Jira (PUP-8639) need seamless way to replace expiring CA certificate

4 views
Skip to first unread message

James Ralston (JIRA)

unread,
Apr 6, 2018, 4:31:06 PM4/6/18
to puppe...@googlegroups.com
James Ralston created an issue
 
Puppet / New Feature PUP-8639
need seamless way to replace expiring CA certificate
Issue Type: New Feature New Feature
Assignee: Unassigned
Created: 2018/04/06 1:30 PM
Priority: Normal Normal
Reporter: James Ralston

What realistic option does a Puppet open source site have if the expiration on the CA master certificate is approaching, and one wants to smoothly transition to a new CA master certificate?

The only official documentation I can find that comes close to this is the following:

https://puppet.com/docs/puppet/5.5/ssl_regenerate_certificates.html

But that procedure is describing an apocalypse-level security event where all certificates must be treated as untrustworthy and discarded.

There is this:

https://forge.puppet.com/puppetlabs/certregen

…but that module hasn't been updated in almost a year, and is incompatible with Puppet 5, because Puppet 5 removed puppet certregen and replaced it with… nothing, as far as I can tell.

The only potential solution I can see is this:

https://blog.flyingcircus.io/2017/09/01/how-to-renew-puppet-ca-and-server-certificates-in-place/

Perhaps PE already has a smooth way to do this, but there needs to be a smooth way to do this for Puppet open source as well, without sending sites running open source scurrying to random third-party blog posts.

I realize this is both a very unsexy and very challenging issue to solve, but for the sites that need to solve it… it's a DEFCON 1 event.

Add Comment Add Comment
 
This message was sent by Atlassian JIRA (v7.7.1#77002-sha1:e75ca93)
Atlassian logo

James Ralston (JIRA)

unread,
Apr 6, 2018, 5:26:03 PM4/6/18
to puppe...@googlegroups.com
James Ralston commented on New Feature PUP-8639
 
Re: need seamless way to replace expiring CA certificate

Correction: someone asserted that puppet certregen is a face that the puppetlabs-certregen modules adds.

But per the module dependencies, the module doesn't work with Puppet 5, and doesn't seem to be under active development.

Eric Sorenson (JIRA)

unread,
Apr 16, 2018, 7:57:03 PM4/16/18
to puppe...@googlegroups.com

Eric Sorenson (JIRA)

unread,
Apr 16, 2018, 8:01:34 PM4/16/18
to puppe...@googlegroups.com

Eric Sorenson (JIRA)

unread,
Apr 16, 2018, 8:01:38 PM4/16/18
to puppe...@googlegroups.com
Eric Sorenson commented on New Feature PUP-8639
 
Re: need seamless way to replace expiring CA certificate

James Ralston thanks for the report - the certregen module is indeed the right way to go here, it just needs some love and attention.

I've put up a PR to bring it into "modern" puppet land, with support for Puppet 5 and some fixes that would have prevented it from working correctly: https://github.com/puppetlabs/puppetlabs-certregen/pull/43

Can you try it out and make sure it works for you? I'll get a blog post up on the official Puppet blog in the next couple of weeks - the code itself is really good work, we just took our eye off it before getting to the "waving banners and flags" promotional bit.

 

Eric Sorenson (JIRA)

unread,
Apr 16, 2018, 8:14:02 PM4/16/18
to puppe...@googlegroups.com
Eric Sorenson updated an issue
Change By: Eric Sorenson
What realistic option does a Puppet open source site have if the expiration on the CA master certificate is approaching, and one wants to smoothly transition to a new CA master certificate?

The only official documentation I can find that comes close to this is the following:

[ https://puppet.com/docs/puppet/5.5/ssl_regenerate_certificates.html ]

But that procedure is describing an apocalypse-level security event where all certificates must be treated as untrustworthy and discarded.

There is this:

[ https://forge.puppet.com/puppetlabs/certregen ]


…but that module hasn't been updated in almost a year, and
is incompatible doesn't express compatibility with Puppet 5 , because Puppet 5 removed {{puppet certregen}} and replaced it with… nothing, as far as I can tell.

The only potential solution I can see is this:

[ https://blog.flyingcircus.io/2017/09/01/how-to-renew-puppet-ca-and-server-certificates-in-place/ ]

Perhaps PE already has a smooth way to do this, but there needs to be a smooth way to do this for Puppet open source as well, without sending sites running open source scurrying to random third-party blog posts.

I realize this is both a very unsexy and very challenging issue to solve, but for the sites that need to solve it… it's a DEFCON 1 event.

Adrian Parreiras Horta (JIRA)

unread,
May 2, 2019, 5:03:02 PM5/2/19
to puppe...@googlegroups.com

Josh Cooper (Jira)

unread,
Aug 21, 2020, 6:52:04 PM8/21/20
to puppe...@googlegroups.com
Josh Cooper commented on New Feature PUP-8639

I think this could be handled as described in PUP-10639

This message was sent by Atlassian Jira (v8.5.2#805002-sha1:a66f935)
Atlassian logo

Josh Cooper (Jira)

unread,
Jan 5, 2023, 12:23:01 PM1/5/23
to puppe...@googlegroups.com
Josh Cooper commented on New Feature PUP-8639

I'm going to close this as a dup of PUP-10639 as that's what we're using internally to track this issue.

This message was sent by Atlassian Jira (v8.20.11#820011-sha1:0629dd8)
Atlassian logo
Reply all
Reply to author
Forward
0 new messages