tor-gencert (1) - Linux Man Pages
tor-gencert: Generate certs and keys for Tor directory authorities
tor-gencert - Generate certs and keys for Tor directory authorities
tor-gencert generates certificates and private keys for use by Tor directory authorities running the v3 Tor directory protocol, as used by Tor 0.2.0 and later. If you are not running a directory authority, you don't need to use tor-gencert.
Every directory authority has a long term authority identity key (which is distinct from the identity key it uses as a Tor server); this key should be kept offline in a secure location. It is used to certify shorter-lived signing keys, which are kept online and used by the directory authority to sign votes and consensus documents.
- Display verbose output.
-h or --help
- Display help text and exit.
-r or --reuse
- Generate a new certificate, but not a new signing key. This can be used to change the address or lifetime associated with a given key.
- Generate a new identity key. You should only use this option the first time you run tor-gencert; in the future, you should use the identity key that's already there.
- Read the identity key from the specified file. If the file is not present and --create-identity-key is provided, create the identity key in the specified file. Default: "./authority_identity_key"
- Write the signing key to the specified file. Default: "./authority_signing_key"
- Write the certificate to the specified file. Default: "./authority_certificate"
- Number of months that the certificate should be valid. Default: 12.
- Filedescriptor to read the passphrase from. Ends at the first NUL or newline. Default: read from the terminal.
- If provided, advertise the address:port combination as this authority's preferred directory port in its certificate. If the address is a hostname, the hostname is resolved to an IP before it's published.
Roger Dingledine <arma [at] mit.edu>, Nick Mathewson <nickm [at] alum.mit.edu>.