Missing a repository? Have a look at https://code.cacert.org/.

summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorWytze van der Raay <wytze@soleus.nu>2018-11-20 10:26:23 +0100
committerWytze van der Raay <wytze@soleus.nu>2018-11-20 10:26:23 +0100
commit707bee6bcc869aec60f6d1ba0be8a0e2442b151c (patch)
tree7aab83e2915e4bfba6f43c0727cdbe978c6bd802
parentbedee023efb6e0ae56d8f8534735a4682043e94c (diff)
downloadcacert-infradocs-707bee6bcc869aec60f6d1ba0be8a0e2442b151c.tar.gz
cacert-infradocs-707bee6bcc869aec60f6d1ba0be8a0e2442b151c.tar.xz
cacert-infradocs-707bee6bcc869aec60f6d1ba0be8a0e2442b151c.zip
Update sha1 fingerprint.
Add the two special OCSP certificates.
-rw-r--r--docs/critical/ocsp.rst43
1 files changed, 42 insertions, 1 deletions
diff --git a/docs/critical/ocsp.rst b/docs/critical/ocsp.rst
index b914719..1d4c40a 100644
--- a/docs/critical/ocsp.rst
+++ b/docs/critical/ocsp.rst
@@ -17,6 +17,47 @@ Keys and X.509 certificates
:keyfile: /etc/lighttpd/ssl/ocsp.cacert.org.key
:serial: 02CC47
:expiration: Nov 18 19:03:01 2020 GMT
- :sha1fp: CD:E1:6A:CB:55:18:C8:AB:31:27:A7:5A:24:A0:0B:AA:BF:69:BB:76
+ :sha1fp: 85:42:E3:DC:42:F2:7C:C2:B2:02:9F:47:16:34:02:55:BE:92:AA:17
:issuer: CAcert Class 3 Root
+.. sslcert:: ocsp.cacert.org class1 (issued with X509v3 Extended Key Usage: OCSP Signing)
+ :altnames:
+ :certfile: /usr/local/etc/ocspd/certs/class1.crt
+ :keyfile: /usr/local/etc/ocspd/private/class1.key
+ :serial: 1320EE
+ :expiration: Aug 25 09:45:00 2019 GMT
+ :sha1fp: 68:08:77:DD:F2:3A:8C:2F:A0:DC:EC:6B:BD:C6:71:80:DD:44:3A:C7
+ :issuer: CAcert Class 1 Root
+
+.. sslcert:: ocsp.cacert.org class3 (issued with X509v3 Extended Key Usage: OCSP Signing)
+ :altnames:
+ :certfile: /usr/local/etc/ocspd/certs/class3.crt
+ :keyfile: /usr/local/etc/ocspd/private/class1.key
+ :serial: 02B395
+ :expiration: Aug 25 09:44:51 2019 GMT
+ :sha1fp: AA:F0:AE:3D:0A:11:47:6C:9F:1E:EB:23:15:15:38:40:CA:29:0D:45
+ :issuer: CAcert Class 3 Root
+
+Note: generating a CSR with OCSP Signing flag set can be done with an openssl config file like this:
+
+.. code-block:: text
+
+ [ req ]
+ distinguished_name = req_distinguished_name
+ prompt = no
+ req_extensions = ocsp_req
+
+ [ req_distinguished_name ]
+ countryName = AU
+ stateOrProvinceName = NSW
+ localityName = Sydney
+ 0.organizationName = CAcert Inc.
+ organizationalUnitName = Server Administration
+ commonName = ocsp.cacert.org
+ emailAddress = critical-admin@cacert.org
+
+ [ ocsp_req ]
+ basicConstraints=CA:FALSE
+ extendedKeyUsage=1.3.6.1.5.5.7.3.2, 1.3.6.1.5.5.7.3.1, 1.3.6.1.5.5.7.3.9
+
+To sign such a CSR while retaining the OCSP Signing flag in the generated certificate, there is some dark magic involved: you have to have the admin flag set and check a box deep down on the second page of the new cert process.