-
Notifications
You must be signed in to change notification settings - Fork 0
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Create intermediate_ca_public_openssl.cnf
- Loading branch information
Showing
1 changed file
with
122 additions
and
0 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,122 @@ | ||
# OpenSSL Intermediate CA configuration file | ||
|
||
[ ca ] | ||
default_ca = CA_default | ||
|
||
[ CA_default ] | ||
# Directory and file locations. | ||
dir = /root/ca/intermediate/public | ||
certs = $dir/certs | ||
crl_dir = $dir/crl | ||
new_certs_dir = $dir/certs | ||
database = $dir/index.txt | ||
serial = $dir/serial | ||
RANDFILE = $dir/private/.rand | ||
|
||
# The root key and root certificate. | ||
private_key = $dir/private/ca-public.guardtone.key.pem | ||
certificate = $dir/certs/ca-public.guardtone.crt.pem | ||
|
||
# For certificate revocation lists. | ||
crlnumber = $dir/crlnumber | ||
crl = $dir/crl/revoked.crl.pem | ||
crl_extensions = crl_ext | ||
default_crl_days = 7 | ||
|
||
# SHA-1 is deprecated, so use SHA-2 or SHA-3 instead. | ||
default_md = sha384 | ||
name_opt = ca_default | ||
cert_opt = ca_default | ||
default_days = 3650 | ||
preserve = no | ||
policy = policy_loose | ||
|
||
[ policy_loose ] | ||
# Allow the intermediate CA to sign a more diverse range of certificates. | ||
# See the POLICY FORMAT section of the `ca` man page. | ||
countryName = optional | ||
stateOrProvinceName = optional | ||
localityName = optional | ||
organizationName = optional | ||
organizationalUnitName = optional | ||
commonName = supplied | ||
emailAddress = optional | ||
|
||
[ req ] | ||
# Options for the `req` tool (`man req`). | ||
default_bits = 4096 | ||
distinguished_name = req_distinguished_name | ||
string_mask = utf8only | ||
|
||
# SHA-1 is deprecated, so use SHA-2 or SHA-3 instead. | ||
default_md = sha384 | ||
|
||
# Extension to add when the -x509 option is used. | ||
x509_extensions = v3_intermediate_ca | ||
|
||
[ req_distinguished_name ] | ||
countryName = Country Name (2 letter code) | ||
stateOrProvinceName = State or Province Name | ||
localityName = Locality Name | ||
0.organizationName = Organization Name | ||
organizationalUnitName = Organizational Unit Name | ||
commonName = Common Name | ||
emailAddress = Email Address | ||
|
||
# Optionally, specify some defaults. | ||
countryName_default = US | ||
stateOrProvinceName_default = California | ||
localityName_default = Victorville | ||
0.organizationName_default = GuardTone | ||
organizationalUnitName_default = GuardTone Intermediate Public CA | ||
emailAddress_default = [email protected] | ||
|
||
[ v3_intermediate_ca ] | ||
# Extensions for a typical intermediate CA (`man x509v3_config`). | ||
subjectKeyIdentifier = hash | ||
authorityKeyIdentifier = keyid:always,issuer | ||
basicConstraints = critical, CA:true, pathlen:0 | ||
keyUsage = critical, digitalSignature, cRLSign, keyCertSign | ||
crlDistributionPoints = @crl_info | ||
authorityInfoAccess = @ocsp_info | ||
|
||
[ usr_cert ] | ||
# Extensions for client certificates (`man x509v3_config`). | ||
basicConstraints = CA:FALSE | ||
nsCertType = client, email | ||
nsComment = "GuardTone Generated Client Certificate" | ||
subjectKeyIdentifier = hash | ||
authorityKeyIdentifier = keyid,issuer | ||
keyUsage = critical, nonRepudiation, digitalSignature, keyEncipherment | ||
extendedKeyUsage = clientAuth, emailProtection | ||
|
||
[ server_cert ] | ||
# Extensions for server certificates (`man x509v3_config`). | ||
basicConstraints = CA:FALSE | ||
nsCertType = server | ||
nsComment = "GuardTone Generated Server Certificate" | ||
subjectKeyIdentifier = hash | ||
authorityKeyIdentifier = keyid,issuer:always | ||
keyUsage = critical, digitalSignature, keyEncipherment | ||
extendedKeyUsage = serverAuth | ||
crlDistributionPoints = @crl_info | ||
authorityInfoAccess = @ocsp_info | ||
|
||
[ crl_ext ] | ||
# Extension for CRLs (`man x509v3_config`). | ||
authorityKeyIdentifier=keyid:always | ||
|
||
[ ocsp ] | ||
# Extension for OCSP signing certificates (`man ocsp`). | ||
basicConstraints = CA:FALSE | ||
subjectKeyIdentifier = hash | ||
authorityKeyIdentifier = keyid,issuer | ||
keyUsage = critical, digitalSignature | ||
extendedKeyUsage = critical, OCSPSigning | ||
|
||
[crl_info] | ||
URI.0 = http://crl.ca-public.guardtone.com/guardtone-ca-public-revoked.crl | ||
|
||
[ocsp_info] | ||
caIssuers;URI.0 = http://ocsp.ca-public.guardtone.com/guardtone-ca-public.crt | ||
OCSP;URI.0 = http://ocsp.ca-public.guardtone.com/ |