PKI tools

Rationale

“Standard” certificate authorities (CAs) like Let’s Encrypt are just exactly that: They wait for applicants, sign their certificate signing requests, and return end entity (EE) certificates to the applicants.

But when I setup my own public key infrastructure, I typically have both my own CA and a couple of EE certificates, signed by my CA, in my own hands.

I need a PKI that I can configure (but only if I want) and that creates all files that are related to a certificate (e.g. the key pair, the CSR, but also certificate chains and PKCS#12 files and such) in the correct order, and only if needed.

Each PKI “solution” I found so far is either proprietary or is just a Howto of OpenSSL callings. Easy-RSA makes a very good job, but it also has the separation between CA and EE, and I have to execute several easyrsa calls by hand.

Why the PKI tools may be an alternative

The PKI tools wrap the execution of the OpenSSL commands for creating a CA, EE certificates, and the signing of the certificates by the related CA.

All files, related to a particular certificate (e.g. the private key pair and the CSR) are stored in one directory. Instead of transferring the CSR to the related CA, signing it there, and transferring the signed certificate back to the requester, the CA makes a “house call”.

The PKI tools create a file, only if it is necessary, that is, if it is not already available, or if it is older than the file(s), it depends on.

For each step, one gen-... script is responsible, which is a wrapper for the related OpenSSL call. The handling is the same for all certificates (including the root CA, which for example also has its CSR, that is, there is no special “root CA magic”, except that the root CA of course signs its own CSR).

All steps are executed in a well-defined order by a Makefile.

Each command may be executed at any time without harm, that is, the PKI tools will not overwrite existing irretrievable files accidentally. (The only exceptions are the “dangerous” make clean... commands.)

“Installation”

As a prerequisite, you need bash, openssl, and GNU make. On a “Debianic” system, install them as follows (unless already available):

sudo apt-get install bash openssl make

Furthermore, you need Functional Bash, because it makes my life easier. Clone and “install” it from GitLab as described there.

Now, clone pki_tools to an arbitrary directory, e.g. to ~/repositories:

mkdir -p ~/repositories && cd $_
git clone https://gitlab.com/w6g/pki_tools

Except of Functional Bash (where one script has to be copied to /usr/local/lib - I hope, you can live with this), no actual installation is necessary (e.g. additions to PATH or alike).

Structure

In the PKI tools environment, the root CA signs the certificates of the following intermediate CAs:

A server EE certificate is used by a web server, but also by a mail server, a VPN server or WPA-TLS (Radius).

A client EE certificate is used by a web client, a mail server (for a client connection to another mail server), a VPN client, or WPA-TLS.

A user EE certificate is used for S/MIME, but is also useful for WPA-TLS, when the certificates are related to real persons (“users”) instead of (machine) clients.

The way to our own PKI

In the following, we will setup our own PKI with a root CA, an intermediate CA (for servers), and a server EE, named server1.

Okay, it’s quite a mouthful. But I think, this way you can see best, how to handle the PKI tools.

PKI directory

First of all, we create a directory that will contain our PKI. (Do not use the PKI tools directory for that.) Since it is a good idea to have our PKI under (Git) version control, we use ~/repositories/pki.

Normally, we would use rsa as algorithm for our certificate keys. But different algorithms are also possible, e.g. ECDSA (ec for short). The algorithms should not be mixed up; therefore, we will create a subdirectory with our selected algorithm name: ~/repositories/pki/ec.

A certificate belongs to a domain, e.g. example.org. It is possible to handle more than one domain. To keep things clear, we use a subdirectory with the same name as the domain: ~/repositories/pki/ec/example.org. Let’s create and enter this directory path:

mkdir -p ~/repositories/pki/ec/example.org && cd $_

You are totally free in selecting a directory structure. The path above is just a suggestion.

