761 Commits

Author SHA1 Message Date
Richard T Bonhomme
bb81dc5bb4
x509-types: Reset non-existent x509-types dir set by vars
Closes: #654

Signed-off-by: Richard T Bonhomme <tincantech@protonmail.com>
2022-08-29 01:42:01 +01:00
Richard T Bonhomme
47547efefc
vars_setup: Correctly locate x509-types for usage() directory STATUS
Locate existing x509-types directory, after sourcing vars.
If vars is set incorrectly then this WILL over-ride vars.

Closes: #654

Signed-off-by: Richard T Bonhomme <tincantech@protonmail.com>
2022-08-29 01:00:19 +01:00
Richard T Bonhomme
1254ca5e47
Merge branch 'status-x509-types' of ssh://github.com/TinCanTech/easy-rsa into TinCanTech-status-x509-types
Signed-off-by: Richard T Bonhomme <tincantech@protonmail.com>
2022-08-28 16:56:30 +01:00
Richard T Bonhomme
df37955f4a
build-ca: Assign default sub-CA commonName and enable SSL interactive
Squashed commit of the following:

commit 5e9609873a01dd358e3a4c6928fc553e5257d8ea
Merge: ed54b1a 42bfae4
Author: Richard T Bonhomme <tincantech@protonmail.com>
Date:   Sun Aug 28 14:44:13 2022 +0100

    Merge branch 'subca-default-cn' of ssh://github.com/TinCanTech/easy-rsa into TinCanTech-subca-default-cn

    Signed-off-by: Richard T Bonhomme <tincantech@protonmail.com>

commit 42bfae4673996307107964be0fc8b15883072d31
Author: Richard T Bonhomme <tincantech@protonmail.com>
Date:   Sat Aug 27 13:20:41 2022 +0100

    build-ca: Assign default sub-CA commonName and enable SSL interactive

    When building a CA/SubCA, if a commonName has not been assigned by --req-cn
    then assign a default commonName, of either:
    * 'Easy-RSA CA' or 'Easy-RSA Sub-CA'.

    If a default commonName has been assigned then use SSL interactive mode
    to edit/confirm each of the subject fields individually. Otherwise, use
    EasyRSA to confirm all of the subject fields with a single prompt.

    Closes: #659

    Signed-off-by: Richard T Bonhomme <tincantech@protonmail.com>

Signed-off-by: Richard T Bonhomme <tincantech@protonmail.com>
2022-08-28 16:36:28 +01:00
Richard T Bonhomme
1c9ff967fb
x509-types: Add x509-types location to usage() STATUS
Make find_x509_types_dir() a stand alone function.

When calling usage(), find_x509_types_dir() can be a soft fail.
When x509-types directory is required, this function is a hard fail.

This also simplifies install_data_to_pki(), because x509-types do not
need to be installed in the PKI.

Closes: #654

Signed-off-by: Richard T Bonhomme <tincantech@protonmail.com>
2022-08-27 17:17:51 +01:00
Richard T Bonhomme
68efe90eaa
Options: Rescind deprecation notice of option --req-cn
Note: --req-cn can only be used when building a CA/subCA.
When building All other certificates --req-cn is not honoured.

Reported-in: #659

Signed-off-by: Richard T Bonhomme <tincantech@protonmail.com>
2022-08-26 18:54:45 +01:00
Richard T Bonhomme
f5bd5f9d0d
Options: Add '-s' to also enabe --silent mode.
Plus a small tidy up.

Closes: #653

Signed-off-by: Richard T Bonhomme <tincantech@protonmail.com>
2022-08-24 20:14:18 +01:00
Richard T Bonhomme
5890b692cd
detect_host: Use SSL Library version from EasyRSA version
Signed-off-by: Richard T Bonhomme <tincantech@protonmail.com>
2022-08-24 16:19:31 +01:00
Richard T Bonhomme
69afb5960e
Overhaul vars detection
Processing vars at init-pki was intentionally kept to minimum, due to
complications with user expectations verses Easy-RSA preferences.

This overhaul aims to finalise Easy-RSA interference with vars.

1. Prefer that vars is in the PKI but only force that at init-pki,
when no other vars files can be found. Otherwise, do not create a
template vars and leave it to the user, with appropriate messages.

