pki --scep

Synopsis

pki --scep --url url [--in file] [--dn distinguished-name] [--san subjectAltName]+
          [--profile profile] [--password password]
           --cacert-enc file --cacert-sig file [--cacert file]+
          [--cert file --key file] [--cipher aes|des3]
          [--digest sha256|sha384|sha512|sha224|sha1] [--rsa-padding pkcs1|pss]
          [--interval time] [--maxpolltime time] [--outform der|pem]

pki --scepca --help

Description

This pki subcommand sends a PKCS#10 certificate request in an encrypted and signed PKCS#7 container via HTTP to a SCEP server using the Simple Certificate Enrollment Protocol (RFC 8894). After successful authorization which with manual authentication requires periodic polling by the enrollment client, the SCEP server returns an X.509 certificate signed by the CA.

Before the expiry of the current certificate, a new client certificate based on a fresh RSA private key can be requested, using the old certificate and the old key for automatic authentication with the SCEP server.

Supported since version 5.9.8.

Options

-h

--help

Prints usage information and a short summary of the available options

-v

--debug

Set debug level, default: 1

-+

--options

Read command line options from file

-u

--url

URL of the SCEP server. According to RFC 8894, the URL should be of the form http://<hostname>[:<port>]/cgi-bin/pkiclient.exe but depending on the SCEP server the path might be different

-i

--in

RSA private key. If not given, the key is read from STDIN

-d

--dn

Subject distinguished name (DN). Required unless --cert is given

-a

--san

subjectAltName extension to include in request. Can be used multiple times

-P

--profile

Certificate profile name to be included in the certificate request. Can be any UTF8 string. Supported e.g. by the openxpki SCEP server with profiles (pc-client, tls-server, etc.) that are translated into corresponding Extended Key Usage (EKU) flags in the generated X.509 certificate

-p

--password

The challengePassword to include in the certificate request

-e

--cacert-enc

CA or RA certificate for encryption

-s

--cacert-sig

CA certificate for signature verification

-C

--cacert

Additional CA certificate in the trust chain used for signature verification. Can be used multiple times

-c

--cert

Client certificate to be renewed

-k

--key

Client RSA private key to be replaced

-E

--cipher

Cipher used for symmetric encryption. Either aes (the default) or des3

-g

--digest

Digest to use for signature creation. One of sha256 (the default), sha384, sha512 or sha1

-R

--rsa-padding

Padding to use for RSA signatures. Either pkcs1 (the default) or pss

-t

--interval

Poll interval in seconds, defaults to 60s

-m

--maxpolltime

Maximum poll time in seconds, defaults to 0 which means unlimited polling

-f

--outform

Encoding of the created certificate file. Either der (ASN.1 DER) or pem (Base64 PEM), defaults to der

Examples

  • To save some typing work the following command line options are stored in a scep.opt file:

--url http://pki.strongswan.org:8080/scep
--cacert-enc myra.crt
--cacert-sig myca-1.crt
--cacert myca.crt
  • With the following command, an X.509 certificate signed by the intermediate CA is requested from a SCEP server:

pki --options scep.opt --in moonKey.der --san "moon.strongswan.org"
    --dn "C=CH, O=strongSwan Project, CN=moon.strongswan.org" > moonCert.der
transaction ID: 4DFCF31CB18A9B5333CCEC6F99CF230E4524E334
  using certificate "C=CH, O=strongSwan Project, CN=SCEP RA"
  using trusted intermediate ca certificate "C=CH, O=strongSwan Project, CN=strongSwan Issuing CA"
  using trusted ca certificate "C=CH, O=strongSwan Project, CN=strongSwan Root CA"
  reached self-signed root ca with a path length of 1
  SCEP request pending, polling indefinitely every 60 seconds
  going to sleep for 60 seconds
transaction ID: 4DFCF31CB18A9B5333CCEC6F99CF230E4524E334
  ...
 going to sleep for 60 seconds
Issued certificate "C=CH, O=strongSwan Project, CN=moon.strongswan.org"
  serial: 1e:ff:22:7b:6e:d7:4c:c1:8a:06
  using certificate "C=CH, O=strongSwan Project, CN=moon.strongswan.org"
  using trusted intermediate ca certificate "C=CH, O=strongSwan Project, CN=strongSwan Issuing CA"
  using trusted ca certificate "C=CH, O=strongSwan Project, CN=strongSwan Root CA"
  reached self-signed root ca with a path length of 1
Issued certificate is trusted, valid from Aug 22 18:56:23 2022 until Aug 22 18:56:23 2023 (currently valid)
  • A certificate about to expire can be renewed with the command:

pki --options scep.opt --in moonNewKey.der --san "moon.strongswan.org"
    --dn "C=CH, O=strongSwan Project, CN=moon.strongswan.org"
    --cert moonCert.der --key moonKey.der > moonNewCert.der
transaction ID: A9A63D028CC439F68452D125C4DBA025E67DBA95
  using certificate "C=CH, O=strongSwan Project, CN=SCEP RA"
  using trusted intermediate ca certificate "C=CH, O=strongSwan Project, CN=strongSwan Issuing CA"
  using trusted ca certificate "C=CH, O=strongSwan Project, CN=strongSwan Root CA"
  reached self-signed root ca with a path length of 1
Issued certificate "C=CH, O=strongSwan Project, CN=moon.strongswan.org"
  serial: 1f:ff:b2:78:43:a2:9d:85:00:38
  using certificate "C=CH, O=strongSwan Project, CN=moon.strongswan.org"
  using trusted intermediate ca certificate "C=CH, O=strongSwan Project, CN=strongSwan Issuing CA"
  using trusted ca certificate "C=CH, O=strongSwan Project, CN=strongSwan Root CA"
  reached self-signed root ca with a path length of 1
Issued certificate is trusted, valid from Jul 20 15:05:33 2023 until Jul 20 15:05:33 2024 (currently valid)