You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Is your feature request related to a problem? Please describe.
Currently, if we keep the PKI, we take the risk that someone steals the CA private key and uses it to sign server certificates our client devices will trust. They would be able to sign any server certificate, including well known ones like google.com, microsoft.com, apple.com, etc.
Describe the solution you'd like
Setting name constraint on CA certificate so that it can only be used to sign our server certificate. Stealing CA private key will then result in no more damage than stealing the server certificate key.
Describe alternatives you've considered
We can choose to discard CA key, but then we cannot add more users.
Additional context
The text was updated successfully, but these errors were encountered:
Is your feature request related to a problem? Please describe.
Currently, if we keep the PKI, we take the risk that someone steals the CA private key and uses it to sign server certificates our client devices will trust. They would be able to sign any server certificate, including well known ones like google.com, microsoft.com, apple.com, etc.
Describe the solution you'd like
Setting name constraint on CA certificate so that it can only be used to sign our server certificate. Stealing CA private key will then result in no more damage than stealing the server certificate key.
Describe alternatives you've considered
We can choose to discard CA key, but then we cannot add more users.
Additional context
The text was updated successfully, but these errors were encountered: