Replies: 2 comments
-
@bagasme @tashian For {
"subject": {{ toJson .Subject }},
"issuer": {{ toJson .Subject }},
"keyUsage": ["certSign", "crlSign"],
"basicConstraints": {
"isCA": true,
"maxPathLen": 1
},
"signatureAlgorithm": "ECDSA-SHA512"
} And in {
"subject": {{ toJson .Subject }},
"sans": {{ toJson .SANs }},
{{- if typeIs "*rsa.PublicKey" .Insecure.CR.PublicKey }}
"keyUsage": ["keyEncipherment", "digitalSignature"],
{{- else }}
"keyUsage": ["digitalSignature"],
{{- end }}
"extKeyUsage": ["serverAuth", "clientAuth"],
"signatureAlgorithm": "ECDSA-SHA384"
} I would not recommend it, but you can even define the signature algorithm from the command line if you change it to
Of course, it will fail if your intermediate key doesn't support it, for example, you won't be able to sign using |
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
Currently hash algorithm used to create and sign certificates is determined by hash algorithm in the CA certificate. For example, a certificate signed by default P-256 curve CA certificate uses SHA-256 and SHA-384 for certificates signed by P-384 CA.
step ca
andstep certificate
should have an option to select desired hash algorithm (--hash
). The valid values for the option shall beSHA-256
,SHA-384
,SHA-512
, anddefault
(CA-dependent as before).Beta Was this translation helpful? Give feedback.
All reactions