Hi,

On Thu, Jul 22, 2021 at 3:40 AM Ralf Hildebrandt <
ralf.hildebra...@charite.de> wrote:

> * Bo Berglund <bo.bergl...@gmail.com>:
> > On Wed, 21 Jul 2021 10:57:50 +0200, Ralf Hildebrandt
> > <ralf.hildebra...@charite.de> wrote:
> >
> > >But how do I do this? Can I make openvpn accept client certificates
> > >from two CAs (the old and the new one)?
> >
> > Why using a new certificate?
>
> I need a new CA due to the german BSI crypto regulations (RSA 2048 is
> not enough)
>
>
The usual approach for updating CA would be to use cross-signed (or link)
certificates. I haven't tried it with OpenVPN, but here is a thought:

First update the server cert signed by the new CA but include a link cert
for the new CA  signed by the old CA. That will make it possible for
clients to still verify the new server cert. Change the CA cert on the
server to a stack of old and new CA. Then gradually update the cert and ca
on clients to the new one (new CA only not old+new). When all clients are
updated remove the old CA cert and the link cert on the server.

Totally untested.

Selva
_______________________________________________
Openvpn-users mailing list
Openvpn-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-users

Reply via email to