Global configuration

Now, we let the PKI tools create a global configuration for our selected algorithm and domain. For this, we call ~/repositories/pki_tools/pki with the full path to the PKI tools directory:

~/repositories/pki_tools/pki -c -d example.org -a ec

Option -c creates a (global) configuration file in the current directory with the same name as the directory and the file extension .conf.

Option -d defines the domain in use. Since example.org is the default, we could also skip -d example.org here.

With option -a we select the algorithm. Because rsa is the default, we set -a ec here explicitly.

After execution, in the current directory we find pki_tools (a symlink to the PKI tools directory) and pki (a symlink to the tool pki in the PKI tools directory). Therefore, it is sufficient to enter ./pki from now on.

example.org.conf is the global configuration file. It looks as follows:

# example.org.conf


pki_tools_dir            = <where you cloned the PKI tools>
chains_with_root         = no

# Optional DN elements:
#
# countryName            = C
# stateOrProvinceName    = ST
# localityName           = L
# organizationName       = O
# organizationalUnitName = OU
# emailAddress           = emailAddress

days                     = 365
crldays                  = 365

# Optional absolute dates in ISO 8601 format instead of 'days' and 'crldays':
#
# startdate              = YYYY-MM-DDTHH:MM:SSZ
# enddate                = YYYY-MM-DDTHH:MM:SSZ
# crlenddate             = YYYY-MM-DDTHH:MM:SSZ

# Optional Certificate Revocation List Distribution Point:
#
# crl_base_uri           = http://crldp.example.org

domain                   = example.org
algorithm                = ec
ec_paramgen_curve        = secp521r1


# EOF - vim:cc=0:syn=dosini

This file is allowed to be modified. Once the file is created, it is not overwritten. If you re-enter the command above, you will get the message

pki: 'example.org.conf' already exists - not overwritten!

to prevent your possible modifications from being lost. You must move the file out of the way by hand after double-check.

pki_tools_dir is the path to the PKI tools directory and is unlikely to be changed.

chains_with_root is initially set to no. Setting this option to yes adds chain files that contain the root CA certificate as last element. (A chain file is a file that contains the concatenation of certificates.) chains_with_root is useful for DANE TLSA, but normally it is not necessary to add the root CA certificate to a chain. So, we leave this option unchanged.

As a default, the distinguished name (DN) only contains the common name (CN). It is possible to add further elements, e.g. countryName = DE. But we leave this unchanged for now.

Option days defines the number of days a certificate will be valid. Option crldays defines the number of days until the next update of a certificate revocation list. Both options define the validity start time as now.

As an alternative, the option startdate defines the absolute beginning of a certificate validity (now, if unset), and option enddate defines the absolute end time of a certificate validity.

Option crlenddate defines the absolute time of the next CRL update. Note that there is no crlstartdate option available.

The format of the absolute time values is ISO 8601, e.g. 2024-07-18T21:07:42Z. Shorter expressions are also possible, e.g. 2024-07-18.

At least days or enddate as well as crldays or crlenddate must be given, where absolute time values take precedence over the days and crldays values.

Later, you may adjust the validity time values individually for each certificate in its local configuration (see below).

It is possible to define a Certificate Revocation List Distribution Point with option crl_base_uri. As a default, there is no CRLDP set, that is, the option is commented out.

The options domain and algorithm hold the values that have been set at pki execution via command line option -d or -a, respectively.

Depending on the algorithm, an additional option may be set: For rsa the option rsa_bits defines the key size in bits (default: 4096). For ec the option ec_paramgen_curve defines the elliptic curve in use (default: secp521r1).

Local configuration for the root CA

The next step is to create a local configuration for the root CA. We enter our example.org directory (unless we are already there):

cd ~/repositories/pki/ec/example.org

Inside this directory, we use the tool pki again. Due to the symlink, we do not need the full path:

./pki -t ca root

Option -t defines the X509 type, which is ca here. root is the ID.

After execution, we find a new subdirectory, named example.org_ca_root_ec. This directory will contain all elements that belong to the root CA (e.g. the root CA certificate itself).

