mirror of
https://github.com/FiloSottile/mkcert.git
synced 2026-04-25 13:36:02 +03:00
[GH-ISSUE #131] Support for Name Constraints? #76
Labels
No labels
TLS stack issue
Windows
bug
duplicate
duplicate
enhancement
help wanted
help wanted
pull-request
question
question
root store
waiting for info
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
starred/mkcert#76
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @tisba on GitHub (Feb 6, 2019).
Original GitHub issue: https://github.com/FiloSottile/mkcert/issues/131
Hi!
I was wondering if there is any support for the Name Constraint extension? I admit I only took a quick look but wasn't able to find anything in regard to this in
mkcert.Background: I would like to constraint the authority of the CA certificate generated by mkcert to be restricted to
*.lab.tisba.deor*.lab.localhostetc. There seems to be a growing support for this extension (Chrome does support it for some time, OpenSSL as well and I think it should also be supported by Edge/IE and Safari, maybe even more platforms).If the private RSA key for the generated root CA could be password protected, combined with name constraints could greatly help to protect from misuse.
If this all makes sense, and you would accept a PR on that topic, I'd be happy to give this a try.
Thank you for mkcert! 💕
@FiloSottile commented on GitHub (Feb 8, 2019):
Hi! Thanks for the issue. I have elaborated at https://github.com/FiloSottile/mkcert/pull/113#issuecomment-459999460 on why I think Name Constraints don't make enough sense for the mkcert use case to take the complexity. Password protecting the root key follows a similar argument on not really knowing what attackers we are protecting against.
@tisba commented on GitHub (Feb 13, 2019):
Thanks for pointing to the commend, I kinda missed that (sorry).
I understand the argument around the added complexity for Name Constraint, especially if
mkcerts intended users cannot be expected to understand the impact. This should also be okay, because if I still want that, I can do it myself :)Regarding protecting the private key, I have to disagree on your argument in https://github.com/FiloSottile/mkcert/pull/113#issuecomment-459999460. Yes, sensitive material should be 0700, but encrypting/protecting SSH private keys is still recommended last time I checked.
I think making the root key password protected (optionally) should have a minimal impact on the user in terms of complexity and usage. If the key is protected, we could simply ask for the password.