Added KeyUsage DigitalSignature
to CA certs.
#197
Merged
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
DigitalSignature
MUST be set in SCEP CA certificates according to RFC 8894:2.1.2. Certificate Authority
A SCEP CA is the entity that signs client certificates. A CA may
enforce policies and apply them to certificate requests, and it may
reject a request for any reason.
Since the client is expected to perform signature verification and
optionally encryption using the CA certificate, the keyUsage
extension in the CA certificate MUST indicate that it is valid for
digitalSignature and keyEncipherment (if the key is to be used for
en/decryption) alongside the usual CA usages of keyCertSign and/or
cRLSign.
This is also what I see in other SCEP CAs (e.g. LANCOM, EJBCA). It makes sense, as the PKCS7 replies are signed by the CA and the
KeyCertSign
KeyUsage is not meant for this (thats only for the included new certificate).