-
Notifications
You must be signed in to change notification settings - Fork 4.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
PKI: automatic renewal of CRL #9319
Comments
+1 on this. We are using certvalidator to check the validity of the cert chain and it fails on this line. It seems like vault should automatically refresh this. |
+1 as well. This here is the crucial part in the RFC:
I understand why Vault does not want to guarantee this with a scheduled job, but at the same time it is impractical to trigger that from outside of Vault. It would require knowledge on the mount structure to automate this, and appropriate access rights. This cannot be trivially done, specifically in a multi-namespace setup. |
Hi all, |
+1 Hope to see something for this soon! |
+1 as well. This feature would greatly simplify automated deployments |
+1 too |
Hi folks - thanks for chiming in with your wish for this support. I'll add it to the list of issues we're tracking internally, and bring it up with product. Thanks again! |
Thanks for looking into this. Any update from the product team on this? I agree that this is should be core functionality. |
+1 |
Does anybody know how I can rotate CRL from command line? when I use |
@Torkolis rotate is GET operation, so use |
ah that worked, thanks |
\o hello everyone! This has been done in #16762 -- control over the grace period before CRL expiration has been done. Notably, this now pushes nearly all revocations to use automatic rebuilding, so there will be a delay between when the cert is revoked and when it appears on the next CRL. #16773 solves this via enabling light-weight delta CRLs which augment the last complete CRL and #16723 solves this by adding an OCSP responder which allows for live revocation status queries in the standard OCSP format. |
Is your feature request related to a problem? Please describe.
Vault doesn't update the CRL next update date if you haven't revoked a certificate or issued a rotate-crls.
There was a ticket opened for this: #3827 but has been closed mentionning to use the rotate-crls api endpoint.
This becomes a PITA when you actually use the CRL feature and monitor the CRL. If the dates are not updated there is no way to be sure that the CRL is still valid. When investigating why my certificat check was failing, I first though there was a problem with vault because the CRL hasn't been updated.
Having to setup a cron to call the rotate-crls endpoint to renew the CRL is also not a good solution as it requires a sysadmin to setup the cron everytime you create/delete a CA/INT-CA.
https://www.ietf.org/rfc/rfc3280.txt says:
It shoud, but vault doesn't. It does not say this is it optional, is says that this is the best pratice... even though this is not mandatory.
also:
This means that it is not allowed to issue the CRL after the indicated data (next update). So vault should make sure to renew this automatically.
In a world that we try to automate things as much as possible, this is, I think, one that should be.
Describe the solution you'd like
automatically regenerate CRL before the "next update" value is going to expire.
Describe alternatives you've considered
At the moment, we use crons, but this is error prone when someone create/delete a new CA/INT-CA. The chance of not adding/removing the cron for this change is high.
You also need a token to make the rotate call, which is ok, but complicates things when havving to do this as a cron.
Thank you for considering this.
The text was updated successfully, but these errors were encountered: