pki --scepca
Synopsis
pki --scepca --url url [--caout file] [--raout file] [--outform der|pem] [--force] pki --scepca --help
Options
|
|
Prints usage information and a short summary of the available options |
|
|
Set debug level, default: |
|
|
Read command line options from file |
|
|
URL of the SCEP server. According to RFC 8894, the URL
should be of the form |
|
|
If present, path where the fetched root CA certificate file is stored to. If
several CA certificates are downloaded, then the value of |
|
|
If present, path where the fetched RA certificate file is stored to. If multiple
RA certificates are available, then the value of |
|
|
Encoding of the created certificate file. Either |
|
|
Force overwrite of existing files |
Examples
-
A SCEP server sends a root CA and an intermediate CA certificate as well as an RA certificate:
pki --scepca --url http://pki.strongswan.org:8080/scep --caout myca.crt --raout myra.crt
Root CA cert "C=CH, O=strongSwan Project, CN=strongSwan Root CA" serial: 65:31:00:ca:79:da:16:6b:aa:ac:89:e2:a8:f9:49:c3:10:ab:64:54 SHA256: 96:70:50:51:cd:b9:e7:94:6b:04:f6:15:45:80:fc:90:85:01:71:2a:f6:4f:d1:1b:2d:a1:7e:eb:bf:dd:be:86 SHA1 : 8e:f3:78:b0:34:a6:c1:6a:7b:c6:f5:91:eb:e5:46:9b:0d:0a:a7:ba (jvN4sDSmwWp7xvWR6+VGmw0Kp7o) Root CA cert is untrusted, valid until Aug 12 15:51:34 2032, 'myca.crt' Sub CA cert "C=CH, O=strongSwan Project, CN=strongSwan Issuing CA" serial: 74:f9:7e:72:7d:b8:fd:f2:c6:e5:1b:fa:37:f9:cb:87:bf:9c:ea:e2 SHA256: a3:5b:4b:12:d5:8f:68:7b:05:11:08:27:f5:42:62:b8:b5:01:1b:19:37:9c:28:78:5d:37:08:69:6a:8c:07:bf SHA1 : 8c:e6:67:67:c2:23:89:7b:d0:bc:b1:50:d2:1c:bc:8d:8d:69:15:11 (jOZnZ8IjiXvQvLFQ0hy8jY1pFRE) using certificate "C=CH, O=strongSwan Project, CN=strongSwan Issuing CA" using trusted ca certificate "C=CH, O=strongSwan Project, CN=strongSwan Root CA" reached self-signed root ca with a path length of 0 Sub CA cert is trusted, valid until Aug 12 15:51:34 2027, 'myca-1.crt' RA cert "C=CH, O=strongSwan Project, CN=SCEP RA" serial: 74:f9:7e:72:7d:b8:fd:f2:c6:e5:1b:fa:37:f9:cb:87:bf:9c:ea:e3 SHA256: 57:22:f3:13:69:2f:24:82:12:59:8e:05:63:0b:f5:a8:fb:4e:78:87:8d:68:d1:4c:c1:c4:b5:85:db:bb:64:df SHA1 : bc:d1:46:76:55:7f:8c:d1:c5:22:31:b9:d7:b1:49:b5:95:a4:f3:ea (vNFGdlV/jNHFIjG517FJtZWk8+o) using certificate "C=CH, O=strongSwan Project, CN=SCEP RA" using untrusted intermediate certificate "C=CH, O=strongSwan Project, CN=strongSwan Issuing CA" using trusted ca certificate "C=CH, O=strongSwan Project, CN=strongSwan Root CA" reached self-signed root ca with a path length of 1 RA cert is trusted, valid until Aug 10 15:51:34 2023, 'myra.crt'
The trusthworthiness of the root CA certificate has to be established manually by verifying the SHA256 or SHA1 fingerprint of the DER-encoded certificate that is e.g. listed on the official PKI website or by some other means. |
-
The stored certificate files in DER format can be overwritten by PEM-encoded versions with:
pki --scepca --url http://pki.strongswan.org:8080/scep --caout myca.crt --raout myra.crt --outform pem --force
-
If the
--raout
option is omitted and the--caout
template doesn’t have a file suffix, then with--outform pem
the following filenames are derived:
pki --scepca --url http://pki.strongswan.org:8080/scep --caout scep/myca --outform pem
Root CA cert "C=CH, O=strongSwan Project, CN=strongSwan Root CA" ... Root CA cert is untrusted, valid until Aug 12 15:51:34 2032, written to 'scep/myca.pem' Sub CA cert "C=CH, O=strongSwan Project, CN=strongSwan Issuing CA" ... Sub CA cert is trusted, valid until Aug 12 15:51:34 2027, 'scep/myca-1.pem' RA cert "C=CH, O=strongSwan Project, CN=SCEP RA" ... RA cert is trusted, valid until Aug 10 15:51:34 2023, 'scep/myca-ra.pem'
-
If the
--caout
option is omitted as well, then only the certificate information is output but no files are written:
pki --scepca --url http://pki.strongswan.org:8080/scep
Root CA cert "C=CH, O=strongSwan Project, CN=strongSwan Root CA" ... Root CA cert is untrusted, valid until Aug 12 15:51:34 2032, 'not written' Sub CA cert "C=CH, O=strongSwan Project, CN=strongSwan Issuing CA" ... Sub CA cert is trusted, valid until Aug 12 15:51:34 2027, 'not written' RA cert "C=CH, O=strongSwan Project, CN=SCEP RA" ... RA cert is trusted, valid until Aug 10 15:51:34 2023, 'not written'
-
A CA certificate bundle in PEM format is written to stdout:
pki --scepca --url http://pki.strongswan.org:8080/scep --raout myra.crt --outform pem > cacerts.pem