Do you have 20 years in the Root and intermediate CA or just in the intermediate?I tried this but get untrusted on ios -.-
I started quite recently. So I can't tell you if it has a notbefor date^^ but it was created recently.However, I have seen the posts and recreated the root and intermediate as well as the application certificate and limited it to one year.
CA="$OPENSSL ca $SSLEAY_CONFIG -startdate 20190630120000Z"
So you have to either limit the intermediate CA's validity to 398 days or have its "notBefore" date set to something in the past.
I have under organization: none in...... and use .home as topdomain. Can this also lead to errors?
openssl x509 -in /path/to/root-ca.crt.pem -noout -textopenssl x509 -in /path/to/root-int.crt.pem -noout -textopenssl x509 -in /path/to/server.crt.pem -noout -text
I do not know for sure, but I think the restriction for certificate duration apply for the whole chain. Are all your certificates either with a validity of less than 398 days or have a notBefore date < September 1, 2020 00:00 GMT/UTC?
Limits that work for apple: CA certificate has a naximum of 825. End Entity certificates 397 days.
You can use Root CA, Intermediate CA, End entity on a mac by manually trust the Root CA (in Keychain management). BUT this will _not_ work on IOS devices. Here you only can trust a Root CA (Settings->geberal->info) and than use directly derived end entity certificates. (Tested with Sonoma and IOS 15)
Than simply explain to me, why apple mac os will not trust the keychain when the root CA certificate has a longer lifetime than 825? And when I do the exact same certificate with 825 days or less it works?
Second:Perhaps I‘m not clear enough on IOS:You can import a root CA certificate to IOS as you (and myself) explained. But when you have an Intermediate Certificate derived from that root certificate and than have an end entity certificate derived from the intermediate certificate this end entitiy certificate is not trusted. Root CA Cert and Intermediate CA Certificate are imported as profile. (And the Intermediate ca certificate is also not shown in general info so you could trust it manually as you can do with the root certificate). All three certificates are created with OPNsense following the OPNsense documentation.