Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Renewal: Preserve 'OCSP Must Staple' (option --must-staple) #3844

Closed
thomaszbz opened this issue Dec 3, 2016 · 4 comments
Closed

Renewal: Preserve 'OCSP Must Staple' (option --must-staple) #3844

thomaszbz opened this issue Dec 3, 2016 · 4 comments

Comments

@thomaszbz
Copy link
Contributor

thomaszbz commented Dec 3, 2016

Description:

Via #2626, Certbot creates a certificate with OCSP Must Staple TLS extension when called with option --must-staple. Please note that this TLS extension is contained in the generated certificate file itself.

However, the option --must-staple is not stored in /etc/letsencrypt/renewal/www.example.com.conf. In my case:

[renewalparams]
installer = apache
authenticator = apache
rsa_key_size = 4096
account = abc

There also seems not to be an entry for OCSP Must Staple in the test file.

When executing certbot renew for renewal, certbot renews certificates without OCSP Must Staple, extension respectively.

Suggested Fix:

  • For renewal, certbot should be aware that the old certificate was generated with --must-staple. That information should be stored in the [renewalparams] section, respectively.
  • For certbot renew, the new certificate should be generated with --must-staple, in case the old certificate was generated with that extension.

Use case:

  • I have some certificates which I want to renew with --must-staple, because e.g. apache supports that.
  • I have other certificates which I use with other software (e.g. an ancient mailserver) which does not support OCSP at all.
  • For certbot renew, certbot should be aware which one is which, using [renewalparams]. Otherwise, certbot renew would not qualify to be used for automation in my case.

Version:

certbot --version
certbot 0.9.3

OS: Debian 8, with certbot installed via official debian repository.

@thomaszbz thomaszbz changed the title Renewal: Preserve --oscp-must-staple Renewal: Preserve OSCP --must-staple Dec 3, 2016
@thomaszbz thomaszbz changed the title Renewal: Preserve OSCP --must-staple Renewal: Preserve 'OCSP Must Staple' (option --must-staple) Dec 3, 2016
@pde
Copy link
Member

pde commented Dec 3, 2016

Thanks for catching this!

@pde
Copy link
Member

pde commented Dec 3, 2016

We should think about whether any other security enhancements should also be stored in renewal conf files -- most of them don't need to be, because they're one-off calls to the IInstaller.

@thomaszbz
Copy link
Contributor Author

related: #3394

thomaszbz added a commit to thomaszbz/certbot that referenced this issue Dec 7, 2016
schoen added a commit that referenced this issue Jan 5, 2017
Preserve --must-staple in configuration for renewal (#3844)
together with updated version of PR #3948 Save allow_subset_of_names in renewal conf files
@thomaszbz
Copy link
Contributor Author

Now that PR #3948 got merged and includes my commits, I think this issue should be solved and can be closed.

TheNavigat pushed a commit to TheNavigat/letsencrypt that referenced this issue Feb 1, 2017
TheNavigat pushed a commit to TheNavigat/letsencrypt that referenced this issue Feb 1, 2017
TheNavigat pushed a commit to TheNavigat/letsencrypt that referenced this issue Feb 1, 2017
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

2 participants