Changes between Initial Version and Version 1 of creddyRT2


Ignore:
Timestamp:
Sep 10, 2012 11:54:59 PM (12 years ago)
Author:
Mei
Comment:

--

Legend:

Unmodified
Added
Removed
Modified
  • creddyRT2

    v1 v1  
     1
     2{{{
     3#!html
     4<H1>creddy</H1>
     5<P>
     6<A NAME="lbAB">&nbsp;</A>
     7<H2>NAME</H2>
     8
     9creddy - ABAC X.509 identity and attribute certificate manager
     10<P>
     11<A NAME="lbAC">&nbsp;</A>
     12<H2>SYNOPSIS</H2>
     13
     14<P>
     15<B>creddy [ --&lt;mode&gt; ] --help</B>
     16
     17<P>
     18<A NAME="lbAD">&nbsp;</A>
     19<H2>DESCRIPTION</H2>
     20
     21<P>
     22creddy is an awesome and wonderful ABAC credential management tool. It
     23creates, verifies, and otherwise frobnicates X.509 identity and
     24attribute certificates. The output of the tool is suitable for use with
     25ABAC. Additionally, the self-signed X.509 identity certs (with
     26associated private keys) can be used with OpenSSL
     27<P>
     28<A NAME="lbAE">&nbsp;</A>
     29<H2>OPTIONS</H2>
     30
     31<P>
     32<A NAME="lbAF">&nbsp;</A>
     33<H3>--generate</H3>
     34
     35Generate an X.509 identity cert and private key pair unless an external private key is specified. The certificate is saved in ${cn}_id.pem and the generated private key is saved in ${cn}_private.pem
     36<P>
     37<P>
     38
     39Note that private key generation is slow and uses a lot of entropy. You can generate entropy by moving your mouse a lot or running large find commands on your local file systems
     40<P>
     41<DL COMPACT>
     42<DT><B>--cn</B>
     43
     44<DD>
     45common name used on certificate, provided as a convenience and ignored by ABAC
     46<P>
     47<DT><B>--validity</B>
     48
     49<DD>
     50optional certificate validity. This argument takes a time period followed by an optional suffix of s m h d y (defaults to d if omitted). The default is 1080 days
     51<P>
     52<DT><B>--out</B>
     53
     54<DD>
     55optional output directory. Must exist before invoking the command
     56<P>
     57<DT><B>--key</B>
     58<DD>
     59optional external private key to be use for this identity
     60<P>
     61<DT><B>--p</B>
     62
     63<DD>
     64optional passphrase flag if the external private key supplied is encrypted. If the passphrase
     65is saved in a file 'pfile', then --p=pfile
     66<P>
     67</DL>
     68<A NAME="lbAG">&nbsp;</A>
     69<H3>--verify</H3>
     70
     71verify the signature on a self-signed X.509 identity cert or an X.509 attribute cert
     72<P>
     73<DL COMPACT>
     74<DT><B>--cert</B>
     75
     76<DD>
     77self-signed X.509 identity cert
     78<P>
     79<DT><B>--attrcert</B>
     80
     81<DD>
     82optional X.509 attribute cert. If omitted the self-signature of the ID cert is checked
     83<P>
     84</DL>
     85<A NAME="lbAH">&nbsp;</A>
     86<H3>--keyid</H3>
     87
     88extract the subjectKeyIdentifier (SHA1 hash) from an X.509 identity cert
     89<P>
     90<DL COMPACT>
     91<DT><B>--cert</B>
     92
     93<DD>
     94X.509 identity cert
     95<P>
     96</DL>
     97<A NAME="lbAI">&nbsp;</A>
     98<H3>--attribute</H3>
     99
     100generate an X.509 attribute cert representing an ABAC credential
     101<P>
     102An attribute cert has one or more subjects. A single subject may be defined without a role or oset. Otherwise, subjects are defined by a pair of a --subject-{cert,id} and --subject-{role,oset} and may include an optional --subject-link or just --subject-obj or --subject-cert. Providing multiple subjects creates an intersection certificate
     103<P>
     104<DL COMPACT>
     105<DT><B>--issuer</B>
     106
     107<DD>
     108X.509 identity cert issuing the credential
     109<P>
     110<DT><B>--key</B>
     111
     112<DD>
     113private key associated with issuer cert
     114<P>
     115<DT><B>--p</B>
     116
     117<DD>
     118optional passphrase if the private key is encrypted
     119<P>
     120<DT><B>--role</B>
     121<DD>
     122role in issuer's local attribute space
     123<P>
     124<DT><B>--oset</B>
     125
     126<DD>
     127o-set in issuer's local attribute space
     128<P>
     129<DT><B>--subject-cert</B>
     130
     131<DD>
     132X.509 identity cert representing the principal to which the role is being issued. This fulfills the same purpose as --subject-id and should only be used once per subject
     133<P>
     134<DT><B>--subject-id</B>
     135
     136<DD>
     137public key identifier (SHA1 hash) of the principal to which the role is being issued. This fulfills the same purpose as --subject-cert and should only be used once per subject
     138<P>
     139<DT><B>--subject-role</B>
     140<DD>
     141optional role in subject's local attribute space. If the issuer is A, role is r1, subject is B, and subject-role is r2, the attribute issued will be A.r1 &lt;- B.r2
