Hello, 

We're trying to generate self signed certs and don't seem to keep the 
attributes after a csr is signed by a self generated CA via openssl (i.e.: OIDs 
specified in openssl.cfg drop off the server cert after signed, thus creating a 
V1 cert).  

Here is an example of the syntax I'm using:  
Generate a CA Key: 
openssl genrsa -out ca.key 1024

Generate a CA certificate with the previous key: 
openssl req -new -x509 -days 3650 -key ca.key -out ca.crt

Generate a server certificate key:  
openssl genrsa -out server.key 1024

Generate a certificate request with applying the server key as well: 
openssl req -new -out server.csr -key server.key

Sign .csr with the CA cert & key:  
openssl x509 -req -days 3650 -in server.csr -CA ca.crt -CAkey ca.key 
-set_serial 01 -out server.crt


And the openssl.cfg is adding the OIDs correctly based on running:  openssl req 
-text -noout -in server.csr
Here is the important part that shows the attributes are attached to the 
request:  
        Attributes:
        Requested Extensions:
            X509v3 Extended Key Usage:
                TLS Web Server Authentication, TLS Web Client Authentication
            X509v3 Basic Constraints:
                CA:FALSE
            X509v3 Key Usage:
                Digital Signature, Non Repudiation, Key Encipherment

After signing it with the self-generated CA above, the server cert shows as a 
Version 1 (V1) cert and does not show the "ServerAuth" & "Client Auth" in the 
server cert. 
Where did they go?  

Thanks!

P.S.  Here are some details of what I am using:  
-  Windows XP Professional
-  openSSL 1.0.0.a 1 Jun 2010
-  editing C:\OpenSSL-Win32\bin\openssl.cfg to apply OIDs or SubjectAltNames 
(will approach later).  
-  Will use the certs for LDAP over SSL
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to