1VOMS-PROXY-FAKE(1) VOMS-PROXY-FAKE(1)
2
3
4
6 voms-proxy-fake - create a proxy with VOMS extensions
7
9 voms-proxy-fake [options]
10
11
13 The voms-proxy-fake generates a proxy containing arbitrary attributes
14 without contacting the VOMS server.
15
16
18 Options may be specified indifferently with either a "-" or "--" pre‐
19 fix.
20
21
22 -help Displays usage.
23
24
25 -version Displays version.
26
27
28 -debug Enables extra debug output.
29
30
31 -q Quiet mode, minimal output.
32
33
34 -verify Verifies certificate to make proxy for.
35
36
37 -pwstdin Allows passphrase from stdin.
38
39
40 -limited Creates a limited proxy.
41
42
43 -hours H Proxy is valid for H hours (default:12).
44
45
46 -vomslife H Tries to get an AC with information valid for H hours. The
47 default is "as long as the proxy certificate". The special value 0
48 means as long as the server will allow.
49
50
51 -bits B Number of bits in key {0|512|1024|2048|4096}. 0 is a special
52 value which means: same number of bits as in the issuing certificate.
53
54
55 -cert certfile Non-standard location of user certificate
56
57
58 -key keyfile Non-standard location of user key
59
60
61 -certdir certdir Location of trusted certificates dir
62
63
64 -out proxyfile Location of new proxy cert
65
66
67 -voms voms[:command] Specifies the fake VOMS server that will appear
68 in the attribute certificate. command is ignored and is present for
69 compatibility with voms-proxy-init.
70
71
72 -include file Includes file in the certificate (in a non critical ex‐
73 tension)
74
75
76 -conf file Read options from file.
77
78
79 -policy The file containing the policy expression.
80
81
82 -policy-language pl The language in which the policy is expressed. De‐
83 fault is IMPERSONATION_PROXY.
84
85
86 -path-length Maximum depth of proxy certfificate that can be signed
87 from this.
88
89
90 -globus version Underlying Globus version.
91
92
93 -proxyver Version of the proxy certificate to create. May be 2 or 3.
94 Default value is decided upon underlying globus version.
95
96
97 -separate file Saves the voms credential on file file.
98
99
100 -hostcert file The cert that will be used to sign the AC.
101
102
103 -hostkey file The key thet will be used to sign the AC.
104
105
106 -fqan file The string that will be included in the AC as the granted
107 FQAN.
108
109
110 -newformat
111
112
113 This forces the server to generate ACs in the new (correct) format.
114 This is meant as a compatibility feature to ease migration while the
115 servers upgrade to the new version.
116
117
118 -newsubject newdn
119
120
121 The created proxy will have newdn as subject rather than what is would
122 normally have depending on the specific version of proxy created.
123 Non-printable characters may be specified via the '\XX' encoding, where
124 XX are two hexadecimal characters.
125
126
127 -newissuer newdn
128
129
130 The created proxy will have newdn as issuer rather than what is would
131 normally have depending on the specific version of proxy created.
132 Non-printable characters may be specified via the '\XX' encoding, where
133 XX are two hexadecimal characters.
134
135
136 -newserial newserial
137
138
139 The created proxy will have the newserial as its serial number. The new
140 serial number will have to be specified as an hex representation. Any
141 length is possible. If this option is not specified, voms-proxy-fake
142 will choose the serial number.
143
144
145 -pastac timespec
146
147
148 The created AC will have its validity start in the past, as specified
149 by timespec.
150
151
152 The format of timespec is one of: seconds, hours:minutes, hours:min‐
153 utes:seconds
154
155
156 -pastproxy timespec
157
158
159 The created proxy will have its validity start in the past as specified
160 by timespec
161
162
163 The format of timespec is one of: seconds, hours:minutes, hours:min‐
164 utes:seconds
165
166
167 -nscert bit,...,bit
168
169
170 The created proxy will have the specified bits in the Netscape Certifi‐
171 cate Extension. Acceptable values for bit are: client, server, email,
172 objsign, sslCA, emailCA, objCA. The default value is not to have this
173 extension.
174
175
176 -extkeyusage bit,...,bit
177
178
179 The created proxy will have the specified bits in the Extended Key Us‐
180 age Extension. Acceptable values for bit are: serverAuth, clientAuth,
181 codeSigning, emailProtection, timeStamping, msCodeInd, msCodeCom,
182 msCTLSign, msSGC, msEFS, nsSGC, deltaCRL. The default value is not to
183 have this extensions.
184
185
186 -keyusage bit,...,bit
187
188
189 The created proxy will have the specified bits in the Key Usage Exten‐
190 sions. Acceptable values for bit are: digitalSignature, nonRepudiation,
191 keyEncipherment, dataEncipherment, keyAgreement, keyCertSign, cRLSign,
192 encipherOnly, decipherOnly. The default value is to copy this exten‐
193 sions from the issuer certificate while removing the keyCertSign and
194 nonRepudiation bits if present.
195
196
197 -selfsigned
198
199
200 The created certificate will be a self-signed certificate and have a
201 CA=true bit in the Basic constraints Exception.
202
203
204 -extension oid[/criticality]value
205
206
207 This option allows to specified additional extensions to be put in the
208 created certificate.
209
210
211 oid is the Object Identifier of the extensions. Any OID may be used
212 even if it is not already known in advance. This must always be speci‐
213 fied. There is no default.
214
215
216 criticality specifies whether the extensions is critical or not, and it
217 must be either true or false. If absent, it defaults to false.
218
219
220 value is the value of the extensions. It is composed by two subfields,
221 type and content. type is a single charater, and specifies how the con‐
222 tent is interpreted. ':' means that content is a text string to be in‐
223 cluded as is. '~' means that content is an hex representation of the
224 string. '+' means that content is the name of a file which will contain
225 the actual data.
226
227
228 -acextension oid[/criticality]value
229
230
231 This option allows to specified additional extensions to be put in the
232 created attribute certificate.
233
234
235 oid is the Object Identifier of the extensions. Any OID may be used
236 even if it is not already known in advance. This must always be speci‐
237 fied. There is no default.
238
239
240 criticality specifies whether the extensions is critical or not, and it
241 must be either true or false. If absent, it defaults to false.
242
243
244 value is the value of the extensions. It is composed by two subfields,
245 type and content. type is a single charater, and specifies how the con‐
246 tent is interpreted. ':' means that content is a text string to be in‐
247 cluded as is. '~' means that content is an hex representation of the
248 string. '+' means that content is the name of a file which will contain
249 the actual data.
250
251
252 -ga id = value [(qualifier)]
253
254
255 This option adds the generic attribute specified to the AC generated.
256 Please note that spaces before and after the '=' char are swallowed in
257 the command line.
258
259
260 -voinfo file
261
262
263 The file file contains informations for additional ACs that should be
264 included in the created proxy. ACs specified via the -voinfo option
265 shall be added before ACs specified via the command line options.
266
267
268 The format of the file is the following:
269
270
271 [voname]
272
273
274 parameter=value
275
276
277 parameter=value
278
279
280 ...
281
282
284 EGEE Bug Tracking Tool: https://savannah.cern.ch/projects/jra1mdw/
285
286
288 voms-proxy-fake(1), voms-proxy-init(1), voms-proxy-info(1),
289 voms-proxy-destroy(1)
290
291
292 EDT Auth Home page: http://grid-auth.infn.it
293
294
295 CVSweb: http://datagrid.in2p3.fr/cgi-bin/cvsweb.cgi/Auth/voms
296
297
298 RPM repository: http://datagrid.in2p3.fr/distribution/auto‐
299 build/i386-rh7.3
300
301
303 Vincenzo Ciaschini <Vincenzo.Ciaschini@cnaf.infn.it>.
304
305
306 Valerio Venturi <Valerio.Venturi@cnaf.infn.it>.
307
308
310 Copyright (c) Members of the EGEE Collaboration. 2004. See the benefi‐
311 ciaries list for details on the copyright holders.
312
313
314 Licensed under the Apache License, Version 2.0 (the "License"); you may
315 not use this file except in compliance with the License. You may obtain
316 a copy of the License at
317
318
319 www.apache.org/licenses/LICENSE-2.0: http://www.apache.org/licenses/LI‐
320 CENSE-2.0
321
322
323 Unless required by applicable law or agreed to in writing, software
324 distributed under the License is distributed on an "AS IS" BASIS, WITH‐
325 OUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
326 See the License for the specific language governing permissions and
327 limitations under the License.
328
329
330
331
332 VOMS-PROXY-FAKE(1)