2. Fail all commands, except init-pki, if more than one vars exists.

3. Take special care of 'init-pki soft'.

4. For existing PKIs, be aware that vars may NOT exist.

This patch is less complicated than it appears to be.
Most of the changes are either comments or user messages.
There are some new state flags to manage the location of vars,
which are used to decide when a new vars is created and control
user messages.

Closes: #651

New message for "Using x509-types directory: $EASYRSA_EXT_DIR"
Closes: #654

Signed-off-by: Richard T Bonhomme <tincantech@protonmail.com>
2022-08-23 22:10:03 +01:00
Richard T Bonhomme
edb46ca199
Merge branch 'cleanup-cleanup' of ssh://github.com/TinCanTech/easy-rsa into TinCanTech-cleanup-cleanup
Signed-off-by: Richard T Bonhomme <tincantech@protonmail.com>
2022-08-22 22:59:01 +01:00
Richard T Bonhomme
e24bf0a72e
cleanup: Make "clean line" respect silent, batch and quiet modes
Improve two comments and information() output

Signed-off-by: Richard T Bonhomme <tincantech@protonmail.com>
2022-08-22 22:37:27 +01:00
Richard T Bonhomme
ca761167d1
Merge branch 'enfore-x509-COMMON' of ssh://github.com/TinCanTech/easy-rsa into TinCanTech-enfore-x509-COMMON
Signed-off-by: Richard T Bonhomme <tincantech@protonmail.com>
2022-08-21 23:00:46 +01:00
Richard T Bonhomme
d1cabcad2a
Merge branch 'update-unsup-chars' of ssh://github.com/TinCanTech/easy-rsa into TinCanTech-update-unsup-chars
Signed-off-by: Richard T Bonhomme <tincantech@protonmail.com>
2022-08-21 22:56:41 +01:00
Richard T Bonhomme
7a0c5294b7
Merge branch 'options-number-check' of ssh://github.com/TinCanTech/easy-rsa into TinCanTech-options-number-check
Signed-off-by: Richard T Bonhomme <tincantech@protonmail.com>
2022-08-21 22:47:55 +01:00
Richard T Bonhomme
805f3b73dc
sign-req: Enforce X509-type files exist and are used. (#581)
Signed-off-by: Richard T Bonhomme <tincantech@protonmail.com>
2022-08-21 00:44:35 +01:00
Richard T Bonhomme
55a213c0b4
Help: Remove obsolete test for --vars and --pki-dir (#640)
Signed-off-by: Richard T Bonhomme <tincantech@protonmail.com>
2022-08-20 20:53:29 +01:00
Richard T Bonhomme
8a0702329c
Unsupported characters: Correct check and warning message
Since the introduction of 'escape_hazard()' function, all characters
except (`) backtick are supported.

This patch brings vars.example in line with the warning in easyrsa and
also only warns about backtick.

It is possible that curly brace '{}' may also cause OpenSSL to behave
strangely. However, the strange behaviour, which I previously observed,
may have been rectified by OpenSSL.

Signed-off-by: Richard T Bonhomme <tincantech@protonmail.com>
2022-08-20 17:33:39 +01:00
Richard T Bonhomme
901e06970c
Options: Check that $val is numeric when a number is expected
Signed-off-by: Richard T Bonhomme <tincantech@protonmail.com>
2022-08-20 14:34:54 +01:00
Richard T Bonhomme
fbe664a988
renew: Improve notices and input checks
Add warning for new password status, prior to renewal.

Add reminder to replace certificate AND key files, after renewal.

Correct input check for option 'nopass'

Closes: m#644

Signed-off-by: Richard T Bonhomme <tincantech@protonmail.com>
2022-08-19 18:30:38 +01:00
Richard T Bonhomme
74a43fd86a
vars_setup(): Always warn about unsupported characters in vars
Previously, testing vars for unsupported characters was only done if
vars was in the PKI.  This test can now be done for all vars files.

Signed-off-by: Richard T Bonhomme <tincantech@protonmail.com>
2022-08-18 13:30:14 +01:00
Richard T Bonhomme
dc501cdca3
Merge branch 'improve-prog_dir' of ssh://github.com/TinCanTech/easy-rsa into TinCanTech-improve-prog_dir
Signed-off-by: Richard T Bonhomme <tincantech@protonmail.com>
2022-08-18 12:15:47 +01:00
Richard T Bonhomme
9278bc6923
Expand the possible values of $prog_dir, include full path
The 3 definitions of $prog_dir:
- foo -> prog_dir=/search/path ## Not $PWD
- ./foo -> prog_dir=. ## $PWD
- /full/path/foo -> prog_dir=/full/path ## Could be $PWD

'/full/path' was previously missing from the check.

Signed-off-by: Richard T Bonhomme <tincantech@protonmail.com>
2022-08-17 23:04:11 +01:00
Richard T Bonhomme
48f7ed5f10
Re-enable the use of --vars=file for init-pki
Since relaxing the rules concerning the location of vars file,
commit f4a604438d3ce5fe67a1f4db956dc42fc4ae5588, it is no longer
necessary to prohibit the use of --vars=file with 'init-pki'.

This initial prohibition was only a temporary measure and has
proven to be of no value.

Signed-off-by: Richard T Bonhomme <tincantech@protonmail.com>
2022-08-17 18:20:43 +01:00
Richard T Bonhomme
b77963bff2
Merge branch 'improve-verify-ca-init' of ssh://github.com/TinCanTech/easy-rsa into TinCanTech-improve-verify-ca-init
Signed-off-by: Richard T Bonhomme <tincantech@protonmail.com>
2022-08-16 23:00:10 +01:00
Richard T Bonhomme
0edbdc3446
show: Reorder parameter checks to guard against empty input
'shift 2' was moved above the parameter check in previous commit:
1d227736e404b805e84b8949aa238a240c4ad5eb

Move it back to after the check and reword user output for clarity.

Signed-off-by: Richard T Bonhomme <tincantech@protonmail.com>
2022-08-15 19:21:02 +01:00
Richard T Bonhomme
bb304946ba
verify_ca_init: Reorder names to improve error message
If verify_ca_init fails then the error message states that: 'serial
is missing'.  While this is true, it is not 'user friendly'.

Reorder the checks so that if verify_ca_init fails then the error
message will "probably" state that: 'ca.crt is missing', which makes
more sense if the CA has not been initialised.

Signed-off-by: Richard T Bonhomme <tincantech@protonmail.com>
2022-08-15 17:36:18 +01:00
Richard T Bonhomme
5dfeff8984
sign--req: Prohibit COMMON as a certificate type
The command 'sign-req COMMON client1 nopass' would generate an invalid
certificate. Do not allow COMMON as a $cert_type.

Also, improve comment and user output for existing certificate check.

Closese: #634

Signed-off-by: Richard T Bonhomme <tincantech@protonmail.com>
2022-08-15 13:13:55 +01:00
Richard T Bonhomme
d42d7504f9
gen-dh: Standardise user messages
Signed-off-by: Richard T Bonhomme <tincantech@protonmail.com>
2022-08-15 12:12:01 +01:00
Richard T Bonhomme
ed2f1c7cb0
gen-dh: Use temporary file
If a user breaks out [Ctrl-C] from generating a DH parameters file
then there is an empty dh.pem file left over.

Output the DH parameters to a temp-file and move it upon validation
and completion.

Signed-off-by: Richard T Bonhomme <tincantech@protonmail.com>
2022-08-15 01:01:03 +01:00
Richard T Bonhomme
8b7e79096b
Introduce Quiet mode option -q|--quiet, disable information output
Signed-off-by: Richard T Bonhomme <tincantech@protonmail.com>
2022-08-14 20:22:02 +01:00
Richard T Bonhomme
20f7aaa9c6
init-pki: Re-order locations of required data files
Prefer /usr/local/share over /usr/share
and move /etc/easy-rsa to last place.

Tidy up a 'case', no functional change.

Signed-off-by: Richard T Bonhomme <tincantech@protonmail.com>
2022-08-13 21:16:58 +01:00
Richard T Bonhomme
f4a604438d
Allow vars file to exist in current directory (Fix make-cadir)
The utility script 'make-cadir' creates a CA directory with a vars file.
This vars file conflicts with the preferred PKI-vars file.

This patch changes 'init-pki' to allow make-cadir vars file to over-ride
the preferred PKI-vars file, without error.

