Blame | Last modification | View Log | RSS feed
# For use with Easy-RSA 3.0+ and OpenSSL or LibreSSL####################################################################[ ca ]default_ca = CA_default # The default ca section####################################################################[ CA_default ]dir = /etc/openvpn/easy-rsa/pki # Where everything is keptcerts = /etc/openvpn/easy-rsa/pki # Where the issued certs are keptcrl_dir = /etc/openvpn/easy-rsa/pki # Where the issued crl are keptdatabase = /etc/openvpn/easy-rsa/pki/index.txt # database index file.new_certs_dir = /etc/openvpn/easy-rsa/pki/certs_by_serial # default place for new certs.certificate = /etc/openvpn/easy-rsa/pki/ca.crt # The CA certificateserial = /etc/openvpn/easy-rsa/pki/serial # The current serial numbercrl = /etc/openvpn/easy-rsa/pki/crl.pem # The current CRLprivate_key = /etc/openvpn/easy-rsa/pki/private/ca.key # The private keyRANDFILE = /etc/openvpn/easy-rsa/pki/.rand # private random number filex509_extensions = basic_exts # The extensions to add to the cert# This allows a V2 CRL. Ancient browsers don't like it, but anything Easy-RSA# is designed for will. In return, we get the Issuer attached to CRLs.crl_extensions = crl_extdefault_days = 825 # how long to certify fordefault_crl_days= 180 # how long before next CRLdefault_md = sha256 # use public key default MDpreserve = no # keep passed DN ordering# This allows to renew certificates which have not been revokedunique_subject = no# A few different ways of specifying how similar the request should look# For type CA, the listed attributes must be the same, and the optional# and supplied fields are just that :-)policy = policy_anything# For the 'anything' policy, which defines allowed DN fields[ policy_anything ]countryName = optionalstateOrProvinceName = optionallocalityName = optionalorganizationName = optionalorganizationalUnitName = optionalcommonName = suppliedname = optionalemailAddress = optional##################################################################### Easy-RSA request handling# We key off $DN_MODE to determine how to format the DN[ req ]default_bits = 2048default_keyfile = privkey.pemdefault_md = sha256distinguished_name = cn_onlyx509_extensions = easyrsa_ca # The extensions to add to the self signed cert# A placeholder to handle the $EXTRA_EXTS feature:#%EXTRA_EXTS% # Do NOT remove or change this line as $EXTRA_EXTS support requires it##################################################################### Easy-RSA DN (Subject) handling# Easy-RSA DN for cn_only support:[ cn_only ]commonName = Common Name (eg: your user, host, or server name)commonName_max = 64commonName_default = cn_EpupgCJsBWfB7fFb# Easy-RSA DN for org support:[ org ]countryName = Country Name (2 letter code)countryName_default = UScountryName_min = 2countryName_max = 2stateOrProvinceName = State or Province Name (full name)stateOrProvinceName_default = CalifornialocalityName = Locality Name (eg, city)localityName_default = San Francisco0.organizationName = Organization Name (eg, company)0.organizationName_default = Copyleft Certificate CoorganizationalUnitName = Organizational Unit Name (eg, section)organizationalUnitName_default = My Organizational UnitcommonName = Common Name (eg: your user, host, or server name)commonName_max = 64commonName_default = cn_EpupgCJsBWfB7fFbemailAddress = Email AddressemailAddress_default = me@example.netemailAddress_max = 64##################################################################### Easy-RSA cert extension handling# This section is effectively unused as the main script sets extensions# dynamically. This core section is left to support the odd usecase where# a user calls openssl directly.[ basic_exts ]basicConstraints = CA:FALSEsubjectKeyIdentifier = hashauthorityKeyIdentifier = keyid,issuer:always# The Easy-RSA CA extensions[ easyrsa_ca ]# PKIX recommendations:subjectKeyIdentifier=hashauthorityKeyIdentifier=keyid:always,issuer:always# This could be marked critical, but it's nice to support reading by any# broken clients who attempt to do so.basicConstraints = CA:true# Limit key usage to CA tasks. If you really want to use the generated pair as# a self-signed cert, comment this out.keyUsage = cRLSign, keyCertSign# nsCertType omitted by default. Let's try to let the deprecated stuff die.# nsCertType = sslCA# CRL extensions.[ crl_ext ]# Only issuerAltName and authorityKeyIdentifier make any sense in a CRL.# issuerAltName=issuer:copyauthorityKeyIdentifier=keyid:always,issuer:always