Bug 1802294 - Need to add information in doc about the renewal process of custom/External SSL certificates and what steps require on client side
Summary: Need to add information in doc about the renewal process of custom/External S...
Keywords:
Status: CLOSED CURRENTRELEASE
Alias: None
Product: Red Hat Satellite
Classification: Red Hat
Component: Certificates
Version: 6.12.0
Hardware: All
OS: Linux
urgent
urgent
Target Milestone: 6.14.0
Assignee: Malhar Jivrajani
QA Contact: Satellite QE Team
URL:
Whiteboard: installing-capsule
: 2190337 (view as bug list)
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2020-02-12 20:12 UTC by Ganesh Payelkar
Modified: 2023-08-02 08:31 UTC (History)
17 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed: 2023-08-02 08:31:52 UTC
Target Upstream Version:
Embargoed:
gpayelka: needinfo-


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Issue Tracker SAT-15332 0 None None None 2023-03-04 16:01:31 UTC
Red Hat Knowledge Base (Solution) 1273623 0 None None None 2021-06-22 15:46:00 UTC

Description Ganesh Payelkar 2020-02-12 20:12:06 UTC
Document URL: 

https://access.redhat.com/documentation/en-us/red_hat_satellite/6.7-beta/html-single/installing_satellite_server_from_a_connected_network/index#configuring-satellite-custom-server-certificate_satellite

https://access.redhat.com/documentation/en-us/red_hat_satellite/6.7-beta/html/installing_capsule_server/installing-capsule-server#configuring-capsule-custom-server-certificate_capsule

Section Number and Name: 

Satellite part: 
3.11.3. Deploying a Custom SSL Certificate to Hosts

Capsule Part:
2.6.2.3. Deploying a Custom SSL Certificate to Hosts


Describe the issue: 

As of now, we have information and steps available for to deployment of Custom/External SSL certificates, 

but there is no steps/information available for how to renew or what steps need to take it before/after certificate expired/renewed. 

There are lots of questions we are getting about renew process and consumer packages re-installation when custom/External certificates are near to expire. 

Sometimes, do we need to change CA or when we change CA what steps we should take it on capsule/clients 

How can we deploy/re-install consumer packages in bulk when CA got changed or new ssl certs deployment after a default installation of satellite/capsule? 



Suggestions for improvement: 

Additional information:

Comment 10 Ganesh Payelkar 2021-07-19 12:32:47 UTC
Ian,

Agree, But clients are always opening cases for how to renew steps

Comment 11 Mark Hillis 2021-07-28 16:16:15 UTC
I also get this question quite often from the customers that I cover. I do link to the deployment article but that leaves a dozen or more questions about what steps are neeeded to "only" replace the expired certs. It would be helpful if this option was built into the installer and propigated to Capsules and satellite clients. or if the steps are specifically called out in the documentation around replacing certificates as it's not clear in the current documentation. - MH, RH Solution Architect.

Comment 16 Ganesh Payelkar 2021-12-12 06:03:38 UTC
NOTE: 

If your satellite/Capsule is already configured with SSL certs and you have renewed it from the same CA then there is no need to replace the consumer package on each client.

If you have Custom/Third-party SSL certificates installed on the satellite/capsule from "A" CA and after the expiry of that certificate, 
     If you have taken an SSL certificate from "B" CA and you installed it on satellite/Capsule, then you have to remove the old consumer package and install the new consumer package after the installation of NEW certificates on each registered client. 
     It is because you will be having NEW CA on satellite and capsule if the CA of SSL certificate changes.

Comment 23 Eric Helms 2023-03-16 17:10:46 UTC
Howdy,

I wanted to better understand what specifically this is asking for as part of our consideration. If we look at [1] this section describes how to configure Satellite with custom certificates. If those certificates need to change (due to expiration, due to hostname change, due to CA change, any reason), the process is the same.


