OK, then how do I re-issue my root CA certificate with my already existing ca.key ?
If I could have a sample commande line for openssl it would help me .
something like

OPENSSL x509 -set_serial $SERIAL -clrext -extfile CA-EXTENSION.prm -days $DURATION -CA $CAPREFIX-ca.cacert -CAkey $CAPREFIX-ca.key -in $PREFIX-ca.crt -out $PREFIX-ca.der -outform der -sha256

OK, I will coorect these extensions with  an appropiate openssl.cnf ,
but I don't understand why there shouldn't be a certificatePolicy section in my master root_CA !?
because it is ignored anyway in a trust anchor. A policy document specifies
mainly what you may put into end entity certificates that are created under a PC
(and maybe what a certifying CA for your CA may put into a CA cert)
If you put it into intermediate CAs, they are filters indicating what that
CA can create, whether this is actually tested is still another story.

I though that it was "mandatory", meaning that it points to the place where our PKI policy is defined .
Depending on what specification? You probably may want to put it into end entities. It does not hurt (much). Whether you want to put filters into CA certificates, is another
story.

For oid 1.1.1.1.1, years ago we did reserved a IANA oid number (1.3.6.1.4.1.7391 ) we used 7391.2 for ldap, 7391.1 for snmp, is there a recommandation for certificates or 7391.3 would be fine ?
As long as "you" own 7391, you organise the name space as you like and there is no
(technical) semantics related to such a hierarchie.

______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to