecially if you don't know what this is all about consider not to create anycertificates before reading those documents.<sect2>Basic Constraints<p>If the <tt>CA</tt> flag is set to true the certificate is recognized by XCA and otherinstances as issuer for other certificates. Server-certificates or E-Mail certificatesmust have set this flag to <tt>false</tt><sect2>Validity Range<p>The <em>not Before</em> field is set to the current date and time of theoperating system and the <em>not After</em> field is set to the current date and timeplus the specified time range.<!-- %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% --><sect>RSA Keys <label id="keys"><p>For asynchronous encryption and signing there are keys needed. XCA only supports RSA keysand no DSA keys. All keys are stored encrypted in the database using the 3DES algorithm.<p>All keys do carry a use counter which counts the times it is used. For newrequests or certificates the list of available keys is reduced tothe keys with a use counter of 0.<sect1>Generating Keys<p>The dialog asks for the internal name of the key and the keysize in bits.While searching for random prime numbers a progress bar is shown. Although theProgressbar carries a <tt>Cancel</tt> button it has no effect clicking on itsince the underlaying <em>OpenSSL</em> routine does not support an abort.So think twice before generating a 4096 bit key on a 80Mhz i486 PC ....After the key generation is done the key will be stored in the database.<sect1>Key export<p>Keys can be exported by either selecting the key and pressing <em>Export</em> or byusing the context-menu. This opens a Dialogbox where you can change the following settings:<itemize><item>filename<item>Outputformat (DER, PEM, PKCS#8)<item>Public or Private Key<item>Encryption of the exported file (yes/no)</itemize>The filename is the internal name plus a <tt>pem</tt> suffix.If the desired fileformat is not PEM it is your responsibilityto change the suffix to <tt>der</tt> or <tt>pk8</tt>.Only PKCS#8 or PEM files can be encrypted, becausethe DER format (although it could be encrypted)does not support a way to supply the encryption algorithmlike e.g. <em>DES</em>.Of course the encryption is senseless if the private part is not exported.<!-- %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% --><sect>Certificate Signing Requests <label id="csr"><p>Certificate signing requests are described in PKCS#10 standard.They are used to supply a Certification Authority with the needed information to issue a valid certificate for you without knowing your private key. Thisincludes your personal information and your public key.<sect1>Generating a new Request<p>After clicking on the <tt>New Request</tt> button the Certificate Wizard will be started to askall needed information for generating a new Request. See: <ref id="wizard" name="Wizard">The request generation can also be invoked by the context menu of a certificate (Export->Request).This menu point is only available if the private key of the certificate is available.In this case all needed data is copied from the certificate and the Wizard is not invoked.<sect1>Request export<p>Requests can be exported by either the context-menu or by selecting the request and pressingthe <tt>Export</tt> button.The only supported format for exported requests is PEM, because there is no need for DER formatted requests in real life. If someone needs DER formatted requests, drop mea mail and I will implement it.<sect1>Request details<p>All information contained in the request are shown. If the Keystore does containthe private key corresponding to the request the keys internal name is shown in the<tt>Key</tt> field.<!-- %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% --><sect>Certificates<p>All Certificates from the database are displayed in a tree view reflecting the chain dependencies.If there is a CA certificate and several client certificates signed by this CA,the client certificates can be shown by clicking on the plus sign of the CA certificate.<sect1>CA certificates <label id="ca_cert"><p>XCA recognizes your CA certificates if the CA flag in the <em>Basic Constraints</em> is set to trueand if there is a corresponding private key.In this case the <tt>CA</tt> submenu in the context-menu is enabled.<p>For building the chains the CA flag is disregarded instead it consideres the issuer name andthe signature to decide which certificate is the issuer.<sect1>Generating certificates<p>After clicking on the <tt>New Certificate</tt> button the Certificate Wizard will be started to askall needed information for generating a new Request. See: <ref id="wizard" name="Wizard">Certificate creation can also be invoked by the context menu of the certificate list backgroundor by the context menu of the request.In this case the Wizard is preset with the Request to be signedi.<p>If in the certificate list a <em>CA certificate</em> is selected, thiscertificate is preselected as signer certificate on the second page of the Wizard.<sect1>Certificate details<p>The signer is the internal name of the issuers certificate, <em>SELF SIGNED</em> if it isself signed or <em>SIGNER UNKNOWN</em> if the issuers certificate is not available.The validity is set to <em>valid</em> if the certificate dates are validor to <em>Not valid</em> if the are not, regarding the internal time and date of the OS.<p>If the certificate was revoked, the revocation date is shown instead.<sect1>Certificate trustment<p>The certificate trustment can be changed by the context menu of the certificate.It can be set to:<itemize><item><bf>Not trusted</bf> - never trust this certificate, even if we trust the issuer. This is the default for imported self-signed certificates.<item><bf>Trust depends on issuer</bf> - only trust this certificate, if we trust theissuer. This is the default for imported and generated non-self-signed certificates.<item><bf>Always trust</bf> - always trust this certificate, even if we do not trustthe issuers certificate or if it is absent. This is the default for generated self-signed certificates.</itemize><sect1>Certificate export<p>The filename can be selected in the export dialog and the Export format:<itemize><item><bf>PEM</bf> - PEM encoded<item><bf>PEM with Certificate chain</bf> - PEM encoded certificate and all issuers up to theroot certificate in one file<item><bf>PEM all trusted Certificates</bf> - List of all PEM encoded certificatesthat are marked als <em>Always trusted</em> (usually all self-signed certificates)in one file for e.g. apache as trusted cert store.<item><bf>PEM all Certificates</bf> - All PEM encoded certificates in one file.<item><bf>DER</bf> - DER encoded certificate.<item><bf>Signed PKCS#7</bf> - PEM encoded PKCS#7 structure signed by the issuer.<item><bf>PKCS#12</bf> - PKCS#12 structure containing the certificate and the corresponding <item><bf>PKCS#12</bf> - PKCS#12 structure containing the certificate, the corresponding private key and the chain of all issuers certificates.</itemize><p>The PKCS#12 structures will be encrypted by the password you are asked for later.<sect1>Certificate revokation<p>Certificates only can be revoked, if the private key of the issuers certificateis available. The certificate will marked as revoked and the revokation datewill be stored with the certificate.<sect1>Certificate renewal<p>Certificates only can be renewed, if the private key of the issuers certificateis available. Renewal is done by creating a new certificate as a copy of the original onewith just adjusted validity dates.<sect1>PKCS#7<p>PKCS#7 structures can be created by the context menu of the signing certificate.The PKCS#7 structure can be either signed or encrypted. Therefore it will prompt for a file to be either signed or encrypted.The resulting file has the original filename with ".p7s" suffix.<sect1>CA special functions<p>The context menu of CA certificates does contain the <em>CA</em> submenu.that makes the following functions available:<itemize><item><bf>Serial</bf> The serial number of the next certificatesigned by this issuer.<item><bf>CRL days</bf> The days until the next CRL release.<item><bf>Signing Template</bf> The default template for signing certificates.<item><bf>Generate CRL</bf> Generate the CRL by collecting all revoked certificatesand their revokation date.</itemize><!-- %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% --></article>
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -