mirror of
https://github.com/FiloSottile/mkcert.git
synced 2026-04-25 05:26:03 +03:00
[GH-ISSUE #302] [feature] add Name Constraint? #191
Labels
No labels
TLS stack issue
Windows
bug
duplicate
duplicate
enhancement
help wanted
help wanted
pull-request
question
question
root store
waiting for info
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
starred/mkcert#191
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @zimbatm on GitHub (Oct 17, 2020).
Original GitHub issue: https://github.com/FiloSottile/mkcert/issues/302
It would be nice if the CA could be generated with a Name Constraint, so that it can only be used on a specific top-level domain like
.local.See https://timothy-quinn.com/name-constraints-in-x509-certificates/
@ralexander-phi commented on GitHub (Mar 30, 2023):
Just as a heads-up when implementing this. Browsers like Google don't enforce Name Constraint on any manually imported trust roots. For this to work, I believe you need to create an intermediary certificate with the name constraint, and then use that for issuance. Maybe
mkcertshould destroy the private key of the root cert once the intermediary is created?@nh2 commented on GitHub (Oct 18, 2024):
Chrome fixed this, ticket was closed as fixed 2024-07-11.