1. Can this be solved by adding a sentence at the start that says:


     Use this procedure to configure your Satellite Server any time you add or change custom SSL certificates.

2. Do we need to explicitly list some of the reasons certificates might be changed and emphasize that no matter what, you still use the procedure [1]?


3. I would agree that we can bulk up [2] with wording that states if you change certificates, you must update any hosts connected to the Satellite or Capsule that has a certificate change.

4. We should add a note that indicates changes to the custom certificates CA require not only host updates, but also Capsule certificate updates.


egolov -- Would you add anything else?


[1] https://access.redhat.com/documentation/en-us/red_hat_satellite/6.12/html/installing_satellite_server_in_a_connected_network_environment/performing-additional-configuration#Deploying_a_Custom_SSL_Certificate_to_Server_satellite
[2] https://access.redhat.com/documentation/en-us/red_hat_satellite/6.12/html/installing_satellite_server_in_a_connected_network_environment/performing-additional-configuration#deploying-a-custom-ssl-certificate-to-hosts_satellite

Comment 24 Evgeni Golov 2023-03-17 09:35:54 UTC
(In reply to Eric Helms from comment #23)
> Howdy,
> 
> I wanted to better understand what specifically this is asking for as part
> of our consideration. If we look at [1] this section describes how to
> configure Satellite with custom certificates. If those certificates need to
> change (due to expiration, due to hostname change, due to CA change, any
> reason), the process is the same.

hostname change is special and in that case the process is actually not the same, as you have to use satellite-change-hostname for that.

> 1. Can this be solved by adding a sentence at the start that says:
> 
> 
>      Use this procedure to configure your Satellite Server any time you add
> or change custom SSL certificates.

I guess that's a fair addition, especially given that step 2 of the procedure in [1] already says:
… enter the satellite-installer command that installs a new Satellite with custom SSL certificates or updates certificates on a currently running Satellite …

> 2. Do we need to explicitly list some of the reasons certificates might be
> changed and emphasize that no matter what, you still use the procedure [1]?

I'd avoid that.

> 3. I would agree that we can bulk up [2] with wording that states if you
> change certificates, you must update any hosts connected to the Satellite or
> Capsule that has a certificate change.

That's not true. You do not have to update any hosts unless the CA (any CA).
When you just update the certificate (aka: you used the same Private Key and Certificate Signing Request), the only thing that really changes is the signature (and the dates) in the certificate, and that can be perfectly verified using the old files.
I am not 100% sure, but I think even changing the private key should be "OK" and still verifiable by the old files (as I don't think we do any certificate pinning, just CA pinning)
(The one machine I have at hand here has 3 certs in /etc/rhsm/ca/katello-server-ca.pem and none of them has the satellite as Subject)

> 4. We should add a note that indicates changes to the custom certificates CA
> require not only host updates, but also Capsule certificate updates.

That's correct.

> egolov -- Would you add anything else?

I think the original request looks for two things:
1. *when* does the user have to update the hosts ("always" is tad broad, as shown above)
2. *how* can the user update the hosts in bulk

> [1]
> https://access.redhat.com/documentation/en-us/red_hat_satellite/6.12/html/
> installing_satellite_server_in_a_connected_network_environment/performing-
> additional-
> configuration#Deploying_a_Custom_SSL_Certificate_to_Server_satellite
> [2]
> https://access.redhat.com/documentation/en-us/red_hat_satellite/6.12/html/
> installing_satellite_server_in_a_connected_network_environment/performing-
> additional-configuration#deploying-a-custom-ssl-certificate-to-
> hosts_satellite

Comment 25 Eric Helms 2023-03-20 14:41:11 UTC
(In reply to Evgeni Golov from comment #24)
> (In reply to Eric Helms from comment #23)
> > Howdy,
> > 
> > I wanted to better understand what specifically this is asking for as part
> > of our consideration. If we look at [1] this section describes how to
> > configure Satellite with custom certificates. If those certificates need to
> > change (due to expiration, due to hostname change, due to CA change, any
> > reason), the process is the same.
> 
> hostname change is special and in that case the process is actually not the
> same, as you have to use satellite-change-hostname for that.

