Skip to content

Commit df099d7

Browse files
committed
doc: Revoke and Renew, update for Easy-RSA v3.2.1 - Partial renew CA
Signed-off-by: Richard T Bonhomme <[email protected]>
1 parent f71374d commit df099d7

File tree

1 file changed

+65
-8
lines changed

1 file changed

+65
-8
lines changed

doc/EasyRSA-Renew-and-Revoke.md

+65-8
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ with regard to Renewal and Revocation of Certificates.
66

77
## In summary:
88

9-
**Easy-RSA Version 3.1.7** provides the most flexible support of renewal.
9+
**Easy-RSA Version 3.1.7** provides the most flexible support of renewal.
1010
This includes command `rewind-renew`, which is required to recover certificates
1111
renewed by `renew` command version 1. However, this does **not** include renewing
1212
any supported certificate attributes.
@@ -33,7 +33,7 @@ The follow is an exhaustive list of available `reason` codes, with abbreviations
3333
----
3434

3535
Easy-RSA version 3.2.x
36-
----------------------
36+
======================
3737
For **Easy-RSA Version 3.2.0**, command `renew` is NOT supported.
3838

3939
Please upgrade to Easy-RSA Version 3.2.1
@@ -75,11 +75,7 @@ to be edited the same way.
7575
----
7676

7777
Easy-RSA version 3.1.x
78-
----------------------
79-
80-
**UPDATE**:
81-
The changes noted for Easy-RSA version 3.1.2 have all been included with
82-
Easy-RSA version 3.1.1 - See https://github.com/OpenVPN/easy-rsa/pull/688
78+
======================
8379

8480
Command Details: `renew`
8581
------------------------
@@ -190,4 +186,65 @@ an old certificate/key pair, which has been _rebuilt_ by command `rebuild`.
190186
Renew CA Certificate
191187
====================
192188

193-
TBD
189+
Easy-RSA Version 3.2.1+ supports a simple way to effectively renew a CA Certificate.
190+
191+
**Preamble** - Specifically for use with OpenVPN:
192+
193+
When a CA certificate expires it must be replaced, this is unavoidable.
194+
No matter what method is used to create a new or renewed CA certificate,
195+
that CA certificate must be distributed to all of your servers and clients.
196+
197+
Please consider the method outlined here, which requires very little work:
198+
199+
1. **Before you do anything else -- Make a BACKUP of your current PKI.**
200+
201+
2. Use command `init-pki soft`
202+
203+
This will reset your current PKI but will keep your `vars` setting file
204+
and your current Request files [CSR], in the `pki/reqs` directory.
205+
206+
If you have an Easy-RSA generated TLS key for OpenVPN, that will also be
207+
preserved. However, it will NOT be used for new `inline` files. The file
208+
`pki/private/easyrsa-tls.key` will be moved to `pki/easyrsa-keepsafe-tls.key`,
209+
for safe keeping. Easy-RSA will display a warning that this key is still
210+
valid and possibly in use, before allowing another TLS key to be generated.
211+
212+
3. Use command `build-ca`
213+
214+
(With or without password and other preferences)
215+
216+
This will build a completely new CA Certificate and private key.
217+
218+
Use option `--days` to extend the lifetime of your new CA.
219+
220+
4. Use command `sign-req <TYPE> <NAME>`
221+
222+
(With or without other preferences, password is not relavent)
223+
224+
This will use an existing Request to sign a new Certificate.
225+
226+
This will NOT generate a new Private Key for each new Certificate.
227+
228+
This will generate new `inline` files that can be distributed publicly.
229+
These `inline` files will not contain any security sensitive data.
230+
231+
This means that you will have a new CA certificate and private key.
232+
And signed certificates for all of your users, including servers.
233+
234+
5. Distribute the new `inline` files to all members of your PKI/VPN.
235+
236+
These new `inline` files will not contain the user private key or the
237+
OpenVPN Pre-shared TLS key.
238+
239+
These new `inline` files can be used by OpenVPN, examples below:
240+
241+
* specify: `--config <INLNE-FILE>` in the OpenVPN user config file.
242+
* Use copy/paste to add the new details to the OpenVPN user config file.
243+
* Use `cat` to append the `inline` file to the OpenVPN user config file.
244+
245+
Note:
246+
`inline` files in the `pki/inline/private` directory include security keys,
247+
which MUST only be transmitted over a secure connection, such as `https`.
248+
249+
As of Easy-RSA Version 3.2.1, this is the only supported way to renew an
250+
expired CA certificate.

0 commit comments

Comments
 (0)