Closes: #633

Signed-off-by: Richard T Bonhomme <tincantech@protonmail.com>
2022-08-13 20:40:57 +01:00
Richard T Bonhomme
5b4fd2b484
sign-req: Check for an existing certificate
'sign-req' must not over-write an existing certificate.

Closes: #629

Signed-off-by: Richard T Bonhomme <tincantech@protonmail.com>
2022-08-08 14:13:32 +01:00
Richard T Bonhomme
f3f984991a
rewind-renew: Correct user messages, replace 'renew' with 'rewind'
Signed-off-by: Richard T Bonhomme <tincantech@protonmail.com>
2022-08-08 13:20:38 +01:00
Richard T Bonhomme
10bce6c384
Merge branch 'rewind-mkdir' of ssh://github.com/TinCanTech/easy-rsa into TinCanTech-rewind-mkdir
Signed-off-by: Richard T Bonhomme <tincantech@protonmail.com>
2022-08-07 12:54:49 +01:00
Richard T Bonhomme
8da0d2516d
Merge branch 'renew-cleanup' of ssh://github.com/TinCanTech/easy-rsa into TinCanTech-renew-cleanup
Signed-off-by: Richard T Bonhomme <tincantech@protonmail.com>
2022-08-06 16:22:52 +01:00
Richard T Bonhomme
51aa8a88e7
Merge branch 'renew-req' of ssh://github.com/TinCanTech/easy-rsa into TinCanTech-renew-req
Signed-off-by: Richard T Bonhomme <tincantech@protonmail.com>
2022-08-06 15:08:57 +01:00
Richard T Bonhomme
4567091c1f
Upgrade-23: Assign a secure session for temporary directory
To create Easyrsa Safe SSL config file, a standard temporary
directory is required, which can only be created after a secure
session has been assigned.

Closes: #622

Signed-off-by: Richard T Bonhomme <tincantech@protonmail.com>
2022-07-30 11:57:38 +01:00
Richard T Bonhomme
a46e33a019
Improve comments regarding 'verify_pki_init' (No functional change)
Also, verify use of verify_pki_init(), manually.

Signed-off-by: Richard T Bonhomme <tincantech@protonmail.com>
2022-06-26 01:10:24 +01:00
Richard T Bonhomme
30bb214c86
Ensure 'pki/renewed/<folders>' exist for 'rewind-renew'
It is possible that only the 'foo_by_serial' folders will exist in
the 'pki/renewed' sub-folder when 'rewind-renew' is needed.

Create the required folders when using 'rewind-renew'.

Closes: #612

Signed-off-by: Richard T Bonhomme <tincantech@protonmail.com>
2022-06-25 16:16:15 +01:00
Richard T Bonhomme
6060015b39
Restore files when 'renew' fails during 'build_full()' phase
Because easyrsa uses die() on errors, functions which call other
functions may not receive a returned error code and, therefore,
a test for an error will not occur in the calling function.

If 'renew' fails in the build_full() phase then build_full(), gen_req()
or sign_req() will error out to die() and not return an error to 'renew'.
This leaves the files which are about to be renewed in the 'renewed'
sub-folder without replacement files in the PKI folders.

Set 'on_error_undo_renew_move=1' and call renew_restore_move() from
cleanup() when an error occurs during the build_full() phase of 'renew'.

Closes: #613

Signed-off-by: Richard T Bonhomme <tincantech@protonmail.com>
2022-06-25 15:25:56 +01:00
Richard T Bonhomme
727cd69108
Introduce 'renew-req': Create new certificate request for an existing key
EasyRSA 'renew' does not renew a certificate, it builds a new cert/key pair.
This 'old' method thus causes the Entity Private Key to be 'leaked'.

'renew-req' allows the original Entity Private Key to remain ''secure''.

This is achieved by generating a new certificate request for the original
Entity Private Key, to be submitted for signing by the CA administrator.

Resolves: #609

Signed-off-by: Richard T Bonhomme <tincantech@protonmail.com>
2022-06-25 13:51:42 +01:00
Richard T Bonhomme
e5ec1ab771
Document '--req-serial' - Update 'help' and ChangeLog
Signed-off-by: Richard T Bonhomme <tincantech@protonmail.com>
2022-06-21 00:22:50 +01:00
Richard T Bonhomme
47080028e3
Remove stray space characters
Signed-off-by: Richard T Bonhomme <tincantech@protonmail.com>
2022-06-20 23:11:59 +01:00
Richard T Bonhomme
72a32a3288
Introduce 'serialNumber' field for DN (OID 2.5.4.5)
Add a *final* layer of granularity to X509 Distinguished Name.
Only used if --req-serial="<PRINTABLE>user data" is specified.

