gx-map cadesc - The cadesc file format used by gx-map
A cadesc file is a plain text file containing the information needed for the gx-ca-update command to work with a CA (Certificate Authority).
The cadesc files are installed under the etc/gx-map/ca-config directory of the gx-map installation directory. A number of these files are provided with the gx-map distribution. Users can also create their own cadesc files (and are encouraged to send them to the author for inclusion in future gx-map releases).
The name of each file is of the form <hash>.<name>.cadesc, where <hash> is the 8-digit hexadecimal hash value that identifies the CA's signing certificate, and <name> is a brief name for the CA. For example, the description file for the SDSC Certificate Authority is 3deda549.sdsc.cadesc.
A cadesc file is a plain text file where each line contains an attribute name followed by the corresponding attribute value. Blank lines are ignored. Comments are introduced by the '#' character.
This is a list of the allowed attributes in a cadesc file. Attributes marked as ``(required)'' must be specified, and must have a valid value. Attributes marked as ``(doc)'' are provided only for documentation; gx-ca-update ignores their values.
It can be computed by
openssl x509 -hash -in FILENAME -noout
The hash is incorporated into the names of the certificate, CRL, and signing_policy files (xxxxxxxx.0, xxxxxxxx.r0, and xxxxxxxx.signing_policy, respectively). The specified hash is checked against the downloaded certificate.
openssl x509 -md5 -fingerprint -in FILENAME -noout
This is checked against the actual fingerprint of the downloaded certificate.
openssl x509 -sha1 -fingerprint -in FILENAME -noout
This is checked against the actual fingerprint of the downloaded certificate.
The MD5 and SHA1 algorithms have been demonstrated to have some weaknesses. It is hoped that checking both will provide some better level of security than checking just one. If future releases of OpenSSL provide more secure hash functions, future releases of gx-map will use them.
Recognizing a CA that doesn't provide a CRL is normally not recommended. The PSC and USC Kerberos CAs are exceptions to this, since they don't issue long-term certificates.
openssl x509 -in FILENAME -noout -enddate
For consistency, the SIGNED_BY, SUBJECT, and MAY_SIGN attributes should use forms compatible with GT3/GT4 or higher and OpenSSL 0.9.7 or higher:
Use "/UID=...", not "/USERID=..." or "/0.9.2342.19200300.100.1.1=..."
Use "/emailAddress=...", not "/Email=...".
though gx-ca-update will translate to this form if necessary.
See http://bugzilla.globus.org/bugzilla/show_bug.cgi?id=575> for more information about this issue.
URLs with a prefix of either ``http://'', ``https://'', or ``ftp://'' are accepted. Files specified by URLs are downloaded using the ``curl'' command.
gx-map(8), gx-ca-update(8), gx-map-security(7)
Keith Thompson, San Diego Supercomputer Center, <kst@sdsc.edu>
See the file LICENSE in the gx-map distribution, installed in the etc/gx-map subdirectory.