Blame | Last modification | View Log | RSS feed
# For use with Easy-RSA 3.0+ and OpenSSL or LibreSSL####################################################################[ ca ]default_ca = CA_default # The default ca section####################################################################[ CA_default ]dir = $ENV::EASYRSA_PKI # Where everything is keptcerts = $dir # Where the issued certs are keptcrl_dir = $dir # Where the issued crl are keptdatabase = $dir/index.txt # database index file.new_certs_dir = $dir/certs_by_serial # default place for new certs.certificate = $dir/ca.crt # The CA certificateserial = $dir/serial # The current serial numbercrl = $dir/crl.pem # The current CRLprivate_key = $dir/private/ca.key # The private keyRANDFILE = $dir/.rand # private random number filex509_extensions = basic_exts # The extensions to add to the cert# This allows a V2 CRL. Ancient browsers don't like it, but anything Easy-RSA# is designed for will. In return, we get the Issuer attached to CRLs.crl_extensions = crl_extdefault_days = $ENV::EASYRSA_CERT_EXPIRE # how long to certify fordefault_crl_days= $ENV::EASYRSA_CRL_DAYS # how long before next CRLdefault_md = $ENV::EASYRSA_DIGEST # use public key default MDpreserve = no # keep passed DN ordering# This allows to renew certificates which have not been revokedunique_subject = no# A few different ways of specifying how similar the request should look# For type CA, the listed attributes must be the same, and the optional# and supplied fields are just that :-)policy = policy_anything# For the 'anything' policy, which defines allowed DN fields[ policy_anything ]countryName = optionalstateOrProvinceName = optionallocalityName = optionalorganizationName = optionalorganizationalUnitName = optionalcommonName = suppliedname = optionalemailAddress = optional##################################################################### Easy-RSA request handling# We key off $DN_MODE to determine how to format the DN[ req ]default_bits = $ENV::EASYRSA_KEY_SIZEdefault_keyfile = privkey.pemdefault_md = $ENV::EASYRSA_DIGESTdistinguished_name = $ENV::EASYRSA_DNx509_extensions = easyrsa_ca # The extensions to add to the self signed cert# A placeholder to handle the $EXTRA_EXTS feature:#%EXTRA_EXTS% # Do NOT remove or change this line as $EXTRA_EXTS support requires it##################################################################### Easy-RSA DN (Subject) handling# Easy-RSA DN for cn_only support:[ cn_only ]commonName = Common Name (eg: your user, host, or server name)commonName_max = 64commonName_default = $ENV::EASYRSA_REQ_CN# Easy-RSA DN for org support:[ org ]countryName = Country Name (2 letter code)countryName_default = $ENV::EASYRSA_REQ_COUNTRYcountryName_min = 2countryName_max = 2stateOrProvinceName = State or Province Name (full name)stateOrProvinceName_default = $ENV::EASYRSA_REQ_PROVINCElocalityName = Locality Name (eg, city)localityName_default = $ENV::EASYRSA_REQ_CITY0.organizationName = Organization Name (eg, company)0.organizationName_default = $ENV::EASYRSA_REQ_ORGorganizationalUnitName = Organizational Unit Name (eg, section)organizationalUnitName_default = $ENV::EASYRSA_REQ_OUcommonName = Common Name (eg: your user, host, or server name)commonName_max = 64commonName_default = $ENV::EASYRSA_REQ_CNemailAddress = Email AddressemailAddress_default = $ENV::EASYRSA_REQ_EMAILemailAddress_max = 64##################################################################### Easy-RSA cert extension handling# This section is effectively unused as the main script sets extensions# dynamically. This core section is left to support the odd usecase where# a user calls openssl directly.[ basic_exts ]basicConstraints = CA:FALSEsubjectKeyIdentifier = hashauthorityKeyIdentifier = keyid,issuer:always# The Easy-RSA CA extensions[ easyrsa_ca ]# PKIX recommendations:subjectKeyIdentifier=hashauthorityKeyIdentifier=keyid:always,issuer:always# This could be marked critical, but it's nice to support reading by any# broken clients who attempt to do so.basicConstraints = CA:true# Limit key usage to CA tasks. If you really want to use the generated pair as# a self-signed cert, comment this out.keyUsage = cRLSign, keyCertSign# nsCertType omitted by default. Let's try to let the deprecated stuff die.# nsCertType = sslCA# CRL extensions.[ crl_ext ]# Only issuerAltName and authorityKeyIdentifier make any sense in a CRL.# issuerAltName=issuer:copyauthorityKeyIdentifier=keyid:always,issuer:always