My domain is: monara.ch
I ran this command:
openssl genrsa -out monara-rsa.key 2048
openssl req -new -key monara-rsa.key -out monara-rsa.csr -subj "/CN=monara.ch" -addext "extendedKeyUsage=clientAuth,serverAuth"
sudo certbot certonly --manual --preferred-challenges dns --csr monara-rsa.csr --cert-name monara-rsa-client
It produced this output: The certificate was issued successfully and saved to /Users/sascha/0001_chain.pem. However, when I inspect the issued certificate:
openssl x509 -in 0001_chain.pem -noout -text | grep -A1 "Extended Key Usage"
I see only:
X509v3 Extended Key Usage:
TLS Web Server Authentication
The TLS Web Client Authentication EKU that I included in the CSR was stripped from the issued certificate. The cert was also issued under intermediate R12.
My web server is (include version): No traditional web server. The application runs as a frontend on Lovable with a Supabase backend. The certificate is needed for mutual TLS client authentication against an external API (SIX Group's bLink open banking platform), not for serving HTTPS traffic.
The operating system my web server runs on is (include version): macOS (running certbot locally on macOS to generate the certificate; LibreSSL 3.3.6)
My hosting provider, if applicable, is: Lovable (frontend) and Supabase (backend). Domain registered with Infomaniak.
I can login to a root shell on my machine (yes or no, or I don't know): Yes (local macOS, sudo access)
I'm using a control panel to manage my site (no, or provide the name and version of the control panel): No
The version of my client is: certbot 5.1.0 (installed via Homebrew)
Additional context:
I need this certificate to satisfy the requirements of SIX Group's bLink open banking platform, which I am onboarding to. According to bLink's official TLS Certificates documentation (TLS Certificates | bLink Docs), my client certificate must meet all of these requirements:
- RSA key, 3072 bits or longer
- Signature algorithm: sha224/256/384/512 with RSA
- Extended Key Usage: Client Authentication (
id-kp-clientAuth) - For Let's Encrypt specifically: issued under intermediate R10 or R11 (R12, R13, R14 are explicitly not on bLink's accepted list)
bLink's support team has confirmed in writing that "Let's Encrypt will be perfect, just make sure to generate one with Client Authentication. They are not including this anymore in their certificates by default, however on request they are still issuing them."
My questions:
- What is the correct procedure to request a Let's Encrypt certificate that includes the
clientAuthEKU? Is there an account-level setting, a specific ACME profile, or do I need to submit a request through a specific channel? - Is it possible to request issuance under intermediate R10 or R11 specifically (rather than R12)?
- Are 3072-bit RSA keys supported by Let's Encrypt for the leaf certificate?
- Can the issued certificate include
keyUsage = digitalSignaturein addition to the EKU?
Thank you very much for your help — bLink onboarding is otherwise complete, the certificate is the only blocker.
Best regards, Sascha