Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Multiple Vault CAs have expired CRLs #79

Open
nmattingly opened this issue Aug 26, 2021 · 2 comments
Open

Multiple Vault CAs have expired CRLs #79

nmattingly opened this issue Aug 26, 2021 · 2 comments
Labels
enhancement New feature or request

Comments

@nmattingly
Copy link

PROBLEM SUMMARY
On 8/20, we noticed that a few of the Vault CAs that are used with plugin have expired CRLs. Some of the CAs have since updated their CRL, but have also expired again.

We have opened a ticket with HashiCorp support, they have recommended that we engage Venafi.

  1. Why are CRLs expiring without renewal?
  2. How can the CRLs be manually renewed?

STEPS TO REPRODUCE
We have not been able to intentionally reproduce the issue. When checking the logging within Venafi for Vault intermediates, I can see where this issue has happened sporadically.

EXPECTED RESULTS

ACTUAL RESULTS
N/A

ENVIRONMENT DETAILS
vault-pki-monitor-venafi_strict_0.8.0_857
Venafi Trust Protection Platform version 20.2.0.5474

COMMENTS/WORKAROUNDS
N/A

@nmattingly nmattingly added the bug Something isn't working label Aug 26, 2021
@Tony-venafi
Copy link

Response from Ryan T:

You can see from this [comment|https://github.com/hashicorp/vault/issues/3827#issuecomment-359497922] that HashiCorp typically advises customers to set up a cron job to update their CRL on a regular basis. It would be an enhancement to the driver to update the CRL... it likely would be done as part of the Validation process and would be based on checking the validity of the current CRL.

[Comment on #3827 CRL Next Update Time Not Being Updated|https://github.com/hashicorp/vault/issues/3827#issuecomment-359497922]
See [https://www.vaultproject.io/api/secret/pki/index.html#rotate-crls] -- this endpoint is here specifically for this purpose. You can rotate on any interval you like via e.g. a cron job. A token for this job can be limited in scope specifically to this endpoint.

@tr1ck3r
Copy link
Member

tr1ck3r commented Aug 30, 2021

@nmattingly updating the CRL for a Vault CA is not something this solution was previously designed for therefore this would be an enhancement not a bug. Are you able to update the CRL using the CRL rotation API endpoint HashiCorp identified in Vault GitHub issue #3827?

@tr1ck3r tr1ck3r added enhancement New feature or request and removed bug Something isn't working labels Aug 30, 2021
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request
Projects
None yet
Development

No branches or pull requests

3 participants