Skip to content

CRL Generation problem: followup from https://github.com/hashicorp/vault/issues/20137 #31827

@roy3861

Description

@roy3861

Hi,

So this is a follow up from : #20137
Which my colleague has raised in the past.

So as per, #20137 (comment)

We have created New RootCA with KU Set correctly with same key of Old RootCA. Upgraded vault to latest 1.21.2. And have both Part of Single Mount Path in vault with old RootCA as default issuer.

Now while trying to rotate CRLs i am getting:

`curl "http://root-ca-vault.local/v1/Old-RootCA/crl/rotate" -H "X-Vault-Token: $ROOT_CA_API_TOKEN"

{"request_id":"a28006c7-f5f0-3f88-f9da-4871392e1dee","lease_id":"","renewable":false,"lease_duration":0,"data":{"success":true},"wrap_info":null,"warnings":["Warning 1 during CRL rebuild: warning from local CRL rebuild: Issuer equivalency set with associated keys lacked an issuer with CRL Signing KeyUsage; refusing to rebuild CRL for this group of issuers: "],"auth":null,"mount_type":"pki"}`

And then if i try to get CRL it gives me empty string:

`# curl "http://root-ca-vault.local/v1/Old-RootCA/crl/pem"

`

I also did not understood this work around: #20137 (comment)

is it like to ticking for old RootCA issuer:
Usage
Allowed usages for this issuer. It can always be read.

Following Option?
Signing CRLs

Metadata

Metadata

Assignees

No one assigned

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions