Forgot to include the list in my reply. Below are the steps I did to use
stacked certificates so as to gradually roll out new certs:

https://alexkaouris.medium.com/openvpn-roll-out-new-certificates-5ddcd1b3a6f3

Thanks to Rui for the tips.

Cheers,
Alex

On Wed, 27 Nov 2024 at 7:13 PM, Rui Santos <rsan...@ruisantos.com> wrote:

> Great to hear that 🙂
>
> Your notes were far better than my text on the mailing list 😞
> Could you probably share those same notes to the list, it may help others?
>
> Cheers,
> Rui
>
> On Wed, 27 Nov 2024, 17:00 Alex K, <rightkickt...@gmail.com> wrote:
>
>> Yes Rui, it worked great. Using stacked CA at both sides provides the
>> flexibility to roll out the certs gradually.
>>
>> Thanks for the pointer. It was really helpful.
>>
>> On Wed, 27 Nov 2024 at 9:52 AM, Rui Santos <rsan...@ruisantos.com> wrote:
>>
>>> Hi Alex,
>>>
>>> Did it work as you expected?
>>>
>>> Regards,
>>> Rui
>>>
>>> On Tue, 26 Nov 2024, 22:55 Alex K, <rightkickt...@gmail.com> wrote:
>>>
>>>> Hi Rui,
>>>>
>>>> Thanks for your reply. I was able to stack both CAs into the same
>>>> config at server and client side and simulated a certs roll-out. I did the
>>>> following steps:
>>>>
>>>> - issue new CA and server certificates
>>>> - create a stacked CA (containing the old and the new CA) and load on
>>>> server and clients.
>>>> - roll-out new client certs
>>>> - eventually decommission old server certs and install new ones.
>>>>
>>>> On Tue, 26 Nov 2024 at 7:41 PM, Rui Santos <rsan...@ruisantos.com>
>>>> wrote:
>>>>
>>>>> Hi Alex,
>>>>>
>>>>> Both client and server accept certificates from a specific trusted
>>>>> Certificate Authority. If you keep the same CA, then you can just
>>>>> issue new certificates for server and clients, using that same CA.
>>>>>
>>>>> If you have a new CA, you'll need to include both CA's, for both
>>>>> server and clients in advance, on their configuration file. Once it's
>>>>> propagated, you should be able to issue new certificates using the new
>>>>> CA, and they'll be accepted.
>>>>> Once all are running smoothly using the new CA, just remove the old
>>>>> one from the config files :)
>>>>>
>>>>> Hope this helps.
>>>>>
>>>>> Regards,
>>>>> Rui
>>>>>
>>>>>
>>>>> On Tue, Nov 26, 2024 at 5:33 PM Alex K <rightkickt...@gmail.com>
>>>>> wrote:
>>>>> >
>>>>> > Hi all,
>>>>> >
>>>>> > I was wondering how can one tackle the issue of issuing new
>>>>> certificates to clients and the server which expire at some point with the
>>>>> minimum downtime. The issue is that it seems I need to go with a big bang
>>>>> approach where the server certificates are replaced with new ones and then
>>>>> have all the clients updated somehow to use the new client certificates.
>>>>> This seems like a headache when one has to manage hundreds of remote
>>>>> clients that might not be accessible out of vpn.
>>>>> >
>>>>> > Is there any alternative approach which can resemble a gradual
>>>>> roll-out? Perhaps through the use of additional vpn port at server side
>>>>> which uses the new certificates and have clients updated to use the new
>>>>> port and fail back to the previous one in case of issue? Looked also if I
>>>>> could load a stacked certificate at the server and have the same server
>>>>> authenticate both existing client certificates and new ones but the server
>>>>> was complaining about the certificate.
>>>>> >
>>>>> > Apart from automating this with other tooling such as Ansible or
>>>>> code, is there any other approach or openvpn feature that might help with
>>>>> such kind of migrations? How do you usually tackle this problem?
>>>>> >
>>>>> > Thanks,
>>>>> > Alex
>>>>> > _______________________________________________
>>>>> > Openvpn-users mailing list
>>>>> > Openvpn-users@lists.sourceforge.net
>>>>> > https://lists.sourceforge.net/lists/listinfo/openvpn-users
>>>>>
>>>>>
>>>>>
>>>>> --
>>>>> Rui Santos
>>>>> Veni, Vidi, Linux
>>>>>
>>>>
_______________________________________________
Openvpn-users mailing list
Openvpn-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-users

Reply via email to