On Thu, 02 Mar 2023 14:01:24 +0000, tincantech via Openvpn-users
<openvpn-users@lists.sourceforge.net> wrote:

>------- Original Message -------
>On Thursday, March 2nd, 2023 at 10:12, Bo Berglund <bo.bergl...@gmail.com> 
>wrote:
>
>
>> I have downloaded easy-rsa3 version to my OpenVPN server for testing.
>> I did so using wget on the v3.1.2/EasyRSA-3.1.2.tgz file below Releases at
>> GitHub.
>> 
>> When I read the vars.example file I see that most of what I had to do in the
>> vars file before is not really needed anymore. :-)
>> 
>> But there are a couple of things regarding certs I don't understand fully so
>> would like to get explained:
>> 
>> # In how many days should the root CA key expire?
>> #
>> #set_var EASYRSA_CA_EXPIRE 3650
>> 
>> Obviously based on earlier discussions here about looming expirations I would
>> like to do this to raise the time to 20 years:
>> 
>> set_var EASYRSA_CA_EXPIRE 7300
>> 
>> However, the following seems also to be involved with expirations but I don't
>> know for sure what to do...
>> 
>> Do I need to also set these to 7300 to get a 20 yesr "working time"?
>> 
>> # In how many days should certificates expire?
>> #
>> #set_var EASYRSA_CERT_EXPIRE 825
>
>
>This seems to me to be self-explanatory:
>
>* EASYRSA_CA_EXPIRE the CA certificate validity period.
>
>* EASYRSA_CERT_EXPIRE the entity certificate validity period.

I have no real knowledge of what these files do, except I have understood that
CA is used to validate to the client somehow.
How that relates to CERT is unknown by me.
I just set this up a number of years ago following a then valid how-to and later
I have figured out that in a couple of years or so the server will no longer
work unless I do something about CA expiration.

That is why I got confused by the easy-rsa3 defaut having different times for CA
and CERT.

>
>> 
>> # How many days until the next CRL publish date? Note that the CRL can still
>> # be parsed after this timeframe passes. It is only used for an expected next
>> # publication date.
>> #
>> #set_var EASYRSA_CRL_DAYS 180
>> 
>> Isn't the last one dealing with client cert revocations?
>> 
>> Does it imply some automatic renewal of the revocations such that one does 
>> not
>> have to build and copy a new crl file every now and then even if no new user
>> logins have to be revoked to keep the server operational at all?
>> 
>> In easy-rsa2 there was no way to update a crl file without also revoking an
>> additional user and the whole server locked up after a very short time of a
>> month or so.....
>> 
>> I had to disable crl handling for that very reason....
>> 
>
>* EASYRSA_CRL_DAYS the CRL validity period.
>
>If you have a very static PKI then this can be a little irritating,
>however, the default 180 days is the recommended value.

I "solved" the problem in the server by switching from:
crl-verify <path-to>/crl.pem

to

client-config-dir /etc/openvpn/ccdw

and putting files with disabled in them into that dir and named as the common
name of clients to block.

So no need for the crl anymore.

>
>CRL validity period explained:
>
>If you revoke a certificate but forget to generate a new CRL then
>the revoked cert. will still be allowed to connect.
>
>Having a very short validity period for the CRL is a security measure,
>when it kicks in it ensures that the admin updates to a new CRL.
>
>The essential knowledge (Which you seem to not understand) is:
>
>The certificate remains unchanged by being revoked, only the CRL is 
>aware of which certificates are valid verses those that are revoked.
>
>(This is unlike certificate expiry because the 'not-after' field,
>encoded INSIDE the certificate, denotes when the certificate expires.)
>
>Therefore, if you intend to revoke certificates (as opposed to all
>the other options that OpenVPN has available) then you MUST keep your
>CRL up-to-date.
>
>EasyRSA-3 "could" also be like EasyRSA-2  and do an automatic 'gen-crl'
>when a certificate is revoked. However, at this time it does not.
>
>It does come with this helpful message after a successful revoke:
>
>----
>                              * IMPORTANT *
>
>Revocation was successful. You must run 'gen-crl' and upload a new CRL to your
>infrastructure in order to prevent the revoked certificate from being 
>accepted."
>----

Just asking about crl out of curiosity and to update my own OpenVPN-Config.md
file where I keep notes concerning the server handling.

Thanks for the reply!

I will go back to your earlier comments regarding switching to easy-rsa3 now
especially concerning how to migrate existing files from 2 to 3.
And how to switch the server without having to replace all of the files
including the client ovpn files..

PS: I saw you are the guy maintaining easy-rsa by the messages on GitHub. DS


-- 
Bo Berglund
Developer in Sweden



_______________________________________________
Openvpn-users mailing list
Openvpn-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-users

Reply via email to