Provided by: voms-clients_2.1.2-1_amd64 bug

NAME

       voms-proxy-fake - create a proxy with VOMS extensions

SYNOPSIS


       voms-proxy-fake [options]

DESCRIPTION

       The voms-proxy-fake generates a proxy containing arbitrary attributes without contacting the VOMS server.

OPTIONS

       Options may be specified indifferently with either a "-" or "--" prefix.

       -help Displays usage.

       -version Displays version.

       -debug Enables extra debug output.

       -q Quiet mode, minimal output.

       -verify Verifies certificate to make proxy for.

       -pwstdin Allows passphrase from stdin.

       -limited Creates a limited proxy.

       -hours H Proxy is valid for H hours (default:12).

       -vomslife H Tries to get an AC with information valid for H hours. The default is "as long as the proxy
       certificate". The special value 0 means as long as the server will allow.

       -bits B Number of bits in key {0|512|1024|2048|4096}. 0 is a special value which means: same number of
       bits as in the issuing certificate.

       -cert certfile Non-standard location of user certificate

       -key keyfile Non-standard location of user key

       -certdir certdir Location of trusted certificates dir

       -out proxyfile Location of new proxy cert

       -voms voms[:command] Specifies the fake VOMS server that will appear in the attribute certificate.
       command is ignored and is present for compatibility with voms-proxy-init.

       -include file Includes file in the certificate (in a non critical extension)

       -conf file Read options from file.

       -policy The file containing the policy expression.

       -policy-language pl The language in which the policy is expressed. Default is IMPERSONATION_PROXY.

       -path-length Maximum depth of proxy certfificate that can be signed from this.

       -globus version This option is obsolete and only present for backwards compatibility with old
       installations. Currently, its value is ignored.

       -proxyver Version of the proxy certificate to create. May be 2 or 3. Default value is decided upon
       underlying globus version.

       -separate file Saves the voms credential on file file.

       -hostcert file The cert that will be used to sign the AC.

       -hostkey file The key thet will be used to sign the AC.

       -fqan file The string that will be included in the AC as the granted FQAN.

       -newformat

       This forces the server to generate ACs in the new (correct) format. This is meant as a compatibility
       feature to ease migration while the servers upgrade to the new version.

       -newsubject newdn

       The created proxy will have newdn as subject rather than what is would normally have depending on the
       specific version of proxy created. Non-printable characters may be specified via the '\XX' encoding,
       where XX are two hexadecimal characters.

       -newissuer newdn

       The created proxy will have newdn as issuer rather than what is would normally have depending on the
       specific version of proxy created. Non-printable characters may be specified via the '\XX' encoding,
       where XX are two hexadecimal characters.

       -newserial newserial

       The created proxy will have the newserial as its serial number. The new serial number will have to be
       specified as an hex representation. Any length is possible. If this option is not specified,
       voms-proxy-fake will choose the serial number.

       -pastac timespec

       The created AC will have its validity start in the past, as specified by timespec.

       The format of timespec is one of: seconds, hours:minutes, hours:minutes:seconds

       -pastproxy timespec

       The created proxy will have its validity start in the past as specified by timespec

       The format of timespec is one of: seconds, hours:minutes, hours:minutes:seconds

       -nscert bit,...,bit

       The created proxy will have the specified bits in the Netscape Certificate Extension. Acceptable values
       for bit are: client, server, email, objsign, sslCA, emailCA, objCA. The default value is not to have this
       extension.

       -extkeyusage bit,...,bit

       The created proxy will have the specified bits in the Extended Key Usage Extension. Acceptable values for
       bit are: serverAuth, clientAuth, codeSigning, emailProtection, timeStamping, msCodeInd, msCodeCom,
       msCTLSign, msSGC, msEFS, nsSGC, deltaCRL. The default value is not to have this extensions.

       -keyusage bit,...,bit

       The created proxy will have the specified bits in the Key Usage Extensions. Acceptable values for bit
       are: digitalSignature, nonRepudiation, keyEncipherment, dataEncipherment, keyAgreement, keyCertSign,
       cRLSign, encipherOnly, decipherOnly. The default value is to copy this extensions from the issuer
       certificate while removing the keyCertSign and nonRepudiation bits if present.

       -selfsigned

       The created certificate will be a self-signed certificate and have a CA=true bit in the Basic constraints
       Exception.

       -extension oid[/criticality]value

       This option allows one to specify additional extensions to be put in the created certificate.

       oid is the Object Identifier of the extensions. Any OID may be used even if it is not already known in
       advance. This must always be specified. There is no default.

       criticality specifies whether the extensions is critical or not, and it must be either true or false. If
       absent, it defaults to false.

       value is the value of the extensions. It is composed by two subfields, type and content.  type is a
       single character, and specifies how the content is interpreted. ':' means that content is a text string
       to be included as is. '~' means that content is an hex representation of the string. '+' means that
       content is the name of a file which will contain the actual data.

       -acextension oid[/criticality]value

       This option allows one to specify additional extensions to be put in the created attribute certificate.

       oid is the Object Identifier of the extensions. Any OID may be used even if it is not already known in
       advance. This must always be specified. There is no default.

       criticality specifies whether the extensions is critical or not, and it must be either true or false. If
       absent, it defaults to false.

       value is the value of the extensions. It is composed by two subfields, type and content.  type is a
       single character, and specifies how the content is interpreted. ':' means that content is a text string
       to be included as is. '~' means that content is an hex representation of the string. '+' means that
       content is the name of a file which will contain the actual data.

       -ga id = value [(qualifier)]

       This option adds the generic attribute specified to the AC generated. Please note that spaces before and
       after the '=' char are swallowed in the command line.

       -voinfo file

       The file file contains information for additional ACs that should be included in the created proxy. ACs
       specified via the -voinfo option shall be added before ACs specified via the command line options.

       The format of the file is the following:

       [voname]

       parameter=value

       parameter=value

       ...

BUGS

       EGEE Bug Tracking Tool[1]

SEE ALSO

       voms-proxy-fake(1), voms-proxy-init(1), voms-proxy-info(1), voms-proxy-destroy(1)

       EDT Auth Home page[2]

       CVSweb[3]

       RPM repository[4]

AUTHORS

       Vincenzo Ciaschini <Vincenzo.Ciaschini@cnaf.infn.it>.

       Valerio Venturi <Valerio.Venturi@cnaf.infn.it>.

COPYRIGHT

       Copyright (c) Members of the EGEE Collaboration. 2004. See the beneficiaries list for details on the
       copyright holders.

       Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in
       compliance with the License. You may obtain a copy of the License at

       www.apache.org/licenses/LICENSE-2.0[5]

       Unless required by applicable law or agreed to in writing, software distributed under the License is
       distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
       See the License for the specific language governing permissions and limitations under the License.

NOTES

        1. EGEE Bug Tracking Tool
           https://savannah.cern.ch/projects/jra1mdw/

        2. EDT Auth Home page
           http://grid-auth.infn.it

        3. CVSweb
           http://datagrid.in2p3.fr/cgi-bin/cvsweb.cgi/Auth/voms

        4. RPM repository
           http://datagrid.in2p3.fr/distribution/autobuild/i386-rh7.3

        5. www.apache.org/licenses/LICENSE-2.0
           http://www.apache.org/licenses/LICENSE-2.0

VOMS Client                                        05/03/2021                                 VOMS-PROXY-FAKE(1)