View Issue Details
ID | Project | Category | View Status | Date Submitted | Last Update |
---|---|---|---|---|---|
0000444 | Main CAcert Website | certificate issuing | public | 2007-06-22 03:34 | 2011-09-26 07:40 |
Reporter | home_distiller | Assigned To | evaldo | ||
Priority | normal | Severity | feature | Reproducibility | always |
Status | needs work | Resolution | open | ||
Summary | 0000444: Automated Certificate Issuing | ||||
Description | It would be nice for people/companies that host websites for other people to easily be able to issue certificates with lots of subjectAltNames so that all sites can be hosted on the same IP and as new domains are added or removed new certificates can easily be generated reflecting the changes. The reason this is important is due to all the unencrypted traffic that is not only being sniffed, but also recorded so the more traffic that can be encrypted the better. | ||||
Tags | No tags attached. | ||||
Reviewed by | |||||
Test Instructions | |||||
related to | 0000425 | needs work | Missing parameter to select the root cert, at the API |
|
We already have an API: http://wiki.cacert.org/wiki/CertApi We have thought about implementing an automatic enrollment into mod-ssl, but we don´t have the development capacities for it yet. |
|
If you are not into an API, try my script (or even improve it) http://evaldo.gardenali.biz/cacert/csr Sourcerer: what do you think about people pasting the openssl public key (not csr) on the website, and typing their subjectaltnames on a web form, then CAcert assembles the CSR and gives them the signed cert? |
|
CSR´s are digitally signed requests. So the people would have to upload their openssl secret key as well. Nah, that´s not a good idea. |
|
Is a CSR signed? Then how the CAcert website edits the pasted CSRs (strip unrecognized data) and can still create certificates based on them? We can clearly do that already, we just need to do it the right way. |
|
CSR are signed by the requestor in order to prove that the requestor owns the private key. The CA doesn't sign the CSR as such, but the relation between public key and CN - and it's up to the CA *which* CN it uses. (Compare this to GPG keys: only the key owner can create self-signed UIDs, but anyone can add and sign any UID to any key.) So theoretically it should be possible to create a cert from a public key and a list of subjectAltNames. But you have to skip the CSR somehow. |
|
What I mean is: We currently create certificates with data that may come from the CSR, from the database, and we may strip data from the CSR. this already works. We just need the right user interface. |
|
Evaldo: Can you integrate the CertApi into your script, to make it even more automatic? |
|
Sure! Give me the right API call for signing a certificate ? :P |
Date Modified | Username | Field | Change |
---|---|---|---|
2007-06-22 03:34 | home_distiller | New Issue | |
2007-06-22 11:15 | Sourcerer | Note Added: 0000848 | |
2007-06-22 17:11 | evaldo | Note Added: 0000849 | |
2007-06-22 17:20 | Sourcerer | Note Added: 0000852 | |
2007-10-24 08:08 | evaldo | Note Added: 0000915 | |
2007-10-24 08:08 | evaldo | Status | new => confirmed |
2007-10-24 10:14 | pc | Note Added: 0000927 | |
2007-10-24 10:42 | evaldo | Note Added: 0000928 | |
2007-11-04 01:24 | Sourcerer | Note Added: 0000940 | |
2007-11-04 01:25 | Sourcerer | Status | confirmed => needs work |
2007-11-04 01:25 | Sourcerer | Assigned To | => evaldo |
2007-11-17 17:04 | evaldo | Note Added: 0000954 | |
2011-09-26 07:40 | Ted | Relationship added | related to 0000425 |