Hi Oli, I don't know if it could be useful for OpenXPKI though. It's a nice to have, but, like how complicated would that be in terms of implemenation...
As for the use-case, from an EST standpoint, it is simply reenrolling with a different subject or subject alternative name. If the user, for some reason, wishes to reenroll a certificate about to expire, but this time, would like use <dns2> instead of <dns1>, then in this case, the CSR with Change Subject Name attribute could be useful and would avoid the user to go through the enroll process which would require a potential different way of authentication, whether it's a challenge password, or an http basic password, or a certificate signed by another trusted entity etc. Mo Le sam. 6 avr. 2024 à 20:28, Oliver Welter <m...@oliwel.de> a écrit : > Hi Mo, > > OpenXPKI uses only the DN to decide weather this is a renewal or not but > than copies over the SAN items from the old certificate to the new request, > so the renewed certificate is an "exact copy" of the old one, besides > validity and signature of course. > > Handling around the "ChangeSubjectName" extension was not implemented so > far as we never got a request on this and it does not really match the way > how approvals are currently handled in the standard workflows. If you can > make up a proper use case how to handle this, we can of course implement > this in the workflows. > > Oliver > > On 06.04.24 14:52, Mo Be wrote: > > Hi, > > I realized i overlooked the answer : it's the subject and the renewal > period, but there is no mention of the SAN. > I thought that renewal must happen at least if the CSR and the certificate > to be renewed have > - same subject > - same SAN > > Which brought me back to RFC 7030 - section 4.2.2 > <https://datatracker.ietf.org/doc/html/rfc7030#section-4.2.2>, and made > me wonder if we could make use of the ChangeSubjectName attribute in > OpenXPKI. > > That being said, do we have a way to check for the SAN as well during > renewal workflow? I'm still looking at different .yaml files but the answer > is no so far. > And does OpenX handle the ChangeUserName attribute ? > > Thank you > > Le mar. 26 mars 2024 à 13:30, Mo Be <mopra...@gmail.com> a écrit : > >> Yes yes yes Martin... >> That was it ! >> >> I still don't know how to play on that renewal_period though. >> By default, enrolled certificates are given a validity of one year. >> I added in my EST .yaml an initial validity, something I found in rpc >> .yaml >> >>>> initial_validity: +000001 (which translates to 1 day starting from >> today) >> >> I left the renewal period intact, i'm not sure how to interpret it >> (can be renewed only if within this period of time, that I know for sure) >> >>>> renewal_period: 000060 >> >> In the documentation, I have read it was following this format YYYYMMDDhhmmss >> in case of absolute date. >> I guess in renewal, it's different => YYMMDD (perhaps hhmmss as well), >> That translates to 60 days maybe. >> *https://openxpki.readthedocs.io/en/develop/reference/configuration/profile.html >> <https://openxpki.readthedocs.io/en/develop/reference/configuration/profile.html>* >> Still need to figure out exactly what's happening regarding that renwal >> period because, >> OpenXPKI dates are also not in sync with my VM, which makes it a bit hard >> to know what's wrong and why. >> Anyway, thanks for your help Martin, got that renewed certificate working >> >> Mohamed >> >> >> Le mar. 26 mars 2024 à 10:16, Martin Bartosch via OpenXPKI-users < >> openxpki-users@lists.sourceforge.net> a écrit : >> >>> Hi, >>> >>> >>> > 5- I do get authenticated through basic auth AND through the >>> certificates i'm passing to cURL. >>> > But I keep getting back the same certificate. >>> > No workflow is triggered. >>> > And in EST.log >>> > >>>> INF authenticated client DN: CN=same cn,DC=Test >>> Deployment,DC=OpenXPKI,DC=org [pid=91|ep=[undef]] >>> > >>> > 6- I thought it was my authentication stack causing the issue (using >>> http basic), so I reversed it back to the default (anonymous), and I still >>> don't get the renawal mode, just fetching the same certificate. >>> >>> When receiving an enrollment request via any of its enrollment >>> interfaces OpenXPKI distinguishes initial enrollment, renewal and >>> enrollment on behalf mode and branches into the respective branch of the >>> enrollment workflow. You can see which path is chosen by examining the >>> enrollment workflow instance and its context. >>> >>> If you send the same CSR (based on the same private key) to an >>> enrollment interface, you will get back the existing certificate if the >>> enrollment workflow for this key was previously successfully executed. >>> >>> If you wish to perform a renewal, you need to generate a new private key >>> and a new certificate request based on that new key. In order to qualify as >>> a renewal from the viewpoint of OpenXPKI, the renewal request must be >>> authenticated by the old, existing certificate and key (and the subject >>> must match). In your example this means that you would have to call curl >>> with certificate and key option pointing to the old certificate. >>> Also, the existing certificate validity is considered by the enrollment >>> workflow. Depending on configuration, the request may only be accepted if a >>> certain remaining validity of the existing certificate is not exceeded. >>> >>> Cheers >>> >>> Martin >>> >>> >>> >>> _______________________________________________ >>> OpenXPKI-users mailing list >>> OpenXPKI-users@lists.sourceforge.net >>> https://lists.sourceforge.net/lists/listinfo/openxpki-users >>> >> > > _______________________________________________ > OpenXPKI-users mailing > listOpenXPKI-users@lists.sourceforge.nethttps://lists.sourceforge.net/lists/listinfo/openxpki-users > > > -- > Protect your environment - close windows and adopt a penguin! > > _______________________________________________ > OpenXPKI-users mailing list > OpenXPKI-users@lists.sourceforge.net > https://lists.sourceforge.net/lists/listinfo/openxpki-users >
_______________________________________________ OpenXPKI-users mailing list OpenXPKI-users@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/openxpki-users