The CA certificates that we are generating as par of our regression tests
were lacking the X.509 `Key Usage` extension, causing TLS validation with
Python 3.13 to fail with:
> certificate verify failed: CA cert does not include key usage extension
It appears that Python 3.13 enables `VERIFY_X509_STRICT` by default, which makes OpenSSL stricter, and thus it chokes on our invalid CA.
[req]
default_bits = 2048
encrypt_key = no
-x509_extensions = custom_extensions
prompt = no
distinguished_name = distinguished_name
subjectKeyIdentifier = hash
authorityKeyIdentifier = keyid:always,issuer:always
basicConstraints = critical, CA:true
+keyUsage = critical, cRLSign, keyCertSign
[distinguished_name]
CN = DNSDist TLS regression tests CA
OU = PowerDNS.com BV
countryName = NL
-[custom_extensions]
-basicConstraints = CA:true
-keyUsage = cRLSign, keyCertSign
-
[CA_default]
copy_extensions = copy