Skip to content

Client certificates

Øyvind Hagberg edited this page Mar 13, 2019 · 2 revisions

How Nivlheim renews its CA certificate (not to be confused with the https certificate):

Nivlheim publishes a bundle with its currently active CA certificates at https://<servername>/clientca.pem

There is a cron job that runs every day: /etc/cron.daily/client_CA_cert.sh
It checks the expiry date of the currently active CA certificate.

  1. If the CA certificate will expire in less than 30 days, it creates a new one. It will be placed alongside the current one in /var/www/nivlheim/CA, and added to the bundle clientca.pem. But new client certificates will still be signed with the old (current) CA for now.
  2. If the CA certificate will expire in less than 9 days, it activates the new one. Than means moving the files into place in /var/www/nivlheim/CA. The webserver is then restarted to make it read the new cert bundle.

How to manually trigger these operations:

  • sudo /etc/cron.daily/client_CA_cert.sh --force-create --verbose
  • sudo /etc/cron.daily/client_CA_cert.sh --force-activate --verbose