[rs-commit] r269 - /rs-manual/trunk/src/site/xhtml5/mod/mod_timestamp.xhtml5
rs-commit at redwax.eu
rs-commit at redwax.eu
Sun Feb 9 23:31:05 CET 2020
Author: minfrin at redwax.eu
Date: Sun Feb 9 23:31:03 2020
New Revision: 269
Log:
Move paramgraphs into the content div.
Modified:
rs-manual/trunk/src/site/xhtml5/mod/mod_timestamp.xhtml5
Modified: rs-manual/trunk/src/site/xhtml5/mod/mod_timestamp.xhtml5
==============================================================================
--- rs-manual/trunk/src/site/xhtml5/mod/mod_timestamp.xhtml5 (original)
+++ rs-manual/trunk/src/site/xhtml5/mod/mod_timestamp.xhtml5 Sun Feb 9 23:31:03 2020
@@ -237,36 +237,36 @@
</IfModule>
]]></code>
</pre>
- </div>
- <p>Client implementations for RFC3160 can be found for most languages; and some applications have these build in (in that case -the URI to enter for the above examples would be <code>https://fqdn.com/timestamp</code>.</p>
- <p> It is also possible to use OpenSSL its build in <code>ts</code> utility; an example is show below; where a file caled <code>my-novel.doc</code> is timestamped (any binary file will do).</p>
- <ol>
- <li> First create a signing request for the file. What actually gets signed is the SHA256 (specified by the <code>-cert</code> flag).
-
- <pre><code><![CDATA[
+ <p>Client implementations for RFC3160 can be found for most languages; and some applications have these build in (in that case -the URI to enter for the above examples would be <code>https://fqdn.com/timestamp</code>.</p>
+ <p> It is also possible to use OpenSSL its build in <code>ts</code> utility; an example is show below; where a file caled <code>my-novel.doc</code> is timestamped (any binary file will do).</p>
+ <ol>
+ <li> First create a signing request for the file. What actually gets signed is the SHA256 (specified by the <code>-cert</code> flag).
+
+ <pre><code><![CDATA[
openssl ts -query -data my-novel.doc -cert -sha256 -no_nonce -out request.tsq
]]></code></pre></li>
- <li> Then offer this to the signing server (assumed here to run localhost); as an HTTP POST request with the right content type. The reply is signed receipt (in binary, DER, format).
- <pre><code><![CDATA[
+ <li> Then offer this to the signing server (assumed here to run localhost); as an HTTP POST request with the right content type. The reply is signed receipt (in binary, DER, format).
+ <pre><code><![CDATA[
curl -H Content-type:application/timestamp-query --data-binary @request.tsq http://127.0.0.1/timestamp > reply.tsq
]]></code></pre></li>
- <li> You can now dump the content of this reply;
- <pre><code><![CDATA[
+ <li> You can now dump the content of this reply;
+ <pre><code><![CDATA[
openssl ts -reply -text -in reply.tsq
openssl asn1parse -inform DER -in reply.tsq
]]></code></pre>
- <p>or, better, verify it against the timestamp certificate (or, with the chain, against any of the higher CA certificates as the root):</p>
-
- <pre><code><![CDATA[
+ <p>or, better, verify it against the timestamp certificate (or, with the chain, against any of the higher CA certificates as the root):</p>
+
+ <pre><code><![CDATA[
openssl ts -verify -in reqply.tsq -data my-novel.doc -CAfile /etc/pki/ssl/timestamp.cert
]]></code></pre>
- <p>Note: As we dit not set a 'nonce' in step 1 - we did not get one back (which you can use to verify against the one in the request). And in this particular case - we get a random `serial' number set by the time server (As we set <code>CASimpleSerialRandom</code> to <code>on</code> in the servr configuration).</p>
-
- <p>In this case - we simply use the certificate set in the configuration file of the signing timeserver (by <code>TimestampSigningCertificate</code>) to verify. So we have no chain issues.</p>
- </li>
- </ol>
+ <p>Note: As we dit not set a 'nonce' in step 1 - we did not get one back (which you can use to verify against the one in the request). And in this particular case - we get a random `serial' number set by the time server (As we set <code>CASimpleSerialRandom</code> to <code>on</code> in the servr configuration).</p>
+
+ <p>In this case - we simply use the certificate set in the configuration file of the signing timeserver (by <code>TimestampSigningCertificate</code>) to verify. So we have no chain issues.</p>
+ </li>
+ </ol>
+ </div>
</section>
</div>
</div>
More information about the rs-commit
mailing list