Michael wrote:
>
> >
> > In general there are very few extensions that need to be set. A bare
> > minimum would be just basicConstraints. As the documentation says
> > you should have CA:TRUE for CA certificates and CA:FALSE for end
> > user certificates. Thats enough for almost all purposes: its only
> > when you want to restrict the usage of the certificates that the
> > other extensions need to be set.
> >
> > I can include a "typical values" section in the main documentation
> > if that would help.
> >
> That would help a lot. What do you do with CA: for a server cert.
> Presumeabley it would be FALSE. And.... what are the various
> combinations for keyUseage for CA, server, end user
>
Well CA:TRUE is for a CA certificate. Setting CA:FALSE means that it
cannot be used as a CA certificate, so typically user (this includes
server) certificates have CA:FALSE. Most software will tolerate CA:TRUE
in end user certificates but you don't want to give a user a certificate
which effectively gives them their own CA!
keyUsage you can leave out if you wish: this means it can be used for
anything that basicConstraints will allow.
Otherwise for a CA:
keyUsage=keyCertSign,cRLSign
For a normal end user certificate:
keyUsage = nonRepudiation, digitalSignature, keyEncipherment
Netscape documents suggest that an SSL server can have:
keyUsage = keyEncipherment
but I suppose
keyUsage = digitalSignature, keyEncipherment
is more correct.
Other things can be done as well, for example:
keyUsage = nonRepudiation, digitalSignature
in an S/MIME certificate can be used for signing only and not
encryption: provided the S/MIME client is clever enough.
Steve.
--
Dr Stephen N. Henson. http://www.drh-consultancy.demon.co.uk/
Personal Email: [EMAIL PROTECTED]
Senior crypto engineer, Celo Communications: http://www.celocom.com/
Core developer of the OpenSSL project: http://www.openssl.org/
Business Email: [EMAIL PROTECTED] PGP key: via homepage.
______________________________________________________________________
OpenSSL Project http://www.openssl.org
User Support Mailing List [EMAIL PROTECTED]
Automated List Manager [EMAIL PROTECTED]