On 10/2/2023 3:59 PM, Selva Nair wrote:

If you can afford two rounds of client config updates, this could be done without step 3  -- see the following thread from users list:

https://www.mail-archive.com/openvpn-users@lists.sourceforge.net/msg05983.html

Essentially, update to the stacked CA (old+new) on server and stacked CA + new client certs on clients one by one. When all clients are updated, change the server certificate to the new one. Then do another round of client update where old CA is removed from the stack.

A link certificate allows one to do this in one round of client updates as also discussed in that thread. I have used OpenSSL CLI in the past for this but do not have a recipe at hand. No idea whether easyrsa could do it.

Thanks Selva for the link!  Two rounds will be a bit laborious as there are many endpoints.  If I have to go for option A (Stacked CAs on all clients, stacked CAs on the server then update the server), is there a downside with leaving an expired CA cert on all the clients ? Or can they just be left there until the devices get re-imaged over time ?

    ---Mike

_______________________________________________
Openvpn-users mailing list
Openvpn-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-users

Reply via email to