2013-01-06 03:15:36 +04:00
|
|
|
.\" **************************************************************************
|
|
|
|
.\" * _ _ ____ _
|
|
|
|
.\" * Project ___| | | | _ \| |
|
|
|
|
.\" * / __| | | | |_) | |
|
|
|
|
.\" * | (__| |_| | _ <| |___
|
|
|
|
.\" * \___|\___/|_| \_\_____|
|
|
|
|
.\" *
|
2023-01-02 15:51:48 +03:00
|
|
|
.\" * Copyright (C) Daniel Stenberg, <daniel@haxx.se>, et al.
|
2013-01-06 03:15:36 +04:00
|
|
|
.\" *
|
|
|
|
.\" * This software is licensed as described in the file COPYING, which
|
|
|
|
.\" * you should have received as part of this distribution. The terms
|
2020-11-04 16:02:01 +03:00
|
|
|
.\" * are also available at https://curl.se/docs/copyright.html.
|
2013-01-06 03:15:36 +04:00
|
|
|
.\" *
|
|
|
|
.\" * You may opt to use, copy, modify, merge, publish, distribute and/or sell
|
|
|
|
.\" * copies of the Software, and permit persons to whom the Software is
|
|
|
|
.\" * furnished to do so, under the terms of the COPYING file.
|
|
|
|
.\" *
|
|
|
|
.\" * This software is distributed on an "AS IS" basis, WITHOUT WARRANTY OF ANY
|
|
|
|
.\" * KIND, either express or implied.
|
|
|
|
.\" *
|
|
|
|
.\" * SPDX-License-Identifier: curl
|
2022-05-17 12:16:50 +03:00
|
|
|
.\" *
|
2013-01-06 03:15:36 +04:00
|
|
|
.\" **************************************************************************
|
|
|
|
.\"
|
2016-10-24 11:24:27 +03:00
|
|
|
.TH mk-ca-bundle 1 "24 Oct 2016" "version 1.27" "mk-ca-bundle manual"
|
2013-01-06 03:15:36 +04:00
|
|
|
.SH NAME
|
2022-09-21 00:30:19 +03:00
|
|
|
mk-ca-bundle \- convert Mozilla's certificate bundle to PEM format
|
2013-01-06 03:15:36 +04:00
|
|
|
.SH SYNOPSIS
|
2016-10-24 11:24:27 +03:00
|
|
|
mk-ca-bundle [options]
|
2013-01-06 03:15:36 +04:00
|
|
|
.I [outputfile]
|
|
|
|
.SH DESCRIPTION
|
2022-09-21 00:30:19 +03:00
|
|
|
The mk-ca-bundle tool downloads the \fIcertdata.txt\fP file from Mozilla's
|
|
|
|
source tree over HTTPS, then parses \fIcertdata.txt\fP and extracts
|
|
|
|
certificates into PEM format. By default, only CA root certificates trusted to
|
|
|
|
issue SSL server authentication certificates are extracted. These are then
|
|
|
|
processed with the OpenSSL command line tool to produce the final ca-bundle
|
|
|
|
file.
|
2013-01-06 02:49:29 +04:00
|
|
|
|
|
|
|
The default \fIoutputfile\fP name is \fBca-bundle.crt\fP. By setting it to '-'
|
|
|
|
(a single dash) you will get the output sent to STDOUT instead of a file.
|
|
|
|
|
|
|
|
The PEM format this scripts uses for output makes the result readily available
|
2022-09-21 00:30:19 +03:00
|
|
|
for use by just about all OpenSSL or GnuTLS powered applications, such as curl
|
|
|
|
and others.
|
2013-01-06 03:15:36 +04:00
|
|
|
.SH OPTIONS
|
|
|
|
The following options are supported:
|
|
|
|
.IP -b
|
|
|
|
backup an existing version of \fIoutputfilename\fP
|
2015-06-08 14:14:18 +03:00
|
|
|
.IP "-d [name]"
|
2022-09-21 00:30:19 +03:00
|
|
|
specify which Mozilla tree to pull \fIcertdata.txt\fP from (or a custom
|
|
|
|
URL). Valid names are: aurora, beta, central, Mozilla, nss, release
|
|
|
|
(default). They are shortcuts for which source tree to get the certificates
|
|
|
|
data from.
|
2013-01-06 03:15:36 +04:00
|
|
|
.IP -f
|
2022-09-21 00:30:19 +03:00
|
|
|
force rebuild even if \fIcertdata.txt\fP is current (Added in version 1.17)
|
2013-01-06 03:15:36 +04:00
|
|
|
.IP -i
|
2012-04-27 21:49:40 +04:00
|
|
|
print version info about used modules
|
2016-10-24 11:24:27 +03:00
|
|
|
.IP -k
|
|
|
|
Allow insecure data transfer. By default (since 1.27) this command will fail
|
|
|
|
if the HTTPS transfer fails. This overrides that decision (and opens for
|
|
|
|
man-in-the-middle attacks).
