I am using puppet agent 3.4.3 and still see this as an issue. I found these tickets in the old tracking system related to my intended objectives:
*
https://projects.puppetlabs.com/issues/3143
I can get everything working properly by setting the following in puppet.conf on each agent:
certificate_revocation = false
I would rather leave that at the default, true, but it appears this is not possible at this time.
certificate_revocation
Whether certificate revocation should be supported by downloading a Certificate Revocation List (CRL) to all clients. If enabled, CA chaining will almost definitely not work.
Default: true
"Certificate revocation list (CRL) checking works in all three supported configurations, so long as the CRL file is distributed to the agents and masters using an “out of band” process. Puppet won’t automatically update the CRL on any of the components in the system."
This statement is false with option 3. The nice thing about option 3 is that is prevents agent certificates from being used to act as a master. With some name resolution trickery someone could cause havoc if they have certificates that allow an arbitrary machine to act as a puppet master.
There have been multiple approaches proposed to work around this limitation in the product:
- OCSP support, negating the need to support CRLs, though this would only solve the problem for CA's that support OCSP
- CRL directory (versus file) support, comparable to Apache's SSLCARevocationPath
Curious where this stands.
Thanks,
Axton Grams