@@ -6,7 +6,7 @@ with regard to Renewal and Revocation of Certificates.
6
6
7
7
## In summary:
8
8
9
- ** Easy-RSA Version 3.1.7** provides the most flexible support of renewal.
9
+ ** Easy-RSA Version 3.1.7** provides the most flexible support of renewal.
10
10
This includes command ` rewind-renew ` , which is required to recover certificates
11
11
renewed by ` renew ` command version 1. However, this does ** not** include renewing
12
12
any supported certificate attributes.
@@ -33,7 +33,7 @@ The follow is an exhaustive list of available `reason` codes, with abbreviations
33
33
----
34
34
35
35
Easy-RSA version 3.2.x
36
- ----------------------
36
+ ======================
37
37
For ** Easy-RSA Version 3.2.0** , command ` renew ` is NOT supported.
38
38
39
39
Please upgrade to Easy-RSA Version 3.2.1
@@ -75,11 +75,7 @@ to be edited the same way.
75
75
----
76
76
77
77
Easy-RSA version 3.1.x
78
- ----------------------
79
-
80
- ** UPDATE** :
81
- The changes noted for Easy-RSA version 3.1.2 have all been included with
82
- Easy-RSA version 3.1.1 - See https://github.com/OpenVPN/easy-rsa/pull/688
78
+ ======================
83
79
84
80
Command Details: ` renew `
85
81
------------------------
@@ -190,4 +186,65 @@ an old certificate/key pair, which has been _rebuilt_ by command `rebuild`.
190
186
Renew CA Certificate
191
187
====================
192
188
193
- TBD
189
+ Easy-RSA Version 3.2.1+ supports a simple way to effectively renew a CA Certificate.
190
+
191
+ ** Preamble** - Specifically for use with OpenVPN:
192
+
193
+ When a CA certificate expires it must be replaced, this is unavoidable.
194
+ No matter what method is used to create a new or renewed CA certificate,
195
+ that CA certificate must be distributed to all of your servers and clients.
196
+
197
+ Please consider the method outlined here, which requires very little work:
198
+
199
+ 1 . ** Before you do anything else -- Make a BACKUP of your current PKI.**
200
+
201
+ 2 . Use command ` init-pki soft `
202
+
203
+ This will reset your current PKI but will keep your ` vars ` setting file
204
+ and your current Request files [ CSR] , in the ` pki/reqs ` directory.
205
+
206
+ If you have an Easy-RSA generated TLS key for OpenVPN, that will also be
207
+ preserved. However, it will NOT be used for new ` inline ` files. The file
208
+ ` pki/private/easyrsa-tls.key ` will be moved to ` pki/easyrsa-keepsafe-tls.key ` ,
209
+ for safe keeping. Easy-RSA will display a warning that this key is still
210
+ valid and possibly in use, before allowing another TLS key to be generated.
211
+
212
+ 3 . Use command ` build-ca `
213
+
214
+ (With or without password and other preferences)
215
+
216
+ This will build a completely new CA Certificate and private key.
217
+
218
+ Use option ` --days ` to extend the lifetime of your new CA.
219
+
220
+ 4 . Use command ` sign-req <TYPE> <NAME> `
221
+
222
+ (With or without other preferences, password is not relavent)
223
+
224
+ This will use an existing Request to sign a new Certificate.
225
+
226
+ This will NOT generate a new Private Key for each new Certificate.
227
+
228
+ This will generate new ` inline ` files that can be distributed publicly.
229
+ These ` inline ` files will not contain any security sensitive data.
230
+
231
+ This means that you will have a new CA certificate and private key.
232
+ And signed certificates for all of your users, including servers.
233
+
234
+ 5 . Distribute the new ` inline ` files to all members of your PKI/VPN.
235
+
236
+ These new ` inline ` files will not contain the user private key or the
237
+ OpenVPN Pre-shared TLS key.
238
+
239
+ These new ` inline ` files can be used by OpenVPN, examples below:
240
+
241
+ * specify: ` --config <INLNE-FILE> ` in the OpenVPN user config file.
242
+ * Use copy/paste to add the new details to the OpenVPN user config file.
243
+ * Use ` cat ` to append the ` inline ` file to the OpenVPN user config file.
244
+
245
+ Note:
246
+ ` inline ` files in the ` pki/inline/private ` directory include security keys,
247
+ which MUST only be transmitted over a secure connection, such as ` https ` .
248
+
249
+ As of Easy-RSA Version 3.2.1, this is the only supported way to renew an
250
+ expired CA certificate.
0 commit comments