Bodo Moeller wrote:

> > Do you prefer the patch against the pre-patched version or against the
> > patched version of the ca.pod file ?
> 
> I'd prefer one for the patched version (but it shouldn't really matter
> if you use a context or unified diff).

Here it is. I think it should be "error" free, anyway if you have time check
it before submission (:-D).

> I don't think anyone has plans for that currently.  If large-impact
> changes are needed, this should be discussed on openssl-dev.

Yes, I know. I have to check. Some work could be initially done by
introducing another switch (and conf keyword) to enable/disable the
usage of the index.txt backend during certificate issuing --> this
would enable using ca command with "unsupported" certificate profiles
(such as duplicate DNs).

Then, with patience, it should be a good thing starting a rewriting of
the backend db support ... and then, only then, we could start adding
new RFCs supported certificate profiles... This is a quite big work
to be done and I am not sure it can be done without backward
compatibility issues rising...

Another idea worth exploring could be the writing of a libca where ca
functions are held but I am not sure this is the scope of the openssl
project... anyway as this is strictly tied with openssl library itself
it could be useful having it together with the package.

I will forward this e-mail to the openssl-dev mailing list also to get
the feeling about all this stuff.

-- 

C'you,

        Massimiliano Pala

--o-------------------------------------------------------------------------
Massimiliano Pala [OpenCA Project Manager]                  [EMAIL PROTECTED]
                                                          [EMAIL PROTECTED]
                                                     [EMAIL PROTECTED]
http://www.openca.org                            Tel.:   +39 (0)59  270  094
http://openca.sourceforge.net                    Mobile: +39 (0)347 7222 365
--- ca.pod      Mon Oct 22 19:20:50 2001
+++ ca.pod.new  Mon Oct 22 19:20:25 2001
@@ -34,6 +34,7 @@
 [B<-spkac file>]
 [B<-ss_cert file>]
 [B<-preserveDN>]
+[B<-noemailDN>]
 [B<-batch>]
 [B<-msie_hack>]
 [B<-extensions section>]
@@ -157,6 +158,16 @@
 older IE enrollment control which would only accept certificates if their
 DNs match the order of the request. This is not needed for Xenroll.
 
+=item B<-noemailDN>
+
+The DN of a certificate can contain the EMAIL field if present in the
+request DN, however it is good policy just having the e-mail set into
+the altName extension of the certificate. When this option is set the
+EMAIL field is removed from the certificate' subject and set only in
+the, eventually present, extensions. The B<email_in_dn> keyword can be
+used in the configuration file to enable this behaviour.
+
+=item B<-batch>
 =item B<-batch>
 
 this sets the batch mode. In this mode no questions will be asked
@@ -437,6 +448,7 @@
  default_md     = md5                   # md to use
 
  policy         = policy_any            # default policy
+ email_in_dn    = no                    # Don't add the email into cert DN
 
  nameopt       = default_ca            # Subject name display option
  certopt       = default_ca            # Certificate display option
@@ -518,8 +530,11 @@
 B<CA.pl> help a little but not very much.
 
 Any fields in a request that are not present in a policy are silently
-deleted. This does not happen if the B<-preserveDN> option is used.
-The behaviour should be more friendly and configurable.
+deleted. This does not happen if the B<-preserveDN> option is used. To
+enforce the absence of the EMAIL field within the DN, as suggested by
+RFCs, regardless the contents of the request' subject the B<-noemailDN>
+option can be used. The behaviour should be more friendly and
+configurable.
 
 Cancelling some commands by refusing to certify a certificate can
 create an empty file.

S/MIME Cryptographic Signature

Reply via email to