|
Bugzilla – Full Text Bug Listing |
| Summary: | YaST-generated X.509 certificate for SMTP server only valid for Key Encipherment | ||
|---|---|---|---|
| Product: | [openSUSE] openSUSE 11.2 | Reporter: | Daniel Gillmor <dkg> |
| Component: | YaST2 | Assignee: | Michael Calmer <mc> |
| Status: | RESOLVED FIXED | QA Contact: | Jiri Srain <jsrain> |
| Severity: | Normal | ||
| Priority: | P3 - Medium | ||
| Version: | Factory | ||
| Target Milestone: | Milestone 4 | ||
| Hardware: | Other | ||
| OS: | Other | ||
| Whiteboard: | |||
| Found By: | --- | Services Priority: | |
| Business Priority: | Blocker: | --- | |
| Marketing QA Status: | --- | IT Deployment: | --- |
|
Description
Daniel Gillmor
2009-06-01 20:33:58 UTC
The original reporter (Roland Winkler) writes the following:
> It's a bit difficult to reconstruct the details.
>
> The certificate was created via YaST on an Open Enterprise Server
> (OES) SP2. The sysadmin told me that these certificates are mainly
> intended for https connections and secure communication of Novell's
> eDirectory service. They are not specifically designed for secure
> SMTP connections that triggered the "key usage violation" problem.
i think that for standard https connections (e.g. apache with mod_ssl), the concerns above are still relevant. I don't know what kind of connections are made for eDirectory, so i don't know how relevant these concerns would be for using this kind of cert with eDirectory.
Anything that looks like YaST can be screened by the YaST team. Thanks for the informations. With the critical flag I deal with great care, because this might cause applications to reject everything. But for the keyUsage extension it might make sense. Adding keyAgreement is no problem. I think I will try this out for 11.2. Submitted to Factory. |