1VOMS-PROXY-FAKE(1) VOMS Client VOMS-PROXY-FAKE(1)
2
3
4
6 voms-proxy-fake - create a proxy with VOMS extensions
7
9 voms-proxy-fake [options]
10
12 The voms-proxy-fake generates a proxy containing arbitrary attributes
13 without contacting the VOMS server.
14
16 Options may be specified indifferently with either a "-" or "--"
17 prefix.
18
19 -help Displays usage.
20
21 -version Displays version.
22
23 -debug Enables extra debug output.
24
25 -q Quiet mode, minimal output.
26
27 -verify Verifies certificate to make proxy for.
28
29 -pwstdin Allows passphrase from stdin.
30
31 -limited Creates a limited proxy.
32
33 -hours H Proxy is valid for H hours (default:12).
34
35 -vomslife H Tries to get an AC with information valid for H hours. The
36 default is "as long as the proxy certificate". The special value 0
37 means as long as the server will allow.
38
39 -bits B Number of bits in key {0|512|1024|2048|4096}. 0 is a special
40 value which means: same number of bits as in the issuing certificate.
41
42 -cert certfile Non-standard location of user certificate
43
44 -key keyfile Non-standard location of user key
45
46 -certdir certdir Location of trusted certificates dir
47
48 -out proxyfile Location of new proxy cert
49
50 -voms voms[:command] Specifies the fake VOMS server that will appear in
51 the attribute certificate. command is ignored and is present for
52 compatibility with voms-proxy-init.
53
54 -include file Includes file in the certificate (in a non critical
55 extension)
56
57 -conf file Read options from file.
58
59 -policy The file containing the policy expression.
60
61 -policy-language pl The language in which the policy is expressed.
62 Default is IMPERSONATION_PROXY.
63
64 -path-length Maximum depth of proxy certfificate that can be signed
65 from this.
66
67 -globus version This option is obsolete and only present for backwards
68 compatibility with old installations. Currently, its value is ignored.
69
70 -proxyver Version of the proxy certificate to create. May be 2 or 3.
71 Default value is decided upon underlying globus version.
72
73 -separate file Saves the voms credential on file file.
74
75 -hostcert file The cert that will be used to sign the AC.
76
77 -hostkey file The key thet will be used to sign the AC.
78
79 -fqan file The string that will be included in the AC as the granted
80 FQAN.
81
82 -newformat
83
84 This forces the server to generate ACs in the new (correct) format.
85 This is meant as a compatibility feature to ease migration while the
86 servers upgrade to the new version.
87
88 -newsubject newdn
89
90 The created proxy will have newdn as subject rather than what is would
91 normally have depending on the specific version of proxy created.
92 Non-printable characters may be specified via the '\XX' encoding, where
93 XX are two hexadecimal characters.
94
95 -newissuer newdn
96
97 The created proxy will have newdn as issuer rather than what is would
98 normally have depending on the specific version of proxy created.
99 Non-printable characters may be specified via the '\XX' encoding, where
100 XX are two hexadecimal characters.
101
102 -newserial newserial
103
104 The created proxy will have the newserial as its serial number. The new
105 serial number will have to be specified as an hex representation. Any
106 length is possible. If this option is not specified, voms-proxy-fake
107 will choose the serial number.
108
109 -pastac timespec
110
111 The created AC will have its validity start in the past, as specified
112 by timespec.
113
114 The format of timespec is one of: seconds, hours:minutes,
115 hours:minutes:seconds
116
117 -pastproxy timespec
118
119 The created proxy will have its validity start in the past as specified
120 by timespec
121
122 The format of timespec is one of: seconds, hours:minutes,
123 hours:minutes:seconds
124
125 -nscert bit,...,bit
126
127 The created proxy will have the specified bits in the Netscape
128 Certificate Extension. Acceptable values for bit are: client, server,
129 email, objsign, sslCA, emailCA, objCA. The default value is not to have
130 this extension.
131
132 -extkeyusage bit,...,bit
133
134 The created proxy will have the specified bits in the Extended Key
135 Usage Extension. Acceptable values for bit are: serverAuth, clientAuth,
136 codeSigning, emailProtection, timeStamping, msCodeInd, msCodeCom,
137 msCTLSign, msSGC, msEFS, nsSGC, deltaCRL. The default value is not to
138 have this extensions.
139
140 -keyusage bit,...,bit
141
142 The created proxy will have the specified bits in the Key Usage
143 Extensions. Acceptable values for bit are: digitalSignature,
144 nonRepudiation, keyEncipherment, dataEncipherment, keyAgreement,
145 keyCertSign, cRLSign, encipherOnly, decipherOnly. The default value is
146 to copy this extensions from the issuer certificate while removing the
147 keyCertSign and nonRepudiation bits if present.
148
149 -selfsigned
150
151 The created certificate will be a self-signed certificate and have a
152 CA=true bit in the Basic constraints Exception.
153
154 -extension oid[/criticality]value
155
156 This option allows to specified additional extensions to be put in the
157 created certificate.
158
159 oid is the Object Identifier of the extensions. Any OID may be used
160 even if it is not already known in advance. This must always be
161 specified. There is no default.
162
163 criticality specifies whether the extensions is critical or not, and it
164 must be either true or false. If absent, it defaults to false.
165
166 value is the value of the extensions. It is composed by two subfields,
167 type and content. type is a single charater, and specifies how the
168 content is interpreted. ':' means that content is a text string to be
169 included as is. '~' means that content is an hex representation of the
170 string. '+' means that content is the name of a file which will contain
171 the actual data.
172
173 -acextension oid[/criticality]value
174
175 This option allows to specified additional extensions to be put in the
176 created attribute certificate.
177
178 oid is the Object Identifier of the extensions. Any OID may be used
179 even if it is not already known in advance. This must always be
180 specified. There is no default.
181
182 criticality specifies whether the extensions is critical or not, and it
183 must be either true or false. If absent, it defaults to false.
184
185 value is the value of the extensions. It is composed by two subfields,
186 type and content. type is a single charater, and specifies how the
187 content is interpreted. ':' means that content is a text string to be
188 included as is. '~' means that content is an hex representation of the
189 string. '+' means that content is the name of a file which will contain
190 the actual data.
191
192 -ga id = value [(qualifier)]
193
194 This option adds the generic attribute specified to the AC generated.
195 Please note that spaces before and after the '=' char are swallowed in
196 the command line.
197
198 -voinfo file
199
200 The file file contains informations for additional ACs that should be
201 included in the created proxy. ACs specified via the -voinfo option
202 shall be added before ACs specified via the command line options.
203
204 The format of the file is the following:
205
206 [voname]
207
208 parameter=value
209
210 parameter=value
211
212 ...
213
215 EGEE Bug Tracking Tool[1]
216
218 voms-proxy-fake(1), voms-proxy-init(1), voms-proxy-info(1),
219 voms-proxy-destroy(1)
220
221 EDT Auth Home page[2]
222
223 CVSweb[3]
224
225 RPM repository[4]
226
228 Vincenzo Ciaschini <Vincenzo.Ciaschini@cnaf.infn.it>.
229
230 Valerio Venturi <Valerio.Venturi@cnaf.infn.it>.
231
233 Copyright (c) Members of the EGEE Collaboration. 2004. See the
234 beneficiaries list for details on the copyright holders.
235
236 Licensed under the Apache License, Version 2.0 (the "License"); you may
237 not use this file except in compliance with the License. You may obtain
238 a copy of the License at
239
240 www.apache.org/licenses/LICENSE-2.0[5]
241
242 Unless required by applicable law or agreed to in writing, software
243 distributed under the License is distributed on an "AS IS" BASIS,
244 WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or
245 implied. See the License for the specific language governing
246 permissions and limitations under the License.
247
249 1. EGEE Bug Tracking Tool
250 https://savannah.cern.ch/projects/jra1mdw/
251
252 2. EDT Auth Home page
253 http://grid-auth.infn.it
254
255 3. CVSweb
256 http://datagrid.in2p3.fr/cgi-bin/cvsweb.cgi/Auth/voms
257
258 4. RPM repository
259 http://datagrid.in2p3.fr/distribution/autobuild/i386-rh7.3
260
261 5. www.apache.org/licenses/LICENSE-2.0
262 http://www.apache.org/licenses/LICENSE-2.0
263
264
265
266VOMS Client 05/03/2021 VOMS-PROXY-FAKE(1)