To minimize the noise to the user by this new field, change the way
that OpenSSL is called to build a CA: Always use '-batch' mode.

User visible change when building a CA:
* Instead of being prompted for each individual DN field, now the
  user is presented with a read-out of how the fields are currently
  set. There is now only a single confirmation that all fields are
  correct.
* If '--req-serial' is not used then 'serialNumber' is not displayed.

PRINTABLE: a-z,A-Z,0-9, -+/=.,?:()

Closes: OpenVPN#462 - The original proposal and prototype code.
Closes: OpenVPN#598 - Supersedes: Introduce 1.organizationalUnitName
Closes: OpenVPN#600 - Bugfix: Remove unused 'name' definition from SSL conf.

Signed-off-by: Richard T Bonhomme <tincantech@protonmail.com>
2022-06-20 21:46:11 +01:00
Richard T Bonhomme
c300f6043f
LibreSSL corrections: genpkey and no-password
Squashed commit of the following:

* easyrsa_openssl() - Disable 'genpkey -config' for LibreSSL
  Closes: #601

* Set '-nodes' for LibreSSL version 3 'no-password' mode
  Closes: #602

Minor corrections to indentation/comments.

Signed-off-by: Richard T Bonhomme <tincantech@protonmail.com>
2022-06-20 00:54:42 +01:00
Richard T Bonhomme
17df3b8220
Complete missing 'busybox date' commands
Signed-off-by: Richard T Bonhomme <tincantech@protonmail.com>
2022-06-16 23:05:39 +01:00
Richard T Bonhomme
23558ae81d
Re-instate subshell for build_full() -> sign_req()
Subshell is required due to use of die() in sign_req().
Otherwise, on error sign_req() errors out without removing input files.

Revert part of commit: 15429df9fdd5c63c6e33dba141ff2e9a77ed0855

Signed-off-by: Richard T Bonhomme <tincantech@protonmail.com>
2022-06-16 12:03:51 +01:00
Richard T Bonhomme
2bc89f7658
DEPRECATE(1) '--req-cn' - Change default certificate 'renew' to 90 days
Option '--renew-days=#', variable $EASYRSA_CERT_RENEW was used to enforce a
"grace" period, *outside of which* 'renew' was prohibited. Default: 30days.

This prohibition is no longer enforced:
* https://github.com/OpenVPN/easy-rsa/issues/593

Option '--renew-days=#' now represents the cut-off date for EasyRSA status
report 'show-expire'. This report *only* lists those certificates which will
expire within the given $EASYRSA_CERT_RENEW number of days 'from now'.

This also effects the command 'renewable'. (Only supports GNU 'date')

Updates to 'help options'.

(1) Official notice of "intention to deprecate" option: '--req-cn'

EasyRSA has *never* supported '--req-cn'.

For "type" server/client 'Build-$type-full' AlWAYS explicitly sets variable
EASYRSA_REQ_CN to $2 from the command line.  Always over-riding the option.

'gen-req' explicitly sets 'EASYRSA_REQ_CN="$1"'. Always over-riding ..

'sign-req' explicitly sets 'crt_out="$EASYRSA_PKI/issued/$2.crt"' .. ditto.

'build-ca' requires specific code review to understand.
Labeled as: "May have tried but gave up.."

This is *only* a notice of "intention to deprecate".

The main goal of the option '--req-cn' is to achieve a disconnect between
certificate 'commonName' verses the 'file-name' of the certificate.

Eg: file-name: mmjd0101.crt | commonName: "mass-murderer John Doe (#0101)"

There is "merit" to this functionality but then .. EasyRSA is Free-OSS.

"If You need this functionality then You should help provide it."

Signed-off-by: Richard T Bonhomme <tincantech@protonmail.com>
2022-06-13 20:32:35 +01:00
Richard T Bonhomme
38189be360
Introduce 'show-host' - Deep diagnostic
Signed-off-by: Richard T Bonhomme <tincantech@protonmail.com>
2022-06-11 11:57:41 +01:00