Open evantill opened 7 years ago
Did I miss something to configure to change the behavior of cfssl ? Or is this a bug ?
what do you think about adding a critical_usages
field in the profiles to list all keys that we request to be flagged as critical extensions ?
"timestamping": {
"usages": [
"timestamping",
"digital signature",
"content committment"
],
"critical_usages": [
"timestamping"
],
"expiry": "87600h"
},
or something closer to openssl configuration, prefixing the usage key with the critical
key word and a comma :
"timestamping": {
"usages": [
"critical,timestamping",
"digital signature",
"content committment"
],
"expiry": "87600h"
},
here are my tests to find a solution gist
The problem is that the go crypto does not seems to make it possible by design.
In the first case we need to copy some code of x509 for our need.
In the second case, the trick is to Create the certificate to compute the extension for us.
not sure how to proceed now...
according to RFC3161 sec 2.3 when signing a certificate for a time stamping usage, the extended key usage
Time Stamping
must becritical
.But actually, this is not the case and trying to use openssl cause an error
invalid signer certificate purpose
.we are using the latest docker image
cfssl/cfssl