Hi Mo,
OpenXPKI uses only the DN to decide weather this is a renewal or not but
than copies over the SAN items from the old certificate to the new
request, so the renewed certificate is an "exact copy" of the old one,
besides validity and signature of course.
Handling around the "ChangeSubjectName" extension was not implemented so
far as we never got a request on this and it does not really match the
way how approvals are currently handled in the standard workflows. If
you can make up a proper use case how to handle this, we can of course
implement this in the workflows.
Oliver
On 06.04.24 14:52, Mo Be wrote:
Hi,
I realized i overlooked the answer : it's the subject and the renewal
period, but there is no mention of the SAN.
I thought that renewal must happen at least if the CSR and the
certificate to be renewed have
- same subject
- same SAN
Which brought me back to RFC 7030 - section 4.2.2
<https://datatracker.ietf.org/doc/html/rfc7030#section-4.2.2>, and
made me wonder if we could make use of the ChangeSubjectName attribute
in OpenXPKI.
That being said, do we have a way to check for the SAN as well during
renewal workflow? I'm still looking at different .yaml files but the
answer is no so far.
And does OpenX handle the ChangeUserName attribute ?
Thank you
Le mar. 26 mars 2024 à 13:30, Mo Be <mopra...@gmail.com> a écrit :
Yes yes yes Martin...
That was it !
I still don't know how to play on that renewal_period though.
By default, enrolled certificates are given a validity of one year.
I added in my EST .yaml an initial validity, something I found in
rpc .yaml
>>>> initial_validity: +000001 (which translates to 1 day starting
from today)
I left the renewal period intact, i'm not sure how to interpret it
(can be renewed only if within this period of time, that I know
for sure)
>>>> renewal_period: 000060
In the documentation, I have read it was following this format
YYYYMMDDhhmmss in case of absolute date.
I guess in renewal, it's different => YYMMDD (perhaps hhmmss as
well),
That translates to 60 days maybe.
/https://openxpki.readthedocs.io/en/develop/reference/configuration/profile.html/
Still need to figure out exactly what's happening regarding that
renwal period because,
OpenXPKI dates are also not in sync with my VM, which makes it a
bit hard to know what's wrong and why.
Anyway, thanks for your help Martin, got that renewed certificate
working
Mohamed
Le mar. 26 mars 2024 à 10:16, Martin Bartosch via OpenXPKI-users
<openxpki-users@lists.sourceforge.net> a écrit :
Hi,
> 5- I do get authenticated through basic auth AND through the
certificates i'm passing to cURL.
> But I keep getting back the same certificate.
> No workflow is triggered.
> And in EST.log
> >>>> INF authenticated client DN: CN=same cn,DC=Test
Deployment,DC=OpenXPKI,DC=org [pid=91|ep=[undef]]
>
> 6- I thought it was my authentication stack causing the
issue (using http basic), so I reversed it back to the default
(anonymous), and I still don't get the renawal mode, just
fetching the same certificate.
When receiving an enrollment request via any of its enrollment
interfaces OpenXPKI distinguishes initial enrollment, renewal
and enrollment on behalf mode and branches into the respective
branch of the enrollment workflow. You can see which path is
chosen by examining the enrollment workflow instance and its
context.
If you send the same CSR (based on the same private key) to an
enrollment interface, you will get back the existing
certificate if the enrollment workflow for this key was
previously successfully executed.
If you wish to perform a renewal, you need to generate a new
private key and a new certificate request based on that new
key. In order to qualify as a renewal from the viewpoint of
OpenXPKI, the renewal request must be authenticated by the
old, existing certificate and key (and the subject must
match). In your example this means that you would have to call
curl with certificate and key option pointing to the old
certificate.
Also, the existing certificate validity is considered by the
enrollment workflow. Depending on configuration, the request
may only be accepted if a certain remaining validity of the
existing certificate is not exceeded.
Cheers
Martin
_______________________________________________
OpenXPKI-users mailing list
OpenXPKI-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openxpki-users
_______________________________________________
OpenXPKI-users mailing list
OpenXPKI-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openxpki-users
--
Protect your environment - close windows and adopt a penguin!
_______________________________________________
OpenXPKI-users mailing list
OpenXPKI-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openxpki-users