Oh yes, I was not specific in my wording enough. I was meaning this from a CN perspective of the custom certificates. If the user wanted to change the hostname within the custom certificates without changing the actual hostname on the box.

> 
> > 1. Can this be solved by adding a sentence at the start that says:
> > 
> > 
> >      Use this procedure to configure your Satellite Server any time you add
> > or change custom SSL certificates.
> 
> I guess that's a fair addition, especially given that step 2 of the
> procedure in [1] already says:
> … enter the satellite-installer command that installs a new Satellite with
> custom SSL certificates or updates certificates on a currently running
> Satellite …
> 
> > 2. Do we need to explicitly list some of the reasons certificates might be
> > changed and emphasize that no matter what, you still use the procedure [1]?
> 
> I'd avoid that.
> 
> > 3. I would agree that we can bulk up [2] with wording that states if you
> > change certificates, you must update any hosts connected to the Satellite or
> > Capsule that has a certificate change.
> 
> That's not true. You do not have to update any hosts unless the CA (any CA).
> When you just update the certificate (aka: you used the same Private Key and
> Certificate Signing Request), the only thing that really changes is the
> signature (and the dates) in the certificate, and that can be perfectly
> verified using the old files.
> I am not 100% sure, but I think even changing the private key should be "OK"
> and still verifiable by the old files (as I don't think we do any
> certificate pinning, just CA pinning)
> (The one machine I have at hand here has 3 certs in
> /etc/rhsm/ca/katello-server-ca.pem and none of them has the satellite as
> Subject)


I meant this to mean only CA changes and flubbed the wording. You are correct here it should only be if the CA changes.

> 
> > 4. We should add a note that indicates changes to the custom certificates CA
> > require not only host updates, but also Capsule certificate updates.
> 
> That's correct.
> 
> > egolov -- Would you add anything else?
> 
> I think the original request looks for two things:
> 1. *when* does the user have to update the hosts ("always" is tad broad, as
> shown above)
> 2. *how* can the user update the hosts in bulk

I think this has to be done manually in all cases? Given that as soon as the CA changes, the client's connection breaks. 

Perhaps they could:

 * Add new CA to the old CA as a bundle, run installer to update everything and then roll out new CA ahead of time?

> 
> > [1]
> > https://access.redhat.com/documentation/en-us/red_hat_satellite/6.12/html/
> > installing_satellite_server_in_a_connected_network_environment/performing-
> > additional-
> > configuration#Deploying_a_Custom_SSL_Certificate_to_Server_satellite
> > [2]
> > https://access.redhat.com/documentation/en-us/red_hat_satellite/6.12/html/
> > installing_satellite_server_in_a_connected_network_environment/performing-
> > additional-configuration#deploying-a-custom-ssl-certificate-to-
> > hosts_satellite

Comment 26 Evgeni Golov 2023-03-22 08:52:09 UTC
(In reply to Eric Helms from comment #25)

> > > egolov -- Would you add anything else?
> > 
> > I think the original request looks for two things:
> > 1. *when* does the user have to update the hosts ("always" is tad broad, as
> > shown above)
> > 2. *how* can the user update the hosts in bulk
> 
> I think this has to be done manually in all cases? Given that as soon as the
> CA changes, the client's connection breaks. 
> 
> Perhaps they could:
> 
>  * Add new CA to the old CA as a bundle, run installer to update everything
> and then roll out new CA ahead of time?

Yes, that's how I'd do it.

Comment 28 Eric Helms 2023-05-02 01:41:12 UTC
*** Bug 2190337 has been marked as a duplicate of this bug. ***


Note You need to log in before you can comment on or make changes to this bug.