-
Notifications
You must be signed in to change notification settings - Fork 1.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
vars file: set_var EASYRSA_PKI is ignored? #1003
Comments
We don't control what various linux distro package maintainers do with our project. We didn't break that. What version are you running? Was this an upgrade from EasyRSA 2 to EasyRSA3? There is an upgrade process for that migration.
Eric F Crist
…________________________________
From: Tabis Kabis ***@***.***>
Sent: Sunday, August 27, 2023 6:12:33 AM
To: OpenVPN/easy-rsa ***@***.***>
Cc: Subscribed ***@***.***>
Subject: [OpenVPN/easy-rsa] vars file: set_var EASYRSA_PKI is ignored? (Issue #1003)
After upgrading Debian stable and getting the new easyrsa, it doesn't find my ca anymore, because it ignores EASYRSA_PKI in vars where the correct path is specified.
I'll have to manually rename directories and adjust paths in ovpn conffiles on a several dozens of servers.
Why, though? What good does this breaking change serve?
And why is the variable even there in the vars.example file, when it's ignored anyways?
Also, make-cadir is incosistent with the new behaviour. It still copies vars to cadir, not cadir/pki, resulting in a "WARNING" suggesting that this is not "safe".
—
Reply to this email directly, view it on GitHub<#1003>, or unsubscribe<https://github.com/notifications/unsubscribe-auth/AANXQPZA4EWKAIDJOVAWF7LXXMTSDANCNFSM6AAAAAA4AHWNB4>.
You are receiving this because you are subscribed to this thread.Message ID: ***@***.***>
|
From what to what ?
What is the error message ?
That would be a most serious bug!
Dozens ..
Easy-RSA3 from Debian 12.1 does not ship with
From: Lines 5574 to 5588 in f03eb74
Easy-RSA3 shipped by ALL versions of Debian does not include that code snippet, therefore, it is impossible for you to see that error. |
Old stable to current stable -> Debian 11 / easy-rsa 3.0.6 to Debian 12 / easy-rsa 3.1.0, nothing big (I thought).
And yet, it's there.
Correct, that's not the message I saw. I just interpret "WARNING: Move your vars file to your PKI folder, where it is safe" as equivalent to "your vars file is currently in an unsafe directory".
Indeed. Apparently, it's fixed in the current 3.1.6 release. But it was borked from 3.0.9 to 3.1.5. Tested every release starting from 3.0.6 Apart from that, there is a hen and egg problem when declaring EASYRSA_PKI in vars, which in turn is preferred to be in EASYRSA_PKI. I find that a serious bug as well.
Should have done some testing before posting imprecise information. So here's what I found so far (testing on a Mac with releases from this github only, to make sure there is none of the occasional debian fuckery involved). I cd into the extracted release (duh) and create a vars file, because there's already a vars.example there and this is what i used to be sure was the way to use easyrsa (right?). As I want the test to reflect my debian servers upgrade, I only declare EASYRSA_PKI to "$PWD/NOT-PKI". Let's try This is currently in debian 12 stable? No way! Can I reproduce that behaviour on debian? Back to untainted EasyRSA. 3.1.6 fixes this, by recognizing my custom EASYRSA_PKI from the start. However, it lets me know that In case this has not been verbose enough already, here's the console output from these tests: easyrsa-wtfs.zip
There's evidence that the guy before me got that down from several hundreds which the guy before him set up. I'm lucky. But sure aF do I not want to do vars "correction" work in vain. |
Should be simple. Next..
EasyRSA has made no breaking changes to
These warnings simply inform you that the preferred location of You can still use your current If you continue to experience a problem which indicates that |
On further investigation, You can ignore this warning:
I may ask Debian to consider updating |
Let's forget about In all this testing, I've seen very different behaviour within a few releases. Where is this going? Are you going to drop EASYRSA_PKI within vars entirely? Because that would solve the hen and egg problem at least. |
The direction here is to move the
For that reason, the decision was made to prioritize PKI specific customization. Which means that To suppress all of the warnings regarding
If You can also simply ignore the warnings. |
Now that's a clear answer, thank you. Sidenote: init-pki creates identical vars and a vars.example files in pki. Why not drop vars.example entirely. |
You are welcome. This change was likely to cause some friction, now we can smooth things out.
Yes, that is a good idea.
Only multiple and possibly conflicting The bottom line here: These warnings are issued for good reason. That you have experienced and reported problems regarding those warnings is exactly as intended. No new serious issues have been uncovered but there is room for some improvement on EasyRSA documentation. Noted! And thank you for your feedback. |
There is another problem that you may encounter:
Command But, then again, this error could be downgraded to a warning. This is the chicken vs egg problem again. If the The changes relating to this issue are essentially an attempt to resolve that problem. In the LONG TERM, |
The out come of this investigation has lead to reverting the preference for
|
After upgrading Debian stable and getting the new easyrsa, it doesn't find my ca anymore, because it ignores EASYRSA_PKI in vars where the correct path is specified.
I'll have to manually rename directories and adjust paths in ovpn conffiles on a several dozens of servers.
Why, though? What good does this breaking change serve?
And why is the variable even there in the vars.example file, when it's ignored anyways?
Also, make-cadir is incosistent with the new behaviour. It still copies vars to cadir, not cadir/pki, resulting in a "WARNING" suggesting that this is not "safe".
Given that init-pki clears the pki folder, how is the vars file "safe" there?
The text was updated successfully, but these errors were encountered: