We're trying to generate self signed certs and don't seem to keep the
attributes after a csr is signed by a self generated CA via openssl (i.e.: OIDs
specified in openssl.cfg drop off the server cert after signed, thus creating a
V1 cert).
Here is an example of the syntax I'm using:
Generate a CA Key:
openssl genrsa -out ca.key 1024
Generate a CA certificate with the previous key:
openssl req -new -x509 -days 3650 -key ca.key -out ca.crt
Generate a server certificate key:
openssl genrsa -out server.key 1024
Generate a certificate request with applying the server key as well:
openssl req -new -out server.csr -key server.key
Sign .csr with the CA cert & key:
openssl x509 -req -days 3650 -in server.csr -CA ca.crt -CAkey ca.key
-set_serial 01 -out server.crt
And the openssl.cfg is adding the OIDs correctly based on running: openssl req
-text -noout -in server.csr
Here is the important part that shows the attributes are attached to the
request:
Attributes:
Requested Extensions:
X509v3 Extended Key Usage:
TLS Web Server Authentication, TLS Web Client Authentication
X509v3 Basic Constraints:
CA:FALSE
X509v3 Key Usage:
Digital Signature, Non Repudiation, Key Encipherment
After signing it with the self-generated CA above, the server cert shows as a
Version 1 (V1) cert and does not show the "ServerAuth" & "Client Auth" in the
server cert.
Where did they go?
Thanks!
P.S. Here are some details of what I am using:
- Windows XP Professional
- openSSL 1.0.0.a 1 Jun 2010
- editing C:\OpenSSL-Win32\bin\openssl.cfg to apply OIDs or SubjectAltNames
(will approach later).
- Will use the certs for LDAP over SSL
______________________________________________________________________
OpenSSL Project http://www.openssl.org
User Support Mailing List [email protected]
Automated List Manager [email protected]