The directory name consists of the following elements, separated with underscores: DOMAIN_X509-TYPE_ID_ALGORITHM, example: example.org_ca_root_ec.

Let’s enter the subdirectory example.org_ca_root_ec and see, what’s inside:

cd example.org_ca_root_ec && ls -l

db.d contains the root CA database, which consists of the files index.txt and serial.

Makefile is a symlink to pki_tools/Makefile (where pki_tools is a symlink to the PKI tools directory).

example.org_ca_root_ec.conf is the local configuration file for our root CA:

# example.org_ca_root_ec.conf


commonName               = example.org_ca_root_ec

days                     = 365
crldays                  = 365

domain                   = example.org
x509_type                = ca
id                       = root
algorithm                = ec
ec_paramgen_curve        = secp521r1

db_rel_dir               = db.d
db_index_file            = index.txt
db_serial_file           = serial

key_with_password        = yes
key_file                 = example.org_ca_root_ec_key.pem

csr_cnf_file             = example.org_ca_root_ec_csr.cnf
csr_file                 = example.org_ca_root_ec_csr.pem

cert_cnf_file            = example.org_ca_root_ec_cert.cnf
cert_file                = example.org_ca_root_ec_cert.pem

crl_cnf_file             = example.org_ca_root_ec_crl.cnf
crl_file                 = example.org_ca_root_ec_crl.pem


# EOF - vim:cc=0:syn=dosini

Some options (e.g. the validity time values) are copied from the global configuration. Therefore, the local configuration depends on the global configuration.

The local configuration file is allowed to be modified as well. As usual: Once the file is created, it is not overwritten, even if necessary.

When you re-enter ./pki -t ca root (which is always allowed), pki checks, if–assumed that the local configuration exists–the global configuration is newer than the local configuration. In this case, pki stops with a related message. You have to move the local configuration out of the way by hand.

commonName defines the common name (CN), which is used to identify a certificate in an unambiguous way. Unless changed in the local configuration, the CN is equal to the name of the directory, where the config file resides.

key_with_password is set to yes per default for the root CA, which results in a password-protected private key.

The local configuration also defines the names of the files that will be built. All files have the CN as “basename”. The file extension defines the format, e.g. .pem for PEM of a certificate in PEM format or .cnf for an OpenSSL configuration file (see below). The type, e.g. certificate signing request or certificate, is separated from the CN with an underscore. e.g. example.org_ca_root_rsa_cert.pem for the root CA certificate in PEM format.

Making the root CA

We are still in the directory example.org_ca_root_ec that we created in the last section. The Makefile defines, which steps are executed in which order. If you want to know, which script is called by make, just enter

make -n

This way, the make tool outputs each script call without executing it.

To build the root CA finally, enter

make

This creates the following files (in that order):

We will be asked for a (new) pass phrase, which we have to re-enter for the CSR, the cert, and the CRL.

As already mentioned, the .cnf files are OpenSSL configuration files. Instead of using one file like openssl.cnf, for each file that needs an OpenSSL configuration there is a related dedicated .cnf file available.

It is allowed to edit OpenSSL configuration files as well. An already (maybe modified) .cnf file will not be overwritten, even if it were necessary.

Try what happens, if you re-enter make.

Local configuration for the server intermediate CA

With our root CA available, we can now setup a server intermediate CA. We go back to our example.org directory:

cd ..

There, we enter:

./pki -t ca server

The X509 type is still ca, but the ID is server now.

After execution, we find the new subdirectory example.org_ca_server_ec. Let’s go inside:

cd example.org_ca_server_ec

db.d contains the server CA database, which consists of the files index.txt and serial.

Makefile and pki_tools are symlinks in the same way as for the root CA.

example.org_ca_server_ec.conf is the local configuration file for our server CA and looks quite similar to the local root CA configuration.