|
2013-01-06 03:15:36 +04:00
|
|
|
.IP -l
|
2022-09-21 00:30:19 +03:00
|
|
|
print license info about \fIcertdata.txt\fP
|
2016-08-11 09:21:33 +03:00
|
|
|
.IP -m
|
|
|
|
(Added in 1.26) Include meta data comments in the output. The meta data is
|
|
|
|
specific information about each certificate that is stored in the original
|
|
|
|
file as comments and using this option will make those comments get passed on
|
|
|
|
to the output file. The meta data is not parsed in any way by mk-ca-bundle.
|
2013-01-06 03:15:36 +04:00
|
|
|
.IP -n
|
2022-09-21 00:30:19 +03:00
|
|
|
no download of \fIcertdata.txt\fP (to use existing)
|
2014-05-08 13:37:45 +04:00
|
|
|
.IP "-p [purposes]:[levels]"
|
2022-09-21 00:30:19 +03:00
|
|
|
list of Mozilla trust purposes and levels for certificates to include in
|
|
|
|
output. Takes the form of a comma separated list of purposes, a colon, and a
|
|
|
|
comma separated list of levels. The default is to include all certificates
|
|
|
|
trusted to issue SSL Server certificates
|
|
|
|
(\fISERVER_AUTH:TRUSTED_DELEGATOR\fP).
|
2014-05-08 13:37:45 +04:00
|
|
|
|
|
|
|
(Added in version 1.21, Perl only)
|
|
|
|
|
|
|
|
Valid purposes are:
|
|
|
|
.RS
|
2022-09-21 00:30:19 +03:00
|
|
|
\fIALL\fP, \fIDIGITAL_SIGNATURE\fP, \fINON_REPUDIATION\fP,
|
|
|
|
\fIKEY_ENCIPHERMENT\fP, \fIDATA_ENCIPHERMENT\fP, \fIKEY_AGREEMENT\fP,
|
|
|
|
\fIKEY_CERT_SIGN\fP, \fICRL_SIGN\fP, \fISERVER_AUTH\fP (default),
|
|
|
|
\fICLIENT_AUTH\fP, \fICODE_SIGNING\fP, \fIEMAIL_PROTECTION\fP,
|
|
|
|
\fIIPSEC_END_SYSTEM\fP, \fIIPSEC_TUNNEL\fP, \fIIPSEC_USER\fP,
|
|
|
|
\fITIME_STAMPING\fP, \fISTEP_UP_APPROVED\fP
|
2014-05-08 13:37:45 +04:00
|
|
|
.RE
|
2015-06-08 14:14:18 +03:00
|
|
|
.IP
|
2014-05-08 13:37:45 +04:00
|
|
|
Valid trust levels are:
|
|
|
|
.RS
|
2022-09-21 00:30:19 +03:00
|
|
|
\fIALL\fP, \fITRUSTED_DELEGATOR\fP (default), \fINOT_TRUSTED\fP, \fIMUST_VERIFY_TRUST\fP, \fITRUSTED\fP
|
2014-05-08 13:37:45 +04:00
|
|
|
.RE
|
2013-01-06 03:15:36 +04:00
|
|
|
.IP -q
|
2012-04-27 21:49:40 +04:00
|
|
|
be really quiet (no progress output at all)
|
2013-01-06 03:15:36 +04:00
|
|
|
.IP -t
|
2012-04-27 21:49:40 +04:00
|
|
|
include plain text listing of certificates
|
2014-05-08 13:37:45 +04:00
|
|
|
.IP "-s [algorithms]"
|
|
|
|
comma separated list of signature algorithms with which to hash/fingerprint
|
|
|
|
each certificate and output when run in plain text mode.
|
|
|
|
|
|
|
|
(Added in version 1.21, Perl only)
|
|
|
|
|
|
|
|
Valid algorithms are:
|
|
|
|
.RS
|
2014-10-15 14:48:27 +04:00
|
|
|
ALL, NONE, MD5 (default), SHA1, SHA256, SHA384, SHA512
|
2014-05-08 13:37:45 +04:00
|
|
|
.RE
|
2013-01-06 03:15:36 +04:00
|
|
|
.IP -u
|
2022-09-21 00:30:19 +03:00
|
|
|
unlink (remove) \fIcertdata.txt\fP after processing
|
2013-01-06 03:15:36 +04:00
|
|
|
.IP -v
|
2022-09-21 00:30:19 +03:00
|
|
|
be verbose and print out processed certificate authorities
|
2013-01-06 03:15:36 +04:00
|
|
|
.SH EXIT STATUS
|
|
|
|
Returns 0 on success. Returns 1 if it fails to download data.
|
2022-09-21 00:30:19 +03:00
|
|
|
.SH FILE FORMAT
|
|
|
|
The file format used by Mozilla for this trust information is documented here:
|
2013-07-17 02:05:29 +04:00
|
|
|
.nf
|
2017-08-08 22:22:34 +03:00
|
|
|
https://p11-glue.freedesktop.org/doc/storing-trust-policy/storing-trust-existing.html
|
2013-07-17 02:05:29 +04:00
|
|
|
.fi
|
2013-01-06 03:15:36 +04:00
|
|
|
.SH SEE ALSO
|
|
|
|
.BR curl (1)
|