Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Fix example signing policy in salt.states.x509 docs #37135

Merged
merged 1 commit into from
Oct 21, 2016
Merged

Fix example signing policy in salt.states.x509 docs #37135

merged 1 commit into from
Oct 21, 2016

Conversation

aaronm-cloudtek
Copy link
Contributor

What does this PR do?

The example "www" signing policy has keyUsage set to "critical cRLSign, keyCertSign". These values are correct for a CA but not a SSL server certificate. With some SSL implementations this causes Firefox to throw SEC_ERROR_INADEQUATE_KEY_USAGE when the generated certificate is used on a web server. The correct value is "critical keyEncipherment".

@cachedout
Copy link
Contributor

Thanks for this, @aaronm-cloudtek

@clinta Does this look all right to you?

@cachedout cachedout added the Pending-Discussion The issue or pull request needs more discussion before it can be closed or merged label Oct 21, 2016
@clinta
Copy link
Contributor

clinta commented Oct 21, 2016

Yes, that probably is a more appropriate key usage for a typical ssl certificate and is a better example.

@cachedout
Copy link
Contributor

@clinta Thanks very much.

@aaronm-cloudtek Thanks for this. I'll get this merged.

@cachedout cachedout merged commit 8de7b39 into saltstack:2016.3 Oct 21, 2016
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Pending-Discussion The issue or pull request needs more discussion before it can be closed or merged
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants