Thanks for the feedback, to summarise:

What I want to achieve is a sub-ca that can sign certs for .mydomain.com
but not outside that domain - so for example it cannot sign for
www.mybank.com. I have a moderately controlled environment and can
specify things like minimum browser versions.

It's possible to include a nameConstraint in the sub-ca cert on dnsName
(subjectAltName) for .mydomain.com - this will match
anything.mydomain.com but not www.mybank.com. This is the desired
behaviour but it can be subverted by putting CN=www.mybank.com in the
dirName and not using subjectAltName.

>From the feedback received
1. It seems it's not possible to specify a wildcard in restrictions on CN
2. Many environments (browsers) do not check nameConstraints properly,
if at all.

Is there a way to force the absence of CN and use dnsName, for example
is it possible to specify constraints on *both* dirName and
subjectAltName (dnsName in this case) in the same sub-ca cert, for
example dirName=/DC=com/DC=mydomain *and* dnsName=.mydomain.com ? If
this is possible, will it prevent the use of CN in dirName ?

in other words, something like this (allowing that my syntax is almost
certainly broken )

[ subca_ext ]
nameConstraints = permitted;DNS:.mydomain.com
nameConstraints = permitted;dirName:mydirname

[ mydirname ]
DC=com
1.DC=mydomain

as I have it, I can include either one but not both of the
nameConstraints lines and get a cert with the specified constraint.

any ideas or am I out of luck here ?

thanks
stephen


______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to