You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
> curl -k -LO https://acme.lan:8443/roots.pem
% Total % Received % Xferd Average Speed Time Time Time Current
Dload Upload Total Spent Left Speed
100 619 100 619 0 0 17150 0 --:--:-- --:--:-- --:--:-- 18757
> curl https://acme.lan:8443/roots.pem
curl: (35) schannel: next InitializeSecurityContext failed: CRYPT_E_NO_REVOCATION_CHECK (0x80092012) - The revocation function was unable to check revocation for the certificate.
X509v3 extension X509v3 CRL Distribution Points: be present in the certificate that CA HTTPS server presents to clients.
X509v3 CRL Distribution Points: Full Name: URI: equates to URL configured in crl.idpURL
Actual Behavior
After enabling crl in ca.json, CRLDistributionPoints wont appear on certificates that CA HTTPS server presents to clients.
Additional Context
Such curl behavior is specific to windows, curl in linux does not complain.
CRL works fine (CRLDistributionPoints appears on certs) for my JWK and ACME provisioners. They were configured following these guidelines #1423 (comment)
It seems that CA HTTPS server does not use for its certificates any particular template that the user could configure.
I was not able to immediately identify any dependence on a.config.CRL.IsEnabled() in authority.GetTLSCertificate function
// GetTLSCertificate creates a new leaf certificate to be used by the CA HTTPS server.
Contributing
Vote on this issue by adding a 👍 reaction.
To contribute a fix for this issue, leave a comment (and link to your pull request, if you've opened one already).
The text was updated successfully, but these errors were encountered:
Steps to Reproduce
On windows
Your Environment
Server:
Client
Expected Behavior
After enabling
crl
inca.json
it is expected:X509v3 CRL Distribution Points:
be present in the certificate that CA HTTPS server presents to clients.X509v3 CRL Distribution Points: Full Name: URI:
equates to URL configured incrl.idpURL
Actual Behavior
After enabling
crl
inca.json
,CRLDistributionPoints
wont appear on certificates that CA HTTPS server presents to clients.Additional Context
Such curl behavior is specific to windows, curl in linux does not complain.
CRL works fine (
CRLDistributionPoints
appears on certs) for myJWK
andACME
provisioners. They were configured following these guidelines #1423 (comment)It seems that CA HTTPS server does not use for its certificates any particular template that the user could configure.
I was not able to immediately identify any dependence on
a.config.CRL.IsEnabled()
inauthority.GetTLSCertificate
functioncertificates/authority/tls.go
Line 859 in 9355923
Contributing
Vote on this issue by adding a 👍 reaction.
To contribute a fix for this issue, leave a comment (and link to your pull request, if you've opened one already).
The text was updated successfully, but these errors were encountered: