All of these approaches have already been suggested in this thread. Is it 
really necessary that we go through them again?

Rich Salz's suggestion of using a UUID for the serial number makes collisions 
sufficiently improbable that the possibility can be ignored, and it's simpler 
than any of the other proposals.

Michael Wojcik
Technology Specialist, Micro Focus


From: owner-openssl-us...@openssl.org [mailto:owner-openssl-us...@openssl.org] 
On Behalf Of Tim Hudson
Sent: Tuesday, 29 April, 2014 16:32
To: openssl-users@openssl.org
Subject: Re: Increment certificate serial numbers randomly

On 30/04/2014 6:05 AM, Walter H. wrote:
On 29.04.2014 21:38, d...@deadhat.com<mailto:d...@deadhat.com> wrote:


This all seems unecessarily complex. Make the serial number a 256 bit or
greater true random number. There will be no collisions.
the serial number has maximum length ..., 256 bit is quite too big ..

In X.509 terms the serial number is an ASN1 integer value so there is no real 
length limit.
It is also pretty common to see the output of a HASH operation used as a serial 
number in a certificate.
However in the context of everyone separately picking an RNG output value (on 
separate systems) there is no guarantee of zero collisions.

If you are installing the same "root" on multiple machines that don't 
coordinate then just auto-edit the serial file (if using the ca program) and 
put a unique prefix on the front. Perhaps just grab the machine MAC and add 
that in. And then the auto-incrementing handling will sort that out. The serial 
number format is simply a hex string value.

e.g. something like this could work (and there are better ways to do this - it 
is just to get you started down a path that may solve the original posters 
immediate issue)

ifconfig eth0 | grep HWaddr| awk '{print $NF}'| sed -e 's/://g'; echo "000000" 
> path-to-ca-serial-file

Tim.



Click here<https://www.mailcontrol.com/sr/MZbqvYs5QwJvpeaetUwhCQ==> to report 
this email as spam.


This message has been scanned for malware by Websense. www.websense.com

Reply via email to