Like the local configuration for the root CA, the local configuration for the server intermediate CA has adopted some options from the global configuration, e.g. days and crldays. You may adjust these values (or replace them with their “absolute” counterparts), if you don’t want to have the intermediate CA certificate the same lifetime as the root CA certificate.

The option parent_ca_dir defines the directory path to the parent CA. For the server CA, this is the root CA. (The root CA configuration does not have this entry, because the root CA does not have a parent.)

The option chain_file defines the name of the file that contains the concatenation of the server CA certificate and the root CA certificate.

Making the server intermediate CA

We are still in the directory example.org_ca_server_ec that we created in the last section. To build the server CA, enter

make

This creates the related files in the same way as for the root CA plus example.org_ca_server_ec-example.org_ca_root_ec_chain.pem.

Local configuration for the server EE server1

With our server intermediate CA available, we can now setup a server EE, named server1 as an example. We go back to our example.org directory:

cd ..

There, we enter:

./pki -t server server1

Now, the X509 type is server, and the ID is server1.

After execution, we find the new subdirectory example.org_server_server1_ec. Let’s go inside:

cd example.org_server_server1_ec

The configuration looks a bit different now: We don’t have a db.d entry, since an EE is not a CA. But we have definitions for PKCS files instead (see below).

The local configuration for a server EE sets the Subject Alternative Name to DNS:id.domain, e.g. DNS:server1.example.org. Change the line subjectAltName = … accordingly, if you don’t want that.

More than one subjectAltName element can be set as in the following example with an entry for the domain itself and an additional wildcard domain entry:

subjectAltName = DNS:example.org, DNS:*.example.org

Making the server EE server1

We are still in the directory example.org_server_server1_ec that we created in the last section. To build the server EE, enter

make

This creates the related files in the same way as for the root CA and the server intermediate CA, but of course adapted to the EE needs.

The file ffdhe4096.pem holds the finite field group values, recommended by RFC 7919 (downloaded from here).

The PKCS#7 file contains the certificates and the CRL. Inspect it as follows:

openssl pkcs7 -in example.org_server_server1_ec_p7b.pem -print_certs -text

Have a look at the PKCS#12 file as follows:

openssl pkcs12 -in example.org_server_server1_ec.pfx -nodes

When you are asked for an Import Password, use the content of the file example.org_server_server1_ec_pfx.pwd. (Maybe, it’s a good idea to store this password in a password safe, e.g. pass - the standard unix password manager.)

There is a tool available, called export, which is not executed automatically. When you call it this way:

pki_tools/export

it creates the directory export with some subdirectories and copies the files, created by make, to them. This might be useful, if you want to setup a server with your brand new certificate stuff.

export works also for client and user EEs (but not for CAs). Enter pki_tools/export -h for a “manual page”.

For a server, the files from the client and the user intermediate CAs are interesting as well. Thus, since we have not created the client and the user intermediate CAs yet, export will complain:

export: not all files found, export is incomplete!

When we retry export later with all intermediate CAs available, the complaint will be gone.

Next steps

With our knowledge, we now can create further intermediate CAs and EEs.

Making the client intermediate CA

cd ~/repositories/pki/ec/example.org
./pki -t ca client
cd example.org_ca_client_ec
make

As an alternative, we can combine the configuration and make to one step:

cd ~/repositories/pki/ec/example.org
./pki -m -t ca client

Making the client EE client1

# We are still in '~/repositories/pki/ec/example.org'.
./pki -m -t client client1

Making the user intermediate CA

./pki -m -t ca user

Making the user EE user1

./pki -m -t user user1

As a default, the local configuration for a user EE sets the Subject Alternative Name to email:id@domain, e.g. email:user1@example.org. Change or comment out the line subjectAltName = … there, if you don’t want that.

