# # for every CA, a symbolic abbrev should be defined, and in the CWD # there should be a self-signed CERT named "cacert-${caname}.pem" # if the CRL URL is correct, it will be retreived automatically, # otherwise, put the file by hand in this directory as "cacrl-${caname}.pem". # the hash is compuled automatically and symlinks to cert and crl made # accordingly. The "hash.0" and "hash.r0" MUST be symlinks. # # The "auth" entry in the hash is compulsory: it should be a list # of DN prefixes signed by that CA, inclusing any wildcards. # # The "cert" entry is NOT used: it would be catastrophic to retreive # a CA cert insecurely and at random. Use of the "cert" field is # to be forbidden for automatic updates! # # if the "dis" entry is defined, the CA will not be added to the # ca-signing-policy.conf file. The textual value of the "dis" entry # will be echoed to the screen. # # The list of CA's, in perl syntax as a hash of hashes: # %calist = ( "cern" => { cert => 'http://globus.home.cern.ch/globus/ca/c35c1972.0', crl => 'http://globus.home.cern.ch/globus/ca/cern.crl.pem', auth => ["/C=ch/O=CERN/*","/C=CH/O=CERN/*", "/O=Grid/O=CERN/*","/O=CERN/O=Grid/"] }, "nikhef-ms" => { cert => 'http://certificate.nikhef.nl/medium/cacert.pem', crl => 'http://certificate.nikhef.nl/medium/cacrl.pem', auth => ["/O=dutchgrid/O=users/*","/O=dutchgrid/O=hosts/*"] }, "nikhef-test-low" => { cert => 'http://certificate.nikhef.nl/test-low/cacert.pem', crl => 'http://certificate.nikhef.nl/test-low/cacrl.pem', auth => ["/C=nl/O=nikhef/*","/C=nl/O=UvA/OU=wins/*", "/C=nl/O=amolf/*","/O=dutchgrid/*"] }, "ukhep" => { cert => 'http://www.hep.grid.ac.uk/ca/software/0ed6468a.0', crl => 'http://www.hep.grid.ac.uk/ca/ca-crl.pem', auth => ["/O=Grid/O=UKHEP/*"] }, "lip" => { cert => 'http://www.lip.pt/ca/41380387.0', crl => 'http://www.lip.pt/ca/lip-crl.pem', auth => ["/C=PT/O=LIP/*"] }, "infn-2" => { crl => 'http://security.fi.infn.it/CA/crl.crl', crl_filter => "| $openssl crl -inform der -text", auth => ["/C=IT/O=INFN/*"] }, "nordugrid" => { cert => 'http://www.nbi.dk/HEP/CA/1f0e8352.0', crl => 'http://www.nbi.dk/HEP/CA/1f0e8352.r0', auth => ["/O=Grid/O=NorduGrid/*"] }, "cnrs-test" => { dis => "superseeded by Datagrid-fr", cert => "http://www.services.cnrs.fr/ca/cacnrs.pem", crl => "http://www.services.cnrs.fr/ca/NS/chargcrl_pem.cgi", auth => ["/*/OU=UREC/O=CNRS/C=FR","/*/OU=LPC/O=CNRS/C=FR", "/*/OU=DAPNIA/O=CEA/C=FR"] }, "cnrs-top" => { cert => "http://marianne.in2p3.fr/datagrid/wp6-fr/ca/cf4ba8c8.0", crl => 'http://igc.services.cnrs.fr/cgi-bin/loadcrl?CA=CNRS&format=PEM', auth => ["/C=FR/O=CNRS/CN=CNRS-Projets"] }, "cnrs-projets" => { cert => "http://marianne.in2p3.fr/datagrid/wp6-fr/ca/34a509c3.0", crl => 'http://igc.services.cnrs.fr/cgi-bin/loadcrl?CA=CNRS-Projets&format=PEM', auth => ["/C=FR/O=CNRS/CN=Datagrid-fr"] }, "cnrs-datagrid-fr" => { cert => "http://marianne.in2p3.fr/datagrid/wp6-fr/ca/6b4ddd18.0", crl => 'http://igc.services.cnrs.fr/cgi-bin/loadcrl?CA=Datagrid-fr&format=PEM', # Notice: namespace incomplete auth => ["/C=FR/O=CNRS/*","/C=FR/O=CEA/*"] }, "globus" => { dis => "distrusted due to local NIKHEF policy", auth => ["/C=us/O=Globus/*","/C=US/O=Globus/*","/O=Grid/O=Globus/*"] } );