aboutsummaryrefslogtreecommitdiffstats
path: root/apps/openssl.cnf
diff options
context:
space:
mode:
authorDr. Stephen Henson <steve@openssl.org>1999-01-26 01:19:27 +0000
committerDr. Stephen Henson <steve@openssl.org>1999-01-26 01:19:27 +0000
commitb2347661cef9447600a77b33575639a1bce6725c (patch)
tree56dbb23fefbbebf16d4688dcff503a773c190cb5 /apps/openssl.cnf
parentfd9d35f56ea8bf2dcf2befee06cb6584d62e91e5 (diff)
downloadopenssl-b2347661cef9447600a77b33575639a1bce6725c.tar.gz
Still more X509 V3 stuff. Modify ca.c to work with the new code and modify
openssl.cnf for the new syntax.
Diffstat (limited to 'apps/openssl.cnf')
-rw-r--r--apps/openssl.cnf47
1 files changed, 36 insertions, 11 deletions
diff --git a/apps/openssl.cnf b/apps/openssl.cnf
index fbc328fad4..27abc08bad 100644
--- a/apps/openssl.cnf
+++ b/apps/openssl.cnf
@@ -25,7 +25,7 @@ crl = $dir/crl.pem # The current CRL
private_key = $dir/private/cakey.pem# The private key
RANDFILE = $dir/private/.rand # private random number file
-x509_extensions = x509v3_extensions # The extentions to add to the cert
+x509_extensions = usr_cert # The extentions to add to the cert
default_days = 365 # how long to certify for
default_crl_days= 30 # how long before next CRL
default_md = md5 # which md to use.
@@ -63,7 +63,7 @@ default_bits = 1024
default_keyfile = privkey.pem
distinguished_name = req_distinguished_name
attributes = req_attributes
-x509_extensions = v3_ca # The extentions to add to the cert
+x509_extensions = v3_ca # The extentions to add to the self signed cert
[ req_distinguished_name ]
countryName = Country Name (2 letter code)
@@ -101,28 +101,53 @@ challengePassword_max = 20
unstructuredName = An optional company name
-[ x509v3_extensions ]
+[ usr_cert ]
-nsCaRevocationUrl = http://www.domain.dom/ca-crl.pem
-nsComment = "This is a comment"
+# These extensions are added when 'ca' signs a request.
-# under ASN.1, the 0 bit would be encoded as 80
-nsCertType = 0x40
+# This goes against PKIX guidelines but some CAs do it and some software
+# requires this to avoid interpreting an end user certificate as a CA.
+basicConstraints=CA:FALSE
+
+# Here are some examples of the usage of nsCertType. If it is omitted
+# the certificate can be used for anything *except* object signing.
+
+# This is OK for an SSL server.
+#nsCertType = server
+
+# For an object signing certificate this would be used.
+#nsCertType = objsign
+
+# For normal client use this is typical
+#nsCertType = client, email
+
+# This is typical also
+
+keyUsage = nonRepudiation, digitalSignature, keyEncipherment
+
+nsComment = "OpenSSL Generated Certificate"
+
+#nsCaRevocationUrl = http://www.domain.dom/ca-crl.pem
#nsBaseUrl
#nsRevocationUrl
#nsRenewalUrl
#nsCaPolicyUrl
#nsSslServerName
-#nsCertSequence
-#nsCertExt
-#nsDataType
[ v3_ca]
# Extensions for a typical CA
+# It's a CA certificate
basicConstraints = CA:true
-keyUsage = cRLSign, keyCertSign
+# This is what PKIX recommends but some broken software chokes on critical
+# extensions.
+#basicConstraints = critical,CA:true
+
+# Key usage: again this should really be critical.
+keyUsage = cRLSign, keyCertSign
+# Some might want this also
+#nsCertType = sslCA, emailCA