Smallstep: End-to-end encryption for distributed applications and the people who manage them. (we’re on Pacific Time)
Hi All
We have a use case where we revoke certificate using step ca and create, renew certificate using dehydrated
It is seen that certificate is successfully being revoked yet, renew of the same certificate is also happening, which must not ideally according to https://smallstep.com/docs/step-cli/reference/ca/revoke#description
Please help us resolve this issue, Thanks in Advance!
Here is the detailed command output:
[root@gl-seednode-jc dehydrated]# ./dehydrated --domain 'gl-seednode-jc.glhc-hpe.local' --cron --force
hook.py: Unknown hook handler
hook.py: startup_hook
Processing gl-seednode-jc.glhc-hpe.local
[root@gl-seednode-jc dehydrated]# step ca revoke --cert certs/gl-seednode-jc.glhc-hpe.local/fullchain.pem --key certs/gl-seednode-jc.glhc-hpe.local/privkey.pem
✔ CA: https://172.16.5.124:8282
Certificate with Serial Number 307300703289760345466735924092426714995 has been revoked.
[root@gl-seednode-jc dehydrated]# ./dehydrated --domain 'gl-seednode-jc.glhc-hpe.local' --cron --force # INFO: Using main config file /home/glcgadmin/vmaas-ansible-repo/dehydrated/config
hook.py: Unknown hook handler
hook.py: startup_hook
Processing gl-seednode-jc.glhc-hpe.local
hook.py: Unknown hook handler
step ca revoke
is tied to step ca renew
. What I mean by that is, if you use a different method to renew the cert then it doesn’t actually go through the same processes. For example, regular ACME client renewal does not work the same way that step ca renew
works. In the ACME protocol when you renew a cert you don’t send in the old cert. You just go through the ACME protocol once more with the same information.
step ca revoke
only works if you plan to use step ca renew
for renewals. For other clients it “probably” will not work because other clients do not send in the old certificate as part of the renewal flow.
step ca renew
. It has all sorts of useful flags that allow it to run as a daemon, periodically attempt renewal, etc.
Hello,
In my GCP account, I have distributed an instance of Smallstep ACME Registration Authority for CAS to test the product. The sensations are very good; the deploy has been very fast and easy. Congratulations on the product. One question, can an ACME smallstep server only issue final certificates from a subCA generated in Google CAS? In other words, is the caCAS value unique? Can't it have several values? I mention this because if an enterprise's PKI infrastructure is generated in Google, it is very likely that it is made up of several SubCA's ( my on-premise PKI is made up of four SubCA's, for example, for compliance needs among others... ) Thank you.
step ca token
to work out the sort of token you'd want your server to generate.
step ca certificate
using --token
to request a certificate from the CA using a token)
step-ca
be an intermediate in that sort of setup.
error validating ACME Challenge at https://tinyca.lan/acme/acme/challenge/Rrk1iKFeEjDRkFu0w025Ogty17RsL2R0: client GET https://tinyca.lan/acme/acme/new-order failed: Post "https://tinyca.lan/acme/acme/challenge/Rrk1iKFeEjDRkFu0w025Ogty17RsL2R0": stream error: stream ID 17; INTERNAL_ERROR