|
@@ -0,0 +1,115 @@
|
|
|
+[ ca ]
|
|
|
+default_ca = CA_default
|
|
|
+
|
|
|
+[ CA_default ]
|
|
|
+dir = DIRECTORY
|
|
|
+certs = $dir/certs
|
|
|
+crl_dir = $dir/crl
|
|
|
+new_certs_dir = $dir/certs
|
|
|
+database = $dir/index.txt
|
|
|
+serial = $dir/serial
|
|
|
+RANDFILE = $dir/certs/.rand
|
|
|
+private_key = $dir/certs/caroot.key
|
|
|
+certificate = $dir/certs/caroot.pem
|
|
|
+crlnumber = $dir/crlnumber
|
|
|
+crl = $dir/crl/ecdsaroot.crl
|
|
|
+crl_extensions = crl_ext
|
|
|
+default_crl_days = 3650
|
|
|
+default_md = sha384
|
|
|
+name_opt = ca_default
|
|
|
+cert_opt = ca_default
|
|
|
+default_days = 3650
|
|
|
+preserve = no
|
|
|
+policy = policy_strict
|
|
|
+
|
|
|
+[ policy_strict ]
|
|
|
+countryName = match
|
|
|
+stateOrProvinceName = match
|
|
|
+organizationName = match
|
|
|
+organizationalUnitName = optional
|
|
|
+commonName = supplied
|
|
|
+
|
|
|
+[ policy_loose ]
|
|
|
+countryName = optional
|
|
|
+stateOrProvinceName = optional
|
|
|
+localityName = optional
|
|
|
+organizationName = optional
|
|
|
+organizationalUnitName = optional
|
|
|
+commonName = supplied
|
|
|
+
|
|
|
+[ req ]
|
|
|
+default_bits = 2048
|
|
|
+distinguished_name = req_distinguished_name
|
|
|
+string_mask = utf8only
|
|
|
+default_md = sha384
|
|
|
+x509_extensions = v3_ca
|
|
|
+
|
|
|
+[ req_distinguished_name ]
|
|
|
+countryName = Country Name (2 letter code)
|
|
|
+stateOrProvinceName = State or Province Name
|
|
|
+localityName = Locality Name
|
|
|
+0.organizationName = Organization Name
|
|
|
+organizationalUnitName = Organizational Unit Name
|
|
|
+commonName = Common Name
|
|
|
+commonName_default = CA
|
|
|
+countryName_default = UA
|
|
|
+stateOrProvinceName_default = Kyiv
|
|
|
+localityName_default = Kyiv
|
|
|
+0.organizationName_default = SYNRC
|
|
|
+organizationalUnitName_default = HQ
|
|
|
+
|
|
|
+[ v3_ca ]
|
|
|
+subjectKeyIdentifier = hash
|
|
|
+authorityKeyIdentifier = keyid:always,issuer
|
|
|
+basicConstraints = critical, CA:true
|
|
|
+keyUsage = critical, digitalSignature, cRLSign, keyCertSign
|
|
|
+
|
|
|
+[ v3_intermediate_ca ]
|
|
|
+subjectKeyIdentifier = hash
|
|
|
+authorityKeyIdentifier = keyid:always,issuer
|
|
|
+basicConstraints = critical, CA:true, pathlen:0
|
|
|
+keyUsage = critical, digitalSignature, cRLSign, keyCertSign
|
|
|
+crlDistributionPoints = @crl_info
|
|
|
+authorityInfoAccess = @ocsp_info
|
|
|
+
|
|
|
+[ usr_cert ]
|
|
|
+basicConstraints = CA:FALSE
|
|
|
+nsCertType = client, email
|
|
|
+nsComment = "Synrc Client Certificate"
|
|
|
+subjectKeyIdentifier = hash
|
|
|
+authorityKeyIdentifier = keyid,issuer
|
|
|
+keyUsage = critical, nonRepudiation, digitalSignature, keyEncipherment
|
|
|
+extendedKeyUsage = clientAuth, emailProtection
|
|
|
+subjectAltName = @alt_names
|
|
|
+
|
|
|
+[ server_cert ]
|
|
|
+basicConstraints = CA:FALSE
|
|
|
+nsCertType = server
|
|
|
+nsComment = "Synrc Server Certificate"
|
|
|
+subjectKeyIdentifier = hash
|
|
|
+authorityKeyIdentifier = keyid,issuer:always
|
|
|
+keyUsage = critical, digitalSignature, keyEncipherment
|
|
|
+extendedKeyUsage = serverAuth
|
|
|
+crlDistributionPoints = @crl_info
|
|
|
+authorityInfoAccess = @ocsp_info
|
|
|
+subjectAltName = @alt_names
|
|
|
+
|
|
|
+[alt_names]
|
|
|
+DNS.0 = localhost
|
|
|
+
|
|
|
+[ crl_ext ]
|
|
|
+authorityKeyIdentifier=keyid:always
|
|
|
+
|
|
|
+[ ocsp ]
|
|
|
+basicConstraints = CA:FALSE
|
|
|
+subjectKeyIdentifier = hash
|
|
|
+authorityKeyIdentifier = keyid,issuer
|
|
|
+keyUsage = critical, digitalSignature
|
|
|
+extendedKeyUsage = critical, OCSPSigning
|
|
|
+
|
|
|
+[crl_info]
|
|
|
+URI.0 = http://crl.n2o.dev:8081/ecdsaroot.crl
|
|
|
+
|
|
|
+[ocsp_info]
|
|
|
+caIssuers;URI.0 = http://crl.n2o.dev:8081/ecdsaroot.crt
|
|
|
+OCSP;URI.0 = http://ocsp.n2o.dev:8081/
|