     142<P>
     143<DT><B>--subject-oset</B>
     144
     145<DD>
     146optional oset in subject's local attribute space. If the issuer is A, oset is o1, subject is B, and subject-oset is o2, the attribute issued will be A.o1 &lt;- B.o2
     147<P>
     148<DT><B>--subject-link</B>
     149
     150<DD>
     151optional linking role in subject's local attribute space. If the issuer is A, oset is o1, subject is B, subject-link is r2 and subject-oset is o2, the attribute issued will be A.o1 &lt;- B.r2.o2
     152<P>
     153<DT><B>--subject-obj</B>
     154
     155<DD>
     156optional object in subject's local attribute space. If the issuer is A, oset is o1, and subject-obj is o2, the attribute issued will be A.o1 &lt;- o2
     157<P>
     158<DT><B>--validity</B>
     159
     160<DD>
     161optional certificate validity. This argument takes a time period followed by an optional suffix of s m h d y (defaults to d if omitted). The default is 365 days
     162<P>
     163<DT><B>--out</B>
     164
     165<DD>
     166where to save DER-encoded attribute cert. In order to interoperate with the rest of ABAC, this name should end in _attr.der
     167<P>
     168</DL>
     169<A NAME="lbAJ">&nbsp;</A>
     170<H3>--keycheck</H3>
     171
     172
     173
     174Do a sanity check on a private key file
     175<P>
     176<DL COMPACT>
     177<DT><B>--key</B>
     178
     179<DD>
     180private key to be used
     181<P>
     182<DT><B>--p</B>
     183
     184<DD>
     185passphrase file to be used
     186<P>
     187</DL>
     188<A NAME="lbAK">&nbsp;</A>
     189<H3>--roles</H3>
     190
     191Extract the roles from an X.509 attribute cert
     192<P>
     193<DL COMPACT>
     194<DT><B>--cert</B>
     195
     196<DD>
     197X.509 attribute cert containing ABAC roles
     198<P>
     199</DL>
     200<A NAME="lbAL">&nbsp;</A>
     201<H3>--osets</H3>
     202
     203Extract the osets from an X.509 attribute cert
     204<P>
     205<DL COMPACT>
     206<DT><B>--cert</B>
     207
     208<DD>
     209X.509 attribute cert containing ABACosets
     210<P>
     211</DL>
     212<A NAME="lbAM">&nbsp;</A>
     213<H3>--display</H3>
     214
     215Displays metadata from an X.509 identity or attribute cert
     216<P>
     217<DL COMPACT>
     218<DT><B>--show=[issuer,..,all]</B>
     219
     220<DD>
     221comma-separated list of:
     222<P>
     223<BR>&nbsp;&nbsp;&nbsp;&nbsp;issuer&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;DN&nbsp;of&nbsp;issuer
     224<BR>&nbsp;&nbsp;&nbsp;&nbsp;subject&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;DN&nbsp;of&nbsp;subject
     225<BR>&nbsp;&nbsp;&nbsp;&nbsp;validity&nbsp;&nbsp;&nbsp;&nbsp;validity&nbsp;period
     226<BR>&nbsp;&nbsp;&nbsp;&nbsp;roles&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;attribute&nbsp;cert&nbsp;roles&nbsp;(fails&nbsp;silently&nbsp;on&nbsp;ID&nbsp;certs)
     227<BR>&nbsp;&nbsp;&nbsp;&nbsp;osets&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;attribute&nbsp;cert&nbsp;osets&nbsp;(fails&nbsp;silently&nbsp;on&nbsp;ID&nbsp;certs)
     228<BR>&nbsp;&nbsp;&nbsp;&nbsp;all&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;all&nbsp;of&nbsp;the&nbsp;above
     229<P>
     230<DT><B>--cert</B>
     231
     232<DD>
     233X.509 identity or attribute cert
     234<P>
     235</DL>
     236<A NAME="lbAN">&nbsp;</A>
     237<H3>--version</H3>
     238display ABAC/creddy version
     239<P>
     240<A NAME="lbAO">&nbsp;</A>
     241<H2>EXAMPLES</H2>
     242
     243<P>
     244<DL COMPACT>
     245<DT>Generate ID cert and private key pairs:<DD>
     246<P>
     247<B>creddy --generate --cn Alice</B>
     248
     249<BR>
     250
     251<B>creddy --generate --cn Bob</B>
     252
     253<P>
     254<DT>Issue the credential Alice.friend &lt;- Bob<DD>
     255<P>
     256creddy --attribute \
     257<BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;--issuer&nbsp;Alice_ID.pem&nbsp;--key&nbsp;Alice_private.pem&nbsp;\
     258<BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;--role&nbsp;friend&nbsp;--subject-cert&nbsp;Bob_ID.pem&nbsp;\
     259<BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;--out&nbsp;Alice_friend__Bob_attr.der
     260<P>
     261</DL>
     262<A NAME="lbAP">&nbsp;</A>
     263<H2>AUTHOR</H2>
     264
     265<P>
     266Written by Mike Ryan
     267<BR>
     268Updated by Mei-Hui Su &lt;<A HREF="mailto:mei@ISI.EDU">mei@ISI.EDU</A>&gt;.
     269<P>
     270<A NAME="lbAQ">&nbsp;</A>
     271<H2>BUGS</H2>
     272
     273<P>
     274None yet. Report to <A HREF="http://abac.deterlab.net/">http://abac.deterlab.net/</A>
     275<P>
     276<A NAME="lbAR">&nbsp;</A>
     277<H2>COPYRIGHT</H2>
     278
     279<P>
     280Copyright (c) 2010-2012 USC/ISI. Released under MIT license. See COPYING included with source for details.
     281<P>
     282}}}