mirror of
https://github.com/Grasscutters/mitmproxy.git
synced 2024-11-27 10:26:23 +00:00
3fbf343985
For some reason Satan's Operating System doesn't join up the certification path if the key identifiers are set to hash. This took a few hours of trial and error to figure out.
34 lines
1.1 KiB
INI
34 lines
1.1 KiB
INI
[ req ]
|
|
prompt = no
|
|
distinguished_name = req_distinguished_name
|
|
x509_extensions = v3_ca
|
|
req_extensions = v3_ca_req
|
|
|
|
[ req_distinguished_name ]
|
|
organizationName = mitmproxy
|
|
commonName = mitmproxy
|
|
|
|
[ v3_ca ]
|
|
basicConstraints = critical,CA:true
|
|
keyUsage = cRLSign, keyCertSign
|
|
extendedKeyUsage=serverAuth,clientAuth,emailProtection,timeStamping,msCodeInd,msCodeCom,msCTLSign,msSGC,msEFS,nsSGC
|
|
nsCertType = sslCA
|
|
|
|
[ v3_ca_req ]
|
|
basicConstraints = critical,CA:true
|
|
keyUsage = cRLSign, keyCertSign
|
|
extendedKeyUsage=serverAuth,clientAuth,emailProtection,timeStamping,msCodeInd,msCodeCom,msCTLSign,msSGC,msEFS,nsSGC
|
|
nsCertType = sslCA
|
|
|
|
[ v3_cert ]
|
|
basicConstraints = CA:false
|
|
keyUsage = nonRepudiation, digitalSignature, keyEncipherment
|
|
extendedKeyUsage=serverAuth,clientAuth,emailProtection,timeStamping,msCodeInd,msCodeCom,msCTLSign,msSGC,msEFS,nsSGC
|
|
nsCertType = server
|
|
|
|
[ v3_cert_req ]
|
|
basicConstraints = CA:false
|
|
keyUsage = nonRepudiation, digitalSignature, keyEncipherment
|
|
extendedKeyUsage=serverAuth,clientAuth,emailProtection,timeStamping,msCodeInd,msCodeCom,msCTLSign,msSGC,msEFS,nsSGC
|
|
nsCertType = server
|