A custom registration authority client to be used with the ISC CertAgent RAMI API, which allows for the automated generation of single or bulk x.509 certificates. This script assumes the user has some familiarity with manual operation of ISC CertAgent, is familiar with the RAMI API and its client certificates and trustchains.
- Bash
- OpenSSL
- Curl
- ISC CertAgent 7.0.9.x
- RAMI API Configured
- ISC CertAgent 7.0.9.x Installation Guide
- RFC 5280
This script requires no root
privileges and is designed to be run from the user's home directory.
- Clone latest from Github:
$ cd ~
$ git clone https://github.com/acavella/trustedcore-ra.git
- Copy ca trust and client (RAMI) certificates to your home directory:
$ cp ca-root.pem ~
$ cp rami-client.pfx ~
- Using OpenSSL, convert the client PKCS12 certificate to PEM format:
$ openssl pkcs12 -in <p12 file> -out <install directory>/cert/client.pem -nodes
- Using OpenSSL, convert the trustchain from DER to PEM format (if trustchain is already PEM this can be skipped):
$ openssl x509 –inform der –in <root cert> -out <install directory>/cert/ca-trust.pem
- Edit
<install-directory>/conf/local.conf
and set parameters to match your local environment:
local.conf
clientcert="<install directory>/cert/client.pem"
cacert="<install directory>/cert/ca-trust.pem"
caecc="https://tlsldc405.example.com/ca/x11"
ecdsaprofile="x11ecdsa"
ecdhprofile="x11ecdh"
carsa="https://tlsldc405.example.com/ca/x11"
rsaprofile="x11rsa"
This script is meant to be operated directly from CLI; all options are specified as inline arguments. The first argument is an input file which consists of a lists of Common Names (CN) to be used in the generation of PKCS#10 Certificate Signing Requests (CSR). The input file can be any plain-text file which lists a single CN per line, an example can be found in the input directory.
The second argument is certificate specification (ECDSA, ECDH, RSA), which are based on specifications in CNSSP 15 (Use of Public Standards for Secure Information Sharing). The third argument specifies whether the script interacts with the RAMI API and submits the certificate signing request to the CA. If not specified, the script creates a private key and certificate signing request in an offline only mode; allowing the operator to manually submit / sign the generated CSRs. All files generated will be saved within <install-directory>/output/<named dir>
.
$ ./tcra.sh <input-file> [ecdsa|ecdh|rsa] [sign]
Bulk RSA CSR & Private Key Generation
Tony Cavella
MIT License
Copyright (c) 2022 Tony Cavella
Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions:
The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.