McAfee MEJCAE-AM-DA Product Guide - Page 93

CERT-DEPTH, Default Value, Notes, CHALLENGE-FD, CIPHER, CIPHERNUM

Page 93 highlights

Using the Configuration File Learning about the configuration file CERT-DEPTH The configuration parameter CERT-DEPTH identifies how many levels deep you can nest trusted introducers. (Trusted introducers are those people who you trust to certify-or validate-others' keys. If a trusted introducer certifies a key, it will appear valid on your public keyring.) Default Value CERT-DEPTH = 4 Notes For example, if CERT-DEPTH is set to 1, there can only be one layer of introducers below your own ultimately-trusted key. If that is the case, you are required to directly certify the public keys of all trusted introducers on your keyring. If you set CERT-DEPTH to zero, you could have no introducers at all, and you would have to directly certify each and every key on your public keyring to use it. The minimum CERT-DEPTH is 0; the maximum is 8. CHALLENGE-FD Use the CHALLENGE-FD option to specify a file descriptor for supplying the challenge passphrase used by Verisign for its certificate revocation process. This can also be set with --cert-attribute Challenge="...". However, specifying the Challenge attribute on the shell command-line could reveal the challenge passphrase to other users on the system. The --challenge-fd option provides a more secure method of delivering the passphrase to E-Business Server. Set the CHALLENGE-FD parameter equal to a file descriptor number. For shell scripts, use the redirection syntax described under PASSPHRASE-FD. Note that API programs can send passphrases via its "command line" argument with the same safety as storing the passphrase in the program's memory space. CIPHER Specifies which symmetric cipher E-Business Server should use to encrypt the session key-IDEA, Triple-DES, CAST, AES, or Twofish. This parameter specifies the cipher preference when generating a new key pair, when changing the self-signature or passphrase on your private key, and when performing a conventional encryption operation, except when you are creating an SDA or PGParchive, which always use CAST5. Note: This setting is ignored when generating RSA Legacy keys. RSA Legacy keys always use the IDEA cipher. Default Value CIPHER = IDEA Your options are: • IDEA • 3DES • CAST5 • AES128 • AES192 • AES256 • Twofish CIPHERNUM The CIPHERNUM parameter is only supported for compatibility purposes. Unless you are running in legacy mode, a warning appears if your configuration file contains this setting. Use the CIPHER parameter instead. For more information, see CIPHER on page 91. 91 E-Business Server™ 8.6 Product Guide

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188

91
E-Business Server
8.6
Product Guide
Using the Configuration File
Learning about the configuration file
CERT-DEPTH
The configuration parameter
CERT-DEPTH
identifies how many levels deep you can nest trusted introducers.
(Trusted introducers are those people who you trust to certify—or validate—others’ keys. If a trusted
introducer certifies a key, it will appear valid on your public keyring.)
Default Value
CERT-DEPTH = 4
Notes
For example, if
CERT-DEPTH
is set to
1
, there can only be one layer of introducers below your own
ultimately-trusted key. If that is the case, you are required to directly certify the public keys of all trusted
introducers on your keyring. If you set
CERT-DEPTH
to zero, you could have no introducers at all, and you
would have to directly certify each and every key on your public keyring to use it.
The minimum
CERT-DEPTH
is
0
;
the maximum is
8
.
CHALLENGE-FD
Use the
CHALLENGE-FD
option to specify a file descriptor for supplying the challenge passphrase used by
Verisign for its certificate revocation process. This can also be set with
--cert-attribute Challenge=”...”
.
However, specifying the Challenge attribute on the shell command-line could reveal the challenge
passphrase to other users on the system. The
--challenge-fd
option provides a more secure method of
delivering the passphrase to E-Business Server. Set the
CHALLENGE-FD
parameter equal to a file descriptor
number.
For shell scripts, use the redirection syntax described under
PASSPHRASE-FD
.
Note that API programs can send passphrases via its “command line” argument with the same safety as
storing the passphrase in the program's memory space.
CIPHER
Specifies which symmetric cipher E-Business Server should use to encrypt the session key—IDEA,
Triple-DES, CAST, AES, or Twofish.
This parameter specifies the cipher preference when generating a new key pair, when changing the
self-signature or passphrase on your private key, and when performing a conventional encryption operation,
except when you are creating an SDA or PGParchive, which always use CAST5.
Note:
This setting is ignored when generating RSA Legacy keys. RSA Legacy keys always use the IDEA cipher.
Default Value
CIPHER = IDEA
Your options are:
• IDEA
• 3DES
• CAST5
• AES128
• AES192
• AES256
• Twofish
CIPHERNUM
The
CIPHERNUM
parameter is only supported for compatibility purposes. Unless you are running in legacy
mode, a warning appears if your configuration file contains this setting. Use the
CIPHER
parameter instead.
For more information, see
CIPHER
on page 91
.