Giter Site home page Giter Site logo

mandatory SAN about easy-rsa HOT 16 CLOSED

nimbius avatar nimbius commented on August 15, 2024
mandatory SAN

from easy-rsa.

Comments (16)

nimbius avatar nimbius commented on August 15, 2024 1

i suppose i meant the feature. for example:

AUTO_SAN =1 # populate an initial SAN entry for certificates using the base name specified during certificate creation

from easy-rsa.

nimbius avatar nimbius commented on August 15, 2024 1

dude why post this? you had half a dozen opportunities to make this clear, well reasoned statement about the intent and direction of the project and instead chose to turn the discussion into a carnival game I cant win.

if you knew you were never going to support this option, and you knew you had removed it from the code in a prior release, why bother?

from easy-rsa.

TinCanTech avatar TinCanTech commented on August 15, 2024

A SAN is, by definition, an alternative name.

How would you define a default "mandatory" alternative name ?

from easy-rsa.

nimbius avatar nimbius commented on August 15, 2024

sorry for such a terse little issue, i know these arent terribly useful. maybe mandatory is the wrong choice of word too.

rfc2818 specifies Subject Alternative Names as the preferred method of adding DNS names to certificates, deprecating the previous method of putting DNS names in the commonName field. Chrome removed support for checking the commonName field at all about 4-5 years ago, instead only looking at the SANs. firefox naturally balks at certs without a SAN. curl and wget dont seem to mind however.

I think it would be a good idea to take the base name supplied for build-server-full and insert it as a SAN entry, since the base name is often the DNS name of the certificate being generated. this could be an option in vars perhaps.

from easy-rsa.

TinCanTech avatar TinCanTech commented on August 15, 2024

How would you define a variable alternative name in a global vars file ?

from easy-rsa.

TinCanTech avatar TinCanTech commented on August 15, 2024

That would require another command line option, eg. --auto-san.

Which is no improvement over current use of --san=foo.

from easy-rsa.

nimbius avatar nimbius commented on August 15, 2024

how should easyrsa meet rfc2818? is it reasonable to add --san to each invocaction?

from easy-rsa.

TinCanTech avatar TinCanTech commented on August 15, 2024

how should easyrsa meet rfc2818?

By what contract is EasyRSA compelled to conform to RFC2818 ?

Furthermore, RFC2818 is bound by RFC2459. In its current form EasyRSA does not and cannot comply to RFC2459.

is it reasonable to add --san to each invocaction?

Yes, because there is no specified relationship of CN or DN to SAN. EasyRSA does not make assumptions pertaining to use of names.

If your certificate requires an alternate name then, as CA administrator, that is your responsibility to define, as per what ever conventions you choose to adhere to.

If, by RFC, a standardised relationship between CN/DN to SAN is established then EasyRSA may choose, or not, to comply to that definition.

from easy-rsa.

nimbius avatar nimbius commented on August 15, 2024

The idea was to make the software easier to use so people didnt have to type --san=DNS: every time which is a chore and makes the program tedious to use.

is there an easer way to do this? maybe im going about it wrong.

from easy-rsa.

TinCanTech avatar TinCanTech commented on August 15, 2024

And how many unique server certificates do you create per day, to make this so tedious ?

from easy-rsa.

nimbius avatar nimbius commented on August 15, 2024

clearly enough to suggest a nice feature like automatic SAN to make the program easier to use :)

I can get to work on a PR if that would help. maybe if --san is specified, then the feature is disabled in favour of the user input instead?

from easy-rsa.

TinCanTech avatar TinCanTech commented on August 15, 2024

clearly enough to suggest a nice feature like automatic SAN

"clearly", you have not answered the question.

to make the program easier to use :)

Use of --san is explicit and easy.

I can get to work on a PR if that would help.

It would not.

maybe if --san is specified, then the feature is disabled in favour of the user input instead?

Negative - Auto-SAN of unsuitable data will not become default, again..

If you specifically require auto-SAN then please use EasyRSA v3.1.7.

from easy-rsa.

nimbius avatar nimbius commented on August 15, 2024

so it was added, and then removed? why?

from easy-rsa.

TinCanTech avatar TinCanTech commented on August 15, 2024

why?

Please see: My first reply.

from easy-rsa.

TinCanTech avatar TinCanTech commented on August 15, 2024

FTR, The intention here is as follows:

When creating a server certificate, the CN from the command line
is intended to be used as the SAN.

Example 1:

$ easyrsa build-server-full www.example.com

This would add a SAN of DNS:www.example.com.
On top of which, the proposal also leaned toward making this
behavior be default. As in EasyRSA v3.1.7

Example 2:

$ easyrsa build-server-full server

Which would add a SAN of DNS:server.
This SAN technically breaks the expected use case cited in RFCs
listed above.

So, this naive version of Auto-SAN must be used correctly to be
of any production value and used incorrectly would likely result
in further breakages, which EasyRSA can do without.

For this and other reasons, automatic SAN is rejected.

If you need a SAN then you "and only you" can provide one.
Do so via option --san (See help for more info).


Also, comments like this:

since the base name is often the DNS name of the certificate being generated

are blind assumption and incorrect.

from easy-rsa.

TinCanTech avatar TinCanTech commented on August 15, 2024

Reasons:

  • I gave you the opportunity to state your case.
  • This discussion can now be referred back to.
  • The final comment serves as a reminder for future reference.

you had half a dozen opportunities to make this clear, well reasoned statement about the intent and direction of the project

Opportunities that I took, which you chose to over look.


instead chose to turn the discussion into a carnival game I cant win

An opportunity to learn... You can't win them all.

Besides, you don't win a discussion. Discussions happen and observers make their own decisions.

All participants are observers but not all observers are participants.


Easy-RSA already provides an easy way to use OpenSSL.

Easy-RSA will not cater the level of laziness on display in this feature request.

The option is --san, please use it.

Until there is an RFC which outlines how commonName should influence SAN, this feature will not be accepted as an Easy-RSA feature. Easy-RSA will not pollute all Server certificates with an invalid SAN DNS name, just for the convenience of a few lazy people.

It's just a little bit of history repeating ..

Maybe --auto-san is ok. #1180

from easy-rsa.

Related Issues (20)

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.