Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Certificate Revocation List cannot be edited after Update to pfsense 2.1.1

    OpenVPN
    4
    9
    3.0k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • V
      Vertec
      last edited by

      Since upgrading to the latest firmware, I cannot edit CRLs anymore.
      When hitting the "e" (edit) button nothing happens.

      Firebug says:
      TypeError: document.iform is undefined
      method = document.iform.method.selectedIndex;

      I have tried it with Firefox, Opera and IE.

      Is this a known issue with the latest firmware version or is there a possible solution?

      1 Reply Last reply Reply Quote 0
      • D
        doktornotor Banned
        last edited by

        Confirmed, plus, sucks badly due to the openssl bug…

        https://redmine.pfsense.org/issues/3591
        https://redmine.pfsense.org/issues/3588#note-16

        1 Reply Last reply Reply Quote 0
        • V
          Vertec
          last edited by

          Exactly, I just updated because of the heartleed bug…
          I think there should be a fix asap.

          1 Reply Last reply Reply Quote 0
          • jimpJ
            jimp Rebel Alliance Developer Netgate
            last edited by

            A fix is coming but ideally you'd create a whole new CA and Cert structure if you believe yours has been compromised. Re-using the CA + Revoking certs should only be done if the CA's key had no chance of being compromised.

            New CA + New certs is also faster than Revoking eleventy hundred certs plus regenerating them all. If you have to reissue all new clients anyway, there's little benefit to taking the revocation path.

            Remember: Upvote with the 👍 button for any user/post you find to be helpful, informative, or deserving of recognition!

            Need help fast? Netgate Global Support!

            Do not Chat/PM for help!

            1 Reply Last reply Reply Quote 0
            • P
              phil.davis
              last edited by

              I expect it would be safe to leave the old CA and certs in your pfSense, and not even bother making a huge CRL for them, if you want to retain that data about what old certs you had etc.
              Make a new CA, server cert, and user certs. Change the OpenVPN server/s to use the new CA, server cert…
              Then the old CA and certs will never be used by anything for authentication, so they are just a dangling piece of history that can stay around as long as you care.

              As the Greek philosopher Isosceles used to say, "There are 3 sides to every triangle."
              If I helped you, then help someone else - buy someone a gift from the INF catalog http://secure.inf.org/gifts/usd/

              1 Reply Last reply Reply Quote 0
              • jimpJ
                jimp Rebel Alliance Developer Netgate
                last edited by

                It's also important to keep in mind that if you used a TLS Key in addition to your CA and Certs and used them only for OpenVPN, then you were not vulnerable to Heartbleed anyway.

                Remember: Upvote with the 👍 button for any user/post you find to be helpful, informative, or deserving of recognition!

                Need help fast? Netgate Global Support!

                Do not Chat/PM for help!

                1 Reply Last reply Reply Quote 0
                • D
                  doktornotor Banned
                  last edited by

                  While at this, are you upgrading the OpenVPN client export package with the latest client version as well? 'cause it's shipping openssl as well… :(

                  http://openvpn.net/index.php/open-source/downloads.html

                  1 Reply Last reply Reply Quote 0
                  • jimpJ
                    jimp Rebel Alliance Developer Netgate
                    last edited by

                    Yeah I'm doing that right now actually. Going to move it to 2.3.3. I'll bump the export pkg version when I'm done.

                    Remember: Upvote with the 👍 button for any user/post you find to be helpful, informative, or deserving of recognition!

                    Need help fast? Netgate Global Support!

                    Do not Chat/PM for help!

                    1 Reply Last reply Reply Quote 0
                    • jimpJ
                      jimp Rebel Alliance Developer Netgate
                      last edited by

                      @jimp:

                      Yeah I'm doing that right now actually. Going to move it to 2.3.3. I'll bump the export pkg version when I'm done.

                      Export should be OK now – https://forum.pfsense.org/index.php?topic=74948.0

                      Remember: Upvote with the 👍 button for any user/post you find to be helpful, informative, or deserving of recognition!

                      Need help fast? Netgate Global Support!

                      Do not Chat/PM for help!

                      1 Reply Last reply Reply Quote 0
                      • First post
                        Last post
                      Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.