You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Although the RFC does not define the behavior of EKU on CA certs, a lot of implementations will use it as a constraint on the EKU of end-entity certs transitively issued by that CA. Thus, any safetlsa CA that's exclusively used for positive overrides can set EKU to ExtKeyUsageServerAuth and gain some extra security.
The text was updated successfully, but these errors were encountered:
JeremyRand
added a commit
to JeremyRand/safetlsa
that referenced
this issue
Feb 17, 2021
24813e7 Set EKU on TLD CA (Jeremy Rand)
ad9434a Set EKU on Domain CA (Jeremy Rand)
b7fa7cf Support AIA (Jeremy Rand)
Pull request description:
Refs #3
Refs #5
Top commit has no ACKs.
Tree-SHA512: adf9da8e0c39e4e43cd98edfdd9a68af155f36b29e67b150f17f14c45426b0ea7322d353e4c4c32f5ace1df6531b1d4e3b4fd3b3dc3cafdeb11600c9aba7a173
Although the RFC does not define the behavior of EKU on CA certs, a lot of implementations will use it as a constraint on the EKU of end-entity certs transitively issued by that CA. Thus, any
safetlsa
CA that's exclusively used for positive overrides can set EKU toExtKeyUsageServerAuth
and gain some extra security.The text was updated successfully, but these errors were encountered: