[Date Prev][Date Next] [Chronological] [Thread] [Top]

Any problems with X.509v3 Extensions?



All:

Does anyone know of any known-problems with OpenLDAP server/client-side certificates signed with X509 v3 Extensions?

e.g.,

$ openssl x509 -text -in interface.crt.pem

        X509v3 extensions:
            X509v3 Subject Alternative Name:
                email:ldap@tld
            Netscape Cert Type:
                SSL Server, S/MIME, Object Signing
            X509v3 Extended Key Usage:
                TLS Web Server Authentication


With openssl.cnf:

  [ v3_req_ext ]
 subjectAltName=email:copy
 nsCertType = server, email, objsign
 nsComment = "OpenSSL Generated Server Certificate"
 # .2 = Client, .1 = Server
 #extendedKeyUsage = 1.3.6.1.5.5.7.3.2
 extendedKeyUsage = 1.3.6.1.5.5.7.3.1

This is the way Godaddy rocks out.

Every year I go through suffer through hours of self abnegation trying to re-issue certificates for a dozen F/OSS applications that all have little caveats --- This year I'm writing that shit down >:}

~BAS