Revoking the user EE user1

Let us revoke the user1 certificate, due to reason superseded:

cd example.org_user_user1_ec
pki_tools/revoke -r superseded

Now, the directory example.org_user_user1_ec contains the file REVOKED. You can use the tool verify:

pki_tools/verify

You can use the tool verify also recursively:

cd ..
pki_tools/verify -r

There is a further (hopefully useful) tool: check-expiry:

pki_tools/check-expiry -r

Making all stuff for example.com and rsa

For our domain example.com, we need (RSA) certificate stuff for a root CA, server / client / user intermediate CAs, and three server EEs, two client EEs, and four user EEs. No big deal:

mkdir -p ~/repositories/pki/rsa/example.com && cd $_
~/repositories/pki_tools/pki -c -d example.com  # 'rsa' is default
./pki -m -t ca root server client user
./pki -m -t server server1 server2 server3
./pki -m -t client client1 client2
./pki -m -t user user1 user2 user3 user4

Re-check at any time, whether all certificates are (still) okay:

pki_tools/verify -r

Are there certificates that are in danger of expiring (or even already expired)? Find out:

pki_tools/check-expiry -r

Do you remember when we created our PKI “start directory” ~/repositories/pki/ec/example.org? Let’s go back to this directory and execute yet another convenience tool:

cd ~/repositories/pki/ec/example.org
~/repositories/gitlab/bash/pki_tools/export-recursively

Now, you find the new directory EXPORT inside. For each EE, it contains a subdirectory with the same name as the EE, e.g. server1 as well as a compressed archive, e.g. server1.tar.bz2. You may copy the complete directory structure, e.g. for server1, to its final destination, e.g. /etc/ssl.

You can call all (script) tools with option -h to get a “manual page”, by the way.

FAQ

Why do you use Bash? The scripting language XYZ does a better job!

Bash is available on any Linux system. I like it best for scripting purposes.

What is this Functional Bash stuff of yours?

Functional Bash allows me to write Bash scripts in a functional style. I just like stuff like this: list "${ids[@]}" | lmap hdl_id.

Why do you use a bunch of Bash scripts instead of just one?

When each script does only what its name implies, it is shorter and easier to read than one monolithic “monster” script. For example, if you want to know, how OpenSSL is called to create a CSR, guess, what script you have to investigate. (It’s gen-csr.)

Why do you use this Makefile stuff instead of just a wrapper script?

I need an established mechanism that allows me to define dependencies. With these dependencies, all files are created in a well-defined order and only if needed. make -n shows in advance, what is called in which order.

Why do you use GNU make? The tool XYZ does a better job!

GNU make does a good job for decades. It is generic, that is, it doesn’t matter how to use it (for C source files, DNS zone files, Postfix configuration files, X509 certificate files, …). It is available on any Linux system. Last, but not least, I know for years, how to use it.

How do I prevent make from rebuilding all stuff after Git checkout?

I still think that it is a good idea to have our PKI under (Git) version control. But since Git’s checkout (or cloning) does not preserve file timestamps, make would rebuild everything afterwards.

To avoid this, consider metastore, which does a good job for me, together with the script metastore_hook.

Do I have to add my bunch of PFX passwords to my password safe by hand?

If you use pass, then have a closer look at add-pfx-pwds-to-pass. As usual: Call the script with option -h to get its “manual page”.

What is this ffdhe4096.pem for?

The file ffdhe4096.pem contains predefined DH groups. For the reason, why to use predefined DH groups, see here. Apache (since httpd-2.4.51-2) ignores DH parameters provided via SSLOpenSSLConfCmd (see also here). Therefore, the content of the file ffdhe4096.pem (with its recommended FFDHE values) is concatenated to the certificate chain files, used by a server EE.

Why is the export tool not part of the make process?

export is a convenience tool that copies all files, needed for an EE, to a dedicated directory. Since the default (which is export in the current directory) is typically not the end destination, you will mostly call export with option -e for defining your destination directory explicitly. Furthermore, export contains some “derivation heuristic” for parent CA directories, which might fail under some circumstances. Call export with option -h for details.

What if I want CA and EE separated from each other?

Okay, in this case, see